Archer Platform / Application Security Analyst, Cybersecurity Engineering & Operations

Other Jobs To Apply

No other job posts for this day.

Archer Platform / Application Security Analyst, Cybersecurity Engineering & Operations

Location: Remote - United States

Archer is a technology company that provides Integrated Risk Management software solutions to other organizations. The Archer Platform provides a common foundation for organizations to manage IT security risk, regulatory compliance, third party/supply chain risk, and more. Non-technical users can automate processes, streamline workflow, control user access, tailor the user interface, and report in real-time using the point-and click interface to build and manage business applications. Archer has been the leading risk management software platform for over 20 years, including acquisitions by RSA, Dell, Symphony Technology Group, and Cinven who recently launched Archer as an independent business unit.

Archer is seeking a Platform/Application Security Analyst to support our cybersecurity team. This role is ideal for candidates with knowledge in cybersecurity operations and code development who are looking to grow their technical and analytical skills in a collaborative, fast-paced environment. The individual will support the day-to-day work of Archer's Platform and Application Security team. Under guidance from management, this role involves analyzing and making security recommendations for internal software development based on current cybersecurity trends, maintaining tools and processes, and assisting in identifying effective security solutions. The ideal candidate is a detail-oriented, curious, and effective at establishing cross functional team collaboration to maintain and improve the overall security of our platform and products.

Principal Responsibilities:

  • Possess strong skills as an application developer with a security focus for SAAS cloud platforms and on-prem software solutions
  • Develop cybersecurity operations trend analysis and report the results from security tooling such as SAST and DAST.
  • Works on cybersecurity problems such as penetration test results, secure application development guidance, and the ability to analyze security related tasks and issues.
  • Assists in selecting methods and techniques for identifying and advocating effective security solutions
  • Develops and maintains detailed documentation to support cybersecurity programs
  • Selects methods and techniques for identifying and advocating effective security solutions
  • Maintains and optimizes tools, processes, documentation, reporting, and technologies, and defines success criteria for their effective usage
  • Participates in review meetings while leveraging available tools and development technologies/techniques to provide appropriate security guidance
  • Acts as the bridge between technical and non-technical contributors in cybersecurity discussions
  • Successfully prioritizes own work while being flexible in the types of security issues that may arise and require analysis and guidance.
  • Works independently, and proactively identifies complex problems and implements solutions to those problems
  • Acts as a subject matter expert and local leader for cybersecurity issues; contributes directly to the development of strategy, policy, standards, and procedures
  • Partners with senior management inside and outside of the organization
  • Participates in reviews of available tools, technologies, and processes to secure all aspects the enterprise
  • Leads cross-functional teams in support of global security operations projects and programs
  • Develops solutions to complex problems which may have no precedent, with particular emphasis on security operations
  • Serves as an advisor to senior executives both internal and external for all aspects of security operations
  • Conducts or participates in ongoing assessments of emerging security operations technologies
  • Provides security thought leadership and recommendations based on knowledge of emerging threats and trends

Skills:

  • Secure Coding Practices
    • Understanding of OWASP Top 10 (e.g., SQLi, XSS, CSRF, SSRF).
    • Knowledge of secure development.
  • Application Security Testing
    • SAST (Static Application Security Testing) – Tools like SonarQube, Checkmarx, Fortify.
    • DAST (Dynamic Application Security Testing) – Tools like Burp Suite, OWASP ZAP, Nessus.
    • SCA (Software Composition Analysis) – Tools like Snyk, Dependency-Check.
  • Cloud & Platform Security
    • AWS/Azure/GCP security best practices (IAM, CSPM, KMS, WAF).
    • Container security (Docker, Kubernetes, CIS benchmarks).
  • Threat Modeling & Risk Assessment
    • Familiarity with STRIDE, DREAD, MITRE ATT&CK.
    • Experience with threat modeling tools.
  • Vulnerability Management
    • CVSS scoring, patch prioritization, remediation workflows.
    • Familiarity with Qualys, Tenable, Rapid7 InsightVM.
  • Identity & Access Management (IAM)
    • OAuth 2.0, OpenID Connect (OIDC), SAML, RBAC/ABAC.
    • Zero Trust Architecture (ZTA) principles.
  • DevSecOps & Automation
    • CI/CD pipeline security (GitHub Actions, GitLab CI, Jenkins).
    • Infrastructure as Code (IaC) scanning (Terraform, Ansible).

Programming & Scripting Skills:

  • Languages: Python, .NET, JavaScript (Node.js), Java, Go, or PowerShell.
  • Scripting for Automation: Writing security tools or integrating APIs.
  • Web/API Security: Understanding of REST, .NET, and other security risks.

Soft Skills:

  • Communication: Explaining risks to developers/executives in non-technical terms.
  • Problem-Solving: Reverse engineering attacks, log analysis, forensic triage.
  • Collaboration: Working with DevOps, developers, and compliance teams.
  • Continuous Learning: Keeping up with emerging threats (e.g., AI-driven attacks).

