Negotiable
Undetermined
Hybrid
Coventry, England, United Kingdom
Summary: The role of OT Security Architect