Enterprise Cloud Security Engineer

Archer Aviation
San Jose, California, United StatesPosted 23 February 2026

Job Description

<div class="content-intro"><p><span style="font-weight: 400;">Archer is an aerospace company based in San Jose, California building an all-electric vertical takeoff and landing aircraft with a mission to advance the benefits of sustainable air mobility. We are designing, manufacturing, and operating an all-electric aircraft that can carry four passengers while producing minimal noise.</span></p> <p><span style="font-weight: 400;">Our sights are set high and our problems are hard, and we believe that diversity in the workplace is what makes us smarter, drives better insights, and will ultimately lift us all to success. We are dedicated to cultivating an equitable and inclusive environment that embraces our differences, and supports and celebrates all of our team members.</span></p></div><p><strong>Enterprise Cloud Security Engineer</strong></p> <p><strong>Job Overview</strong></p> <p>We are looking for a top-tier <strong>Enterprise Cloud Security Engineer</strong> to design and secure the cloud infrastructure supporting the next phase of sustainable air mobility. You are a collaborative, hands-on professional with excellent communication skills and the ability to see the big picture. In this role, you will be responsible for securing our cloud-native environments (AWS/Azure) and ensuring that our telemetry, flight operations, and enterprise systems are protected against advanced persistent threats. You will connect DevOps and Security by incorporating "secure-by-design" principles into our Infrastructure as Code (IaC) and CI/CD pipelines, while ensuring compliance with aviation and federal standards (NIST CSF, 800-53, FedRAMP, DO-326A).</p> <p><strong>Key Responsibilities</strong></p> <ul> <li><strong>Cloud Architecture Hardening:</strong> Design, implement, and maintain secure cloud architectures across <strong>AWS</strong> and <strong>Azure</strong>. Enforce zero-trust principles and least-privilege access using advanced IAM policies and roles.</li> <li><strong>Infrastructure as Code (IaC) Security:</strong> Lead the security review and automated scanning of IaC templates (Terraform, CloudFormation, Helm). Prevent misconfigurations before they reach production.</li> <li><strong>DevSecOps Automation:</strong> Integrate security tooling (CSPM, CWPP, Secret Scanning) directly into CI/CD pipelines (Jenkins, GitLab, GitHub Actions) to enable rapid, secure deployment.</li> <li><strong>Kubernetes Container Security:</strong> Secure containerized workloads and orchestration platforms (EKS/AKS), ensuring runtime protection, image scanning, and network segmentation.</li> <li><strong>Compliance Governance:</strong> Map cloud security controls to industry frameworks, including <strong>NIST SP 800-53</strong>, <strong>ISO 27001</strong>, and aviation-specific standards like <strong>DO-326A</strong>—Automate evidence collection for audits.</li> <li><strong>Threat Detection Incident Response:</strong> Build high-fidelity detection rules for cloud threats using SIEM/SOAR platforms. Lead investigations into cloud security incidents and perform forensics on ephemeral workloads.</li> <li><strong>Telemetry Data Protection:</strong> safeguard critical flight telemetry and sensitive data pipelines through robust encryption, key management (KMS/HSM), and data loss prevention (DLP) strategies.</li> </ul> <p> </p> <p><strong>Required Qualifications</strong></p> <ul> <li><strong>Experience:</strong> 5+ years of experience in Cloud Security, DevSecOps, or Infrastructure Engineering, with at least 3 years focused on public cloud (AWS, Azure, and GCP).</li> <li><strong>Technical Mastery:</strong> Deep hands-on expertise with <strong>Terraform</strong>, <strong>Kubernetes</strong>, and <strong>Linux</strong> environments.</li> <li><strong>Coding/Scripting:</strong> Proficiency in Python, Go, or Bash for automating security tasks and building custom tooling.</li> <li><strong>Security Tooling:</strong> Experience implementing and tuning CSPM/CNAPP tools (e. ... (truncated, view full listing at source)