Information and Data are some of the most important organisational assets in todayโs businesses. As a Security Consultant you will be a key advisor for IBMโs clients analysing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organisation with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.
Job Role and Responsibility:
As a Senior Cybersecurity OT Specialist you will be a subject matter expert responsible for the cybersecurity posture of our operational technology environment. You will lead the development and implementation of OT security policies procedures and technical controls. Your expertise will be crucial in identifying and mitigating risks specific to ICS ensuring the continuity and safety of our operations.
Responsibilities and Duties:
ยทย ย ย ย ย ย Develop implement and maintain OT cybersecurity policies standards and procedures in alignment with industry best practices and regulatory requirements.
ยทย ย ย ย ย ย Conduct risk assessments and vulnerability assessments of OT systems and infrastructure.
ยทย ย ย ย ย ย Design and implement security controls for ICS including network segmentation intrusion detection/prevention systems (IDS/IPS) firewalls and endpoint protection tailored for OT environments.
ยทย ย ย ย ย ย Monitor OT security systems and analyze security events to detect and respond to potential threats.
ยทย ย ย ย ย ย Collaborate with OT engineers and vendors to ensure security is integrated throughout the lifecycle of OT systems.
ยทย ย ย ย ย ย Develop and deliver cybersecurity awareness training for OT personnel.
ยทย ย ย ย ย ย Participate in incident response activities for OT security incidents including investigation containment and remediation.
ยทย ย ย ย ย ย Stay up-to-date on the latest OT security threats vulnerabilities and mitigation techniques.
ยทย ย ย ย ย ย Evaluate and recommend security technologies and solutions specific to OT environments.
ยทย ย ย ย ย ย Contribute to the development and maintenance of OT network architecture diagrams and security documentation.
ยทย ย ย ย ย ย Participate in audits and assessments to ensure compliance with OT security standards and regulations.
ยทย ย ย ย ย ย Provide technical guidance and mentorship to junior team members on OT security matters.
Required Professional and Technical Expertise:
ยทย ย ย ย ย ย Extensive experience (typically 5+ years) in cybersecurity with a significant focus on Operational Technology (OT) or Industrial Control Systems (ICS) security.
ยทย ย ย ย ย ย Deep understanding of ICS protocols (e.g. Modbus DNP3 Profinet) architectures (e.g. Purdue Model) and communication methodologies.
ยทย ย ย ย ย ย Hands-on experience with OT security technologies such as industrial firewalls intrusion detection systems secure remote access solutions and endpoint security for OT.
ยทย ย ย ย ย ย Strong knowledge of network security principles and practices including TCP/IP routing switching and network segmentation.
ยทย ย ย ย ย ย Experience with security frameworks and standards relevant to OT (e.g. IEC 62443 NIST SP 800-82).
ยทย ย ย ย ย ย Familiarity with industrial control system vendors and their security considerations (e.g. Siemens Rockwell Automation Schneider Electric).
ยทย ย ย ย ย ย Strong analytical and problem-solving skills with the ability to diagnose and resolve complex security issues in OT environments.
ยทย ย ย ย ย ย Excellent communication and interpersonal skills with the ability to effectively communicate technical information to both technical and non-technical audiences including OT personnel.
ยทย ย ย ย ย ย Extensive experience (typically 5+ years) in architecture designs
ยทย ย ย ย ย ย Experience in risk assessment and remediation.
Preferred Professional and Technical Expertise:
ยทย ย ย ย ย ย Relevant certifications such as GICSP (Global Industrial Cyber Security Professional) GRID (GIAC Response and Industrial Defense) or ISA/IEC 62443 Cybersecurity Expert.
ยทย ย ย ย ย ย Experience with security monitoring and logging tools in OT environments.
ยทย ย ย ย ย ย Knowledge of virtualization technologies and their secure implementation in OT.
ยทย ย ย ย ย ย Experience with risk assessment methodologies specific to OT environments (e.g. HAZOP BowTie).
ยทย ย ย ย ย ย Familiarity with regulatory requirements for critical infrastructure (e.g. SOCI Act in Australia).
ยทย ย ย ย ย ย Experience with secure development lifecycle (SDL) principles as applied to OT systems.
ยทย ย ย ย ย ย Knowledge of OT asset management and inventory practices.
ยทย ย ย ย ย ย Experience in developing and implementing security awareness programs tailored for OT personnel.
ยทย ย ย ย ย ย Familiarity with cloud-based security solutions for OT environments.