Archer Analyst, Cybersecurity Engineering & Operations
Archer Integrated Risk Management
Date: 1 day ago
City: Schenectady, NY
Contract type: Full time

Job Details
Description
Archer Analyst, Cybersecurity Engineering & Operations
Location: Remote - New York
Archer is a technology company that provides Integrated Risk Management software solutions to other organizations. The Archer Platform provides a common foundation for organizations to manage IT security risk, regulatory compliance, third party/supply chain risk, and more. Non-technical users can automate processes, streamline workflow, control user access, tailor the user interface, and report in real-time using the point-and click interface to build and manage business applications. Archer has been the leading risk management software platform for over 20 years, including acquisitions by RSA, Dell, Symphony Technology Group, and Cinven who recently launched Archer as an independent business unit. https://www.archerirm.com/
Principal Responsibilities
If you need a reasonable accommodation during the application process, please contact [email protected]. All employees must be legally authorized to work in the US. Archer participates in E-Verify. Archer and its approved consultants will never ask you for a fee to process or consider your application for a career with Archer. Archer reserves the right to amend or withdraw any job posting at any time, including prior to the advertised closing date.
Description
Archer Analyst, Cybersecurity Engineering & Operations
Location: Remote - New York
Archer is a technology company that provides Integrated Risk Management software solutions to other organizations. The Archer Platform provides a common foundation for organizations to manage IT security risk, regulatory compliance, third party/supply chain risk, and more. Non-technical users can automate processes, streamline workflow, control user access, tailor the user interface, and report in real-time using the point-and click interface to build and manage business applications. Archer has been the leading risk management software platform for over 20 years, including acquisitions by RSA, Dell, Symphony Technology Group, and Cinven who recently launched Archer as an independent business unit. https://www.archerirm.com/
Principal Responsibilities
- Work is generally guided by management
- May develop cybersecurity operations trend analysis and report the results
- Works on cybersecurity problems that are low complexity, with particular emphasis on security operations
- Assists in selecting methods and techniques for identifying and advocating effective security solutions
- Supports the maintenance of tools, processes, documentation, reporting, and technologies, and defines success criteria for their effective usage
- Work is generally guided by management
- Develops and maintains detailed documentation to support cybersecurity programs
- Works on cybersecurity problems that have low to medium complexity, with particular emphasis on security operations
- Selects methods and techniques for identifying and advocating effective security solutions
- Maintains and optimizes tools, processes, documentation, reporting, and technologies, and defines success criteria for their effective usage
- Manager usually provides the problem and a high-level solution for more complicated problems
- Develops and maintains detailed documentation to support cybersecurity programs
- Works on cybersecurity problems that have medium complexity, with particular emphasis on security operations
- Selects methods and techniques for identifying and advocating effective security solutions
- Maintains and optimizes tools, processes, documentation, reporting, and technologies, and defines success criteria for their effective usage
- Participates in reviews of available tools, technologies, and processes to secure all aspects the enterprise
- Acts as the bridge between technical and non-technical contributors in cybersecurity operations discussions
- Prioritizes own work and may have duties instructing, directing, assigning and overseeing work of more junior team members
- Manager usually provides the problem for this individual to develop appropriate solutions
- Specializes in security operations in one area
- Works on cybersecurity problems that have medium to high complexity, with particular emphasis on security operations
- Selects methods and techniques for identifying and advocating effective security solutions
- Maintains and optimizes tools, processes, documentation, reporting, and technologies, and defines success criteria for their effectiveusage
- Participates in reviews of available tools, technologies, and processes to secure all aspects the enterprise
- Works with a great deal of independence, and proactively identifies complex problems and implements solutions to those problems
- Acts as a subject matter expert and local leader for cybersecurity operations; contributes directly to the development of strategy, policy, standards, and procedures
- Partners with senior management inside and outside of the organization
- Specializes in security operations in one or more areas
- Works on cybersecurity problems that have high complexity, with particular emphasis on security operations
- Selects methods and techniques for identifying and advocating effective security solutions
- Participates in reviews of available tools, technologies, and processes to secure all aspects the enterprise
- Leads cross-functional teams in support of global security operations projects and programs
- Develops solutions to extremely complex problems which may have no precedent, with particular emphasis on security operations
- Acts as subject matter expert and global thought leader for security operations, and contributes directly to the development of strategy, policy, standards, and procedures
- Serves as an advisor to senior executives both internal and external for all aspects of security operations
- Conducts or participates in ongoing assessments of emerging security operations technologies
- Provides security operations thought leadership and recommendations based on knowledge of emerging threats and trends
- Problem Solving Skills
- Good understanding of cybersecurity operations key concepts
- Collaborative work style
- Working knowledge of Microsoft Office
- Suite and ability to develop documentation or data analysis
- Good written and spoken communication Skills
- Typically requires less than 2 years of related experience in a professional role with a Bachelor's degree; or equivalent experience
- Certifications or Other Credentials Industry-standard cybersecurity certification from ISC(2), SANS, or similar entity preferred.
- Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities and activities may change at any time with or without notice at management discretion based on business need.
If you need a reasonable accommodation during the application process, please contact [email protected]. All employees must be legally authorized to work in the US. Archer participates in E-Verify. Archer and its approved consultants will never ask you for a fee to process or consider your application for a career with Archer. Archer reserves the right to amend or withdraw any job posting at any time, including prior to the advertised closing date.
How to apply
To apply for this job you need to authorize on our website. If you don't have an account yet, please register.
Post a resume