Certifications (Optional but Helpful):

  • Offensive Security: OSCP, eWPT (for penetration testing skills).
  • Defensive Security: CISSP, CEH, CompTIA Security+.
  • Cloud Security: AWS Certified Security Specialty, CCSK, CCSP.
  • AppSec: GWEB, CSSLP.

Education and Experience:

  • Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or a related field.
  • 1-5 years of related industry application development and cybersecurity experience in a cloud environment.

Other Duties:

  • Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice at management discretion based on business need.

About Archer’s Culture and Work Environment:

Our people, team collaboration and dynamic leadership is the centerpiece of our great culture and the reason for Archer’s 25 years of success. Over the years, many companies and global organizations have been faced with tough decisions. Layoffs, reorganizations, acquisitions, and mergers. Yet, throughout these challenging times, Archer has exemplified strong innovation and growth and a commitment to our employees.
Why is this possible? Collaboration is the key to our success. It inspires great innovation and innovative ideas. It is why Archer's is a household name in the GRC space. Companies, from F500 – F1000, come to Archer first - for our thought leadership and for our ability to meet customers where they are.
As we continue to grow and evolve, our focus will remain the same: continue innovating, support our customers and employees and continue driving the risk management industry to new levels.


Archer is committed to the principle of equal employment opportunity for all employees and applicants for employment and to providing employees with a work environment free of discrimination and harassment. All employment decisions at Archer are based on business needs, job requirements and individual qualifications, without regard to race, color, religion, national origin, sex (including pregnancy), age, disability, sexual orientation, gender identity and/or expression, marital, civil union or domestic partnership status, protected veteran status, genetic information, or any other characteristic protected by federal, state or local laws. Archer will not tolerate discrimination or harassment based on any of these characteristics. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. All Archer employees are expected to support this policy and contribute to an environment of equal opportunity.

If you need a reasonable accommodation during the application process, please contact talent-acquisition@archerirm.com. All employees must be legally authorized to work in the US. Archer participates in E-Verify. Archer and its approved consultants will never ask you for a fee to process or consider your application for a career with Archer. Archer reserves the right to amend or withdraw any job posting at any time, including prior to the advertised closing date.

Equal Opportunity Employer
This employer is required to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the Know Your Rights notice from the Department of Labor.

Back to blog

Common Interview Questions And Answers

1. HOW DO YOU PLAN YOUR DAY?

This is what this question poses: When do you focus and start working seriously? What are the hours you work optimally? Are you a night owl? A morning bird? Remote teams can be made up of people working on different shifts and around the world, so you won't necessarily be stuck in the 9-5 schedule if it's not for you...

2. HOW DO YOU USE THE DIFFERENT COMMUNICATION TOOLS IN DIFFERENT SITUATIONS?

When you're working on a remote team, there's no way to chat in the hallway between meetings or catch up on the latest project during an office carpool. Therefore, virtual communication will be absolutely essential to get your work done...

3. WHAT IS "WORKING REMOTE" REALLY FOR YOU?

Many people want to work remotely because of the flexibility it allows. You can work anywhere and at any time of the day...

4. WHAT DO YOU NEED IN YOUR PHYSICAL WORKSPACE TO SUCCEED IN YOUR WORK?

With this question, companies are looking to see what equipment they may need to provide you with and to verify how aware you are of what remote working could mean for you physically and logistically...

5. HOW DO YOU PROCESS INFORMATION?

Several years ago, I was working in a team to plan a big event. My supervisor made us all work as a team before the big day. One of our activities has been to find out how each of us processes information...

6. HOW DO YOU MANAGE THE CALENDAR AND THE PROGRAM? WHICH APPLICATIONS / SYSTEM DO YOU USE?

Or you may receive even more specific questions, such as: What's on your calendar? Do you plan blocks of time to do certain types of work? Do you have an open calendar that everyone can see?...

7. HOW DO YOU ORGANIZE FILES, LINKS, AND TABS ON YOUR COMPUTER?

Just like your schedule, how you track files and other information is very important. After all, everything is digital!...

8. HOW TO PRIORITIZE WORK?

The day I watched Marie Forleo's film separating the important from the urgent, my life changed. Not all remote jobs start fast, but most of them are...

9. HOW DO YOU PREPARE FOR A MEETING AND PREPARE A MEETING? WHAT DO YOU SEE HAPPENING DURING THE MEETING?

Just as communication is essential when working remotely, so is organization. Because you won't have those opportunities in the elevator or a casual conversation in the lunchroom, you should take advantage of the little time you have in a video or phone conference...

10. HOW DO YOU USE TECHNOLOGY ON A DAILY BASIS, IN YOUR WORK AND FOR YOUR PLEASURE?

This is a great question because it shows your comfort level with technology, which is very important for a remote worker because you will be working with technology over time...