Senior Security Analyst

San Jose, California, United States

Archer

Archer is designing and developing electric vertical takeoff and landing (eVTOL) aircraft for use in urban air mobility networks. Archer’s mission is to unlock the skies, freeing everyone to reimagine how they move and spend time. Archer's team...

View all jobs at Archer

Apply now Apply later

Archer is an aerospace company based in San Jose, California building an all-electric vertical takeoff and landing aircraft with a mission to advance the benefits of sustainable air mobility. We are designing, manufacturing, and operating an all-electric aircraft that can carry four passengers while producing minimal noise.

Our sights are set high and our problems are hard, and we believe that diversity in the workplace is what makes us smarter, drives better insights, and will ultimately lift us all to success. We are dedicated to cultivating an equitable and inclusive environment that embraces our differences, and supports and celebrates all of our team members.

What you will do:

  • Design and Implement SOC Platform: Architect, configure, and optimize SIEM and SOAR solutions as the core of the new SOC platform.
  • Monitor and Analyze Security Events: Utilize SIEM and SOAR platforms to detect, analyze, and respond to security incidents in real time.
  • Incident Investigation and Response: Lead investigations into complex security alerts, perform forensic analysis, and drive remediation efforts.
  • Content Development and Optimization: Develop, refine, and maintain SIEM and SOAR content, including detection rules, correlation searches, alerts, dashboards, and automated playbooks.
  • Threat Hunting: Conduct proactive threat hunting using SIEM, SOAR, and EDR tools, leveraging threat intelligence to identify and mitigate risks.
  • Automation and Orchestration: Design and implement automated workflows and scripts to streamline incident response and security operations.
  • Collaboration: Work closely with IT, security, and business teams to enhance threat detection and response strategies.
  • Documentation: Develop and maintain incident response playbooks, checklists, and detailed incident reports for technical and executive stakeholders.
  • Continuous Improvement: Stay current with evolving threat landscapes, security technologies, and best practices to enhance SOC capabilities

Required Qualifications

  • Education: Bachelor’s degree in Computer Science, Information Security, or a related field, or equivalent experience.
  • Experience: 5+ years of hands-on experience in security operations, incident response, or threat hunting, with deep expertise in SIEM and SOAR platforms.
  • Technical Skills:
    • Expert knowledge of SIEM (e.g., Splunk, Microsoft Sentinel, QRadar, Chronicle) and SOAR (e.g., Palo Alto Cortex XSOAR, IBM Resilient) solutions.
    • Proficiency in scripting languages such as Python, PowerShell, or Bash for automation and analysis.
    • Strong understanding of network protocols, endpoint security, and common attack vectors.
    • Experience with EDR/XDR solutions and forensic toolsets.
  • Certifications: Relevant certifications such as CISSP, GCIH, GCFA, or equivalent are preferred.
  • Soft Skills: Excellent analytical, problem-solving, and communication skills; ability to thrive under pressure and translate technical findings for non-technical audiences.

Desirable Skills

  • Cloud Security: Familiarity with security practices in public cloud environments (AWS, Azure, GCP).
  • Threat Intelligence: Experience leveraging threat intelligence feeds and frameworks such as MITRE ATT&CK or Cyber Kill Chain.
  • Data Analytics: Knowledge of data analytics and visualization tools for detecting patterns and anomalies.

Please note that this job description is intended to provide a general overview of the position and does not include an exhaustive list of responsibilities and qualifications

At Archer we aim to attract, retain, and motivate talent that possess the skills and leadership necessary to grow our business. We drive a pay-for-performance culture and reward performance that supports the Company’s business strategy. For this position we are targeting a base pay between $134,400 - $168,000. Actual compensation offered will be determined by factors such as job-related knowledge, skills, and experience.

Archer is committed to working with and providing reasonable accommodations to job applicants with physical or mental disabilities, and those with sincerely held religious beliefs. Applicants who may require reasonable accommodation for any part of the application or hiring process should provide their name and contact information to Archer’s People Team at people@archer.com. Reasonable accommodations will be determined on a case-by-case basis.

 

Information collected and processed as part of any job applications you choose to submit is subject to Archer's Candidate Privacy Policy.
Archer is unable to provide work visa sponsorship for this position at the present time.
Archer is proud to be an Equal Opportunity employer committed to diversity and inclusivity in the workplace. All aspects of employment are decided on the basis of merit, qualifications, and business needs. We do not discriminate based upon race, color, religion, sex, sexual orientation, age, national origin, disability status, protected veteran status, gender identity or any other characteristic protected by federal, state or local laws.
Archer Aviation does not engage with external recruiting agencies/individual recruiters with whom it does not have a prior written agreement. Archer reserves the right to make use of any unsolicited resumes that it receives and bears no responsibility for payment of any fees asserted from the use of unsolicited resumes. If you are a recruiting agency or individual recruiter wishing to do business with Archer, please reach out to People@archer.com. All employment processes are managed by the Archer People Team.
Apply now Apply later
Job stats:  1  0  0
Category: Analyst Jobs

Tags: Analytics Automation AWS Azure Bash CISSP Cloud Computer Science Cyber Kill Chain Data Analytics EDR Endpoint security GCFA GCIH GCP Incident response MITRE ATT&CK PowerShell Privacy Python QRadar Scripting Sentinel SIEM SOAR SOC Splunk Strategy Threat detection Threat intelligence XDR XSOAR

Perks/benefits: Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.