Our client has a long term contract opening for a Security Architect with background in operational technology.
JOB SUMMARY:
Under general supervision, the Senior Information Security Architect (Operational Technology)) is responsible for designing and maintaining secure OT/SCADA networks, ensuring effective segmentation and secure communication within critical systems. This role involves developing and implementing cybersecurity policies, procedures, and guidelines in line with industry standards like IEC 62443, NIST SP 800-82, and NERC-CIP, while ensuring compliance with regulatory requirements. The architect will conduct risk assessments, threat modeling, and vulnerability management to enhance OT/SCADA security, prioritizing risk mitigation strategies that maintain operational continuity.
ESSENTIAL JOB FUNCTIONS:
- Architect and oversee the design and support of secure OT/SCADA networks ensuring proper segmentation between OT/SCADA and IT environments. Ensure redundancy, resiliency, and secure communication protocols within critical SCADA/ICS systems.
- Create and maintain cybersecurity policies, procedures, and guidelines that are specific to OT/SCADA systems, aligning with industry standards IEC 62443, NIST SP 800-82, and NERC-CIP. Ensure all OT/SCADA systems comply with local, state, and federal regulations and align with best practices for critical infrastructure protection.
- Conduct risk assessments and threat modeling exercises specific to the WU OT/SCADA environment.
- Identify vulnerabilities in OT/SCADA systems, prioritize remediation efforts, and implement mitigation strategies to reduce risk without disrupting operations.
OTHER JOB FUNCTIONS:
- Architect secure remote access solutions and identity management protocols for OT/SCADA systems, enforcing multi-factor authentication (MFA) and role-based access controls (RBAC).
- Implement strong access controls to limit OT/SCADA system access to authorized personnel only.
- Develop and manage incident response plans tailored to the OT/SCADA environment, coordinating recovery efforts in case of security breaches or attacks on critical systems.
- Ensure disaster recovery and operational continuity plans are in place and tested regularly to minimize systems downtime in case of a cybersecurity incident.
MINIMUM QUALIFICATIONS:
Knowledge, Skills and Abilities Required:
- Knowledge of the architecture, components, and security challenges of industrial control systems.
- Knowledge of how OT protocols work (e.g., Modbus, DNP3, IEC 61850) and how to secure data transmission.
- Knowledge and hands-on experience developing and managing incident response strategies tailored to OT systems, ensuring operational continuity during cybersecurity events.
- Knowledge of securely integrating OT systems with cloud services, managing risks, and ensuring secure data transmission.
- Knowledge of understanding and the application of identity and access management (IAM) practices designed for OT environments, including alignment with industry standards and operational needs.
- Knowledge of understanding and applying security standards like IEC 62443, NERC-CIP, and NIST SP 800-82 to ensure compliance with industry and government regulations. Implementing and overseeing audit-ready security processes which align with regulatory requirements.
- Skill in applying security hardening techniques to ICS/SCADA devices, including secure configurations, removing default credentials, and disabling unnecessary services.
- Skill in developing safe and effective patch management strategies that minimize disruption to OT systems while ensuring vulnerabilities are addressed.
- Skill in gathering, analyzing, and responding to cybersecurity incidents in OT environments without compromising the operational integrity of critical systems.
- Skill in implementing role-based access control (RBAC), multi-factor authentication (MFA), and secure remote access solutions specifically for OT personnel.
- Skill in communication to facilitate collaboration between IT and OT teams, ensuring alignment on security objectives without compromising operations.
- Skill in applying encryption and other secure communication methods between OT devices and systems.
- Skill in designing and implementing segmented OT networks, ensuring proper isolation between IT and OT environments.
- Skill in applying layered security principles to protect OT environments from internal and external threats.
- Ability to communicate complex cybersecurity issues in simple terms for non-technical stakeholders, including OT engineers, operations staff, and management.
- Ability to evaluate operational impact and address unique characteristics of ICS/SCADA environments.
- Ability to identify, prioritize, and mitigate vulnerabilities in ICS/SCADA systems, including expertise in managing patching or updates while minimizing disruption to critical operations.
- Ability to manage relationships with vendors and external consultants, ensuring their solutions align with internal security strategies and OT requirements.
- Ability to lead security initiatives and guide cross-functional teams toward implementing security policies, frameworks, and architectures.
- Ability to evaluate risks and make informed decisions, balancing security requirements with operational needs.
- Ability to safely operate a vehicle.
Qualifying Education and Experience:
- Bachelor’s degree
- Three (3) to five (5) years in cybersecurity roles focused on securing critical infrastructure for ICS/SCADA or other OT environments (e.g., water utilities, energy, manufacturing) securing critical infrastructure.
- Two (2) to three (3) years of experience managing security projects in an OT setting, coordinating between IT, OT, and network engineering teams.
- Or an equivalent combination of education and experience.
- Must possess a valid Class C Texas driver license.
PREFERRED QUALIFICATIONS
Preferred Education and Experience:
- Experience conducting risk assessments specific to OT systems. Adaptability in working with dynamic, changing OT environments where new technologies and security requirements may rapidly emerge.
- Experience with OT-specific security monitoring tools such as Dragos, Nozomi Networks, or Claroty to detect and respond to threats in real-time. Configuring and managing OT anomaly detection tools to identify unusual activity which may indicate a cybersecurity threat.
- Experience working with multidisciplinary teams, including OT engineers, IT security staff, and operational staff, to ensure security measures are practical and support operational goals.
- Flexibility in implementing security measures that respect the constraints of OT systems and operations, ensuring security initiatives do not impede processes.
Employment Screenings Required:
• Criminal Background Check
• Drug & Alcohol Testing
• Motor Vehicle Review Record (MVR