Senior Security Analyst
Archer is an aerospace company based in San Jose, California building an all-electric vertical takeoff and landing aircraft with a mission to advance the benefits of sustainable air mobility. We are designing, manufacturing, and operating an all-electric aircraft that can carry four passengers while producing minimal noise.
Our sights are set high and our problems are hard, and we believe that diversity in the workplace is what makes us smarter, drives better insights, and will ultimately lift us all to success. We are dedicated to cultivating an equitable and inclusive environment that embraces our differences, and supports and celebrates all of our team members.
What you will do:
- Design and Implement SOC Platform: Architect, configure, and optimize SIEM and SOAR solutions as the core of the new SOC platform.
- Monitor and Analyze Security Events: Utilize SIEM and SOAR platforms to detect, analyze, and respond to security incidents in real time.
- Incident Investigation and Response: Lead investigations into complex security alerts, perform forensic analysis, and drive remediation efforts.
- Content Development and Optimization: Develop, refine, and maintain SIEM and SOAR content, including detection rules, correlation searches, alerts, dashboards, and automated playbooks.
- Threat Hunting: Conduct proactive threat hunting using SIEM, SOAR, and EDR tools, leveraging threat intelligence to identify and mitigate risks.
- Automation and Orchestration: Design and implement automated workflows and scripts to streamline incident response and security operations.
- Collaboration: Work closely with IT, security, and business teams to enhance threat detection and response strategies.
- Documentation: Develop and maintain incident response playbooks, checklists, and detailed incident reports for technical and executive stakeholders.
- Continuous Improvement: Stay current with evolving threat landscapes, security technologies, and best practices to enhance SOC capabilities
Required Qualifications
- Education: Bachelor's degree in Computer Science, Information Security, or a related field, or equivalent experience.
- Experience: 5+ years of hands-on experience in security operations, incident response, or threat hunting, with deep expertise in SIEM and SOAR platforms.
- Technical Skills:
- Expert knowledge of SIEM (e.g., Splunk, Microsoft Sentinel, QRadar, Chronicle) and SOAR (e.g., Palo Alto Cortex XSOAR, IBM Resilient) solutions.
- Proficiency in scripting languages such as Python, PowerShell, or Bash for automation and analysis.
- Strong understanding of network protocols, endpoint security, and common attack vectors.
- Experience with EDR/XDR solutions and forensic toolsets.
- Certifications: Relevant certifications such as CISSP, GCIH, GCFA, or equivalent are preferred.
- Soft Skills: Excellent analytical, problem-solving, and communication skills; ability to thrive under pressure and translate technical findings for non-technical audiences.
Desirable Skills
- Cloud Security: Familiarity with security practices in public cloud environments (AWS, Azure, GCP).
- Threat Intelligence: Experience leveraging threat intelligence feeds and frameworks such as MITRE ATT&CK or Cyber Kill Chain.
- Data Analytics: Knowledge of data analytics and visualization tools for detecting patterns and anomalies.
Please note that this job description is intended to provide a general overview of the position and does not include an exhaustive list of responsibilities and qualifications
At Archer we aim to attract, retain, and motivate talent that possess the skills and leadership necessary to grow our business. We drive a pay-for-performance culture and reward performance that supports the Company's business strategy. For this position we are targeting a base pay between $134,400 - $168,000. Actual compensation offered will be determined by factors such as job-related knowledge, skills, and experience.