The Operational Technology (OT) Security Architect is an exciting role and opportunity to be part of a well-established Enterprise Security team. You will lead in the design, implementation and troubleshooting of operational technology and information technology security solutions across a variety of technical platforms, data networks and security domains. The solutions involved underpin the organisation’s corporate, market and power system operational functions.
Your expertise will play a crucial role in safeguarding our critical infrastructure from cyber threats and ensuring the continuous operation of our OT and IT environments.
Design and Architecture:
Develop and implement secure OT and IT system architectures, considering industry best practices, regulatory requirements, and business needs.
Security Implementation:
Implement robust security controls, policies, and procedures to protect OT and IT systems against unauthorised access, data breaches, and cyber threats.
Threat Management and Incident Response:
Develop incident response plans and procedures for OT and IT environments.
Coordinate with incident response teams to investigate and mitigate security incidents, minimizing impact and downtime.
Security Governance and Compliance:
Stay up-to-date with emerging OT and IT security threats, vulnerabilities, and best practices.
Ensure compliance with relevant industry standards, regulations, and frameworks such as NIST CSF, IEC 62443, and ISO 27001.Documentation and Reporting:
Create comprehensive documentation of OT and IT system architectures, security controls, and incident response procedures.
Generate regular reports on security posture, vulnerabilities, and remediation progress.
About You
Successful candidates will have:
Bachelor's or Master's degree in Computer Science, Information Security, or a related field.
Extensive experience in designing and securing IT and OT environments, including industrial control systems (ICS), SCADA, and related technologies.
In-depth knowledge of OT security frameworks, standards, and best practices.
Proficiency in security technologies, including firewalls, IDPS, SIEM, and endpoint protection systems.
Familiarity with network protocols, routing, and switching in OT environments.
Strong understanding of risk assessment methodologies and threat modelling techniques.
Relevant certifications such as CISSP, GICSP, OSCP, or CISM are highly desirable.
Excellent problem-solving skills and the ability to analyse complex security issues.
Effective communication skills to convey technical concepts to both technical and non-technical stakeholders.
Familiarity with cyber security frameworks (e.g. NIST) and standards (e.g. ISO 27001).