We've got you covered for your next security engineering job in 2025! ⭐ Here are 5 security engineering jobs posted in the last week! Go to our job board for links, and to see more opportunities: https://lnkd.in/g46zAHtK 💰 Coinbase Senior Blockchain Security Engineer Remote, US 🔸 AIS Security Operations Architect Virginia, US 🍏 Zoll Medical Corporation Information Security Architect Broomfield, CO 🛡 Coro Security Support Engineer Remote, US 💻 UCare Security Architect/Security Architect Senior Minneapolis, MN #NowHiring #HiringNow #JobBoard #SecurityEngineering #SecOps #Cybersecurity #Jobs #StartupJobs
Panther
Computer and Network Security
San Francisco, CA 11,418 followers
Turn up the volume, turn down the noise.
About us
Panther transforms noisy cloud logs into security signals with code-driven detection and response at petabyte scale–without the overhead and cost of traditional SIEMs.
- Website
-
https://panther.com/
External link for Panther
- Industry
- Computer and Network Security
- Company size
- 51-200 employees
- Headquarters
- San Francisco, CA
- Type
- Privately Held
- Founded
- 2018
- Specialties
- Cloud Security, Information Security, Startup, AWS, AWS Security, SIEM, Cloud-Native SIEM, big data, Security Data Lake, Security, Detections as Code, Splunk Alternative, Cloud SIEM, Log Analysis, Security Monitoring, Python, and threat detection
Products
Panther
Security Information & Event Management (SIEM) Software
Panther is a cloud-native threat detection platform that transforms TB/day of raw logs into a structured security data lake to power real-time detection, swift response, and thorough investigations. With detection-as-code in Python and out-of-the-box integrations for dozens of log sources, Panther solves the challenges of security operations at scale.
Locations
-
Primary
San Francisco, CA 94103, US
Employees at Panther
Updates
-
As we bid farewell to another fantastic year of safeguarding the digital world, let's raise our cyber-glasses to a future filled with even more resilience, innovation, and unwavering dedication to keeping our worlds secure! 🥂 #HappyNewYear
-
Panther reposted this
We added a full system architecture description of Panther to our user docs a few months ago. More than 1 person has said to me "That's crazy, you are telling your competitors and even the more tech savvy customers how to do what you do! They will steal your ideas and you will lose business." I think the opposite, let me explain. Panther is a "Cloud Native" SIEM, taking advantage of all the available services. Does that mean anyone can do what we have done? Yes it does. Assuming enough good engineers, in 3-5 years you could build what we have today. It will take 3-5 years because Panther is more than "let's wire up some lambdas to write parquet files". The hard lessons learned about resiliency, correctness and cost effectiveness take time and a diversity of experience. The full feature set of a SIEM goes well beyond simply running scheduled queries. By showing how we implemented the breadth of features in Panther we hope customers will appreciate what we have created and understand the value of what we offer. Do you have 3-5 years to roll your own? Do you have the operational staff to run what you built? If so, let's compare notes in a few years. In the meantime, Panther has some industry changing capabilities planned for 2025. More on that in a few months!
-
Panther reposted this
The below sums it up quite well. We're hobbyists without our customers. They not only give us thoughtful feedback and suggestions for improving our product, but they contribute to it. Thank you to the #panther customer community, for the continued support!
🔥🔥🔥 Some #gratitude coming in hot! 🏆 We want to recognize our vibrant Panther community whose contributions improve our open-source ruleset on the daily. We know the SecOps community is driven by open-source tools and standards, which is why our ruleset has been open-sourced from the start—and proudly a part of the #Sigma ecosystem. Recently, our Threat Research team started a quarterly newsletter to recognize and celebrate our contributors. 🎉 We give one lucky winner a prize for having the most impact on our ruleset. Here’s some of the great stuff we’ve seen over the ☀️ summer and 🍁 fall! ⭐ A policy that ensures valid AWS WAF logging destinations, a policy to prevent cross-service confused deputy issues on S3 buckets, and a rule that detects when EKS resources are accessed using the system:anonymous user, all submitted by Bharat Chandra P. 👏 Thank you! ⭐ An improvement to all alert titles in the Wiz Audit log detections to include the Wiz actor ⭐ Filtering out Intelsat plane wifi networks, which causes a false positive in our impossible travel rule ⭐ A new rule that alerts when a GitHub dependabot vulnerability is dismissed without being resolved. This one was submitted by Elim Ghebregzabiaher—thank you! 👏 ⭐ Correction of an alert title showing the actor instead of the target for a Slack alert ⭐ A well-documented bug report for the Crowdstrike pipeline that helped our Threat Research team quickly fix the issue To our contributors and the Panther community, our sincerest gratitude. 💙 Thank you! 💙 To everyone else, check out our open-source ruleset 👉 panther-analysis: https://lnkd.in/disJ4Cb #SecurityEngineering #DetectionAsCode #DetectionEngineering #OpenSource
-
How do delays between action and billing updates impact incident response in AWS environments? In season two of the Detection at Scale podcast, Corey Quinn, Chief Cloud Economist at The Duckbill Group, shares his insights into time lags in AWS security incident detection. Because practitioners are using billing as part of their detection signaling, this can cause a delay between action and billing updates. Check out the full episode here 👉 https://lnkd.in/dCWvuRjg #DetectionatScale #Cybersecurity #DetectionEngineering #SecurityEngineering Hosted by: Jack Naglieri
-
How useful is behavior analysis in threat detection? In season two of the Detection at Scale podcast, Jeff Bollinger, Director of Incident Response and Detection Engineering at LinkedIn, explores the complex landscape of security monitoring, including the pivotal role of behavioral analysis and the increasing importance of detecting and monitoring unusual behaviors by entities in the cybersecurity domain. Although human behavior is too unpredictable for it to be an end-all-be-all indicator, it can still tell us a lot about what signals are actually threats and which are just noise. Check out the full episode here 👉 https://lnkd.in/g4MxarkD #DetectionatScale #Cybersecurity #DetectionEngineering #SecurityEngineering Hosted by: Jack Naglieri
-
🤔 How does your SIEM handle ingesting custom log sources? Fed up with the time-intensive “nightmare” of onboarding unsupported log sources, Varo switched to Panther because of our easy data ingestion options. Learn how Varo uses Panther to centralize alerting and gain the visibility they need to secure their environment. Read the case study 👉 https://lnkd.in/gGFRCiPC #DetectionAsCode #SecurityEngineering #DetectionEngineering
-
Have you ever had to search for a particular string in your logs, but you don’t know what field it's in? We’ve been there too, and we know how much of a pain it is. In #PantherFlow, we made this a piece of cake. 🍰 🔍 Just invoke the "search" operator followed by your string, and PantherFlow will handle locating it in your data. For a more complex search pattern, use boolean logic or wildcards. No need to figure out the right field first. Curious how our piped query language simplifies search? Read about it in our blog 👉 https://lnkd.in/gk6cBxFg #DetectionAsCode #DetectionEngineering #SecurityEngineering
-
🔥🔥🔥 Some #gratitude coming in hot! 🏆 We want to recognize our vibrant Panther community whose contributions improve our open-source ruleset on the daily. We know the SecOps community is driven by open-source tools and standards, which is why our ruleset has been open-sourced from the start—and proudly a part of the #Sigma ecosystem. Recently, our Threat Research team started a quarterly newsletter to recognize and celebrate our contributors. 🎉 We give one lucky winner a prize for having the most impact on our ruleset. Here’s some of the great stuff we’ve seen over the ☀️ summer and 🍁 fall! ⭐ A policy that ensures valid AWS WAF logging destinations, a policy to prevent cross-service confused deputy issues on S3 buckets, and a rule that detects when EKS resources are accessed using the system:anonymous user, all submitted by Bharat Chandra P. 👏 Thank you! ⭐ An improvement to all alert titles in the Wiz Audit log detections to include the Wiz actor ⭐ Filtering out Intelsat plane wifi networks, which causes a false positive in our impossible travel rule ⭐ A new rule that alerts when a GitHub dependabot vulnerability is dismissed without being resolved. This one was submitted by Elim Ghebregzabiaher—thank you! 👏 ⭐ Correction of an alert title showing the actor instead of the target for a Slack alert ⭐ A well-documented bug report for the Crowdstrike pipeline that helped our Threat Research team quickly fix the issue To our contributors and the Panther community, our sincerest gratitude. 💙 Thank you! 💙 To everyone else, check out our open-source ruleset 👉 panther-analysis: https://lnkd.in/disJ4Cb #SecurityEngineering #DetectionAsCode #DetectionEngineering #OpenSource