Please let Archer know you found this job on Work in Green. This will help us grow!
Employment type:
Full time
Experience required:
Senior
Salary
Salary not provided
About the company:
Archer is an aerospace company based in San Jose, California building an all-electric vertical takeoff and landing aircraft with a mission to advance the benefits of sustainable air mobility. We are designing, manufacturing, and operating an all-electric aircraft that can carry four passengers while producing minimal noise.
Our sights are set high and our problems are hard, and we believe that diversity in the workplace is what makes us smarter, drives better insights, and will ultimately lift us all to success. We are dedicated to cultivating an equitable and inclusive environment that embraces our differences, and supports and celebrates all of our team members.
We are seeking a Sr. Staff Vulnerability & AI Security Engineer to architect and lead Archer’s enterprise vulnerability management strategy while establishing technical, secure guardrails for AI adoption. Reporting directly to the CISO, you will serve as a technical principal and "player-coach," owning the end-to-end vulnerability lifecycle across cloud, endpoints, applications, and identity.
This is a high-influence, high-execution role. You will move between high-level strategy and deep-dive engineering, partnering with teams to drive measurable risk reduction through automation, rigorous prioritization, and disciplined remediation. You will operationalize modern approaches such as attack surface management and AI-assisted detection while ensuring our security posture meets the high bar of aerospace compliance (NIST SP 800-171, CMMC, ITAR).
Architect Enterprise Strategy: Design and own the end-to-end vulnerability management architecture—from discovery and coverage to automated validation and executive reporting.
Risk-Based Prioritization: Establish a sophisticated prioritization model that integrates asset criticality, threat intelligence, and exploitability to ensure engineering teams focus on the "critical few" over the "noisy many."
Technical AI Governance: Lead the technical implementation of AI security; design and deploy guardrails for GenAI usage, detect "Shadow AI," and build technical controls to prevent IP leakage into public LLMs.
Attack Surface Engineering: Partner with Cloud and Infrastructure teams to integrate CNAPP/CSPM findings and build automated workflows that reduce configuration-driven exposure in AWS/Azure.
Shift-Left Leadership: Drive DevSecOps excellence by embedding SAST/DAST/SCA and secrets scanning into CI/CD pipelines, preventing vulnerabilities from reaching production.
Metrics & Storytelling: Define and operationalize technical KPIs (MTTR, risk burn-down, coverage) that translate raw technical data into business risk for executive leadership.
Tactical Response: Lead high-severity vulnerability response efforts, providing technical validation, containment strategies, and verification of remediation.
Technical Mentorship: Act as a "multiplier" by setting engineering standards, mentoring security analysts, and leading cross-functional remediation initiatives through technical influence rather than just authority.
8+ years of security engineering experience with a heavy focus on vulnerability management, AppSec, or cloud security.
Staff-Level Influence: Proven track record of leading complex, enterprise-wide security programs and driving technical change across diverse engineering organizations.
Cloud Depth: Strong hands-on experience in AWS, GCP, or Azure, specifically regarding identity, secure configuration, and automated telemetry.
Tooling Mastery: Deep expertise in the modern security stack (SAST/DAST/SCA, scanners, and automated ticketing workflows).
Regulatory Fluency: Practical understanding of how vulnerability evidence supports compliance in regulated environments (NIST SP 800-171, CMMC Level 2, ITAR).
Communication: Exceptional ability to translate a complex CVE into a business risk narrative for non-technical stakeholders.
AI Security Practitioner: Experience implementing technical enforcement (not just policy) for AI usage and data leakage prevention.
Automation Specialist: Experience building automated triage and enrichment workflows to reduce "security friction" for developers.
Aerospace/Defense Background: Prior experience in high-stakes, auditable environments where "checkbox security" isn't an option.
Shifted the Tone: Removed "Head of" language in favor of terms like "Technical Principal," "Architect," and "High-influence individual contributor."
Focused on "The How": Instead of just "managing a program," the focus is now on "designing and deploying" the architecture of that program.
Influence vs. Authority: Emphasized the ability to drive change through technical merit and cross-functional partnership, which is the hallmark of a Staff-level engineer
Please note that this job description is intended to provide a general overview of the position and does not include an exhaustive list of responsibilities and qualifications
At Archer, we aim to attract, retain, and motivate talent with the skills and leadership needed to grow our business. We drive a pay-for-performance culture and reward performance that supports the Company’s strategy. For this position, we are targeting a base pay range of $182,500 - $240,900. Actual compensation offered will be determined by job-related knowledge, skills, and experience.
These are some of our top picks for great climate jobs on Work in Green.
Archer is hiring Staff Battery Controls Integration Engineer - (SJ2026AJ),Electric Engine Software Engineer - (SJ2026AT),Staff Network Engineer, and more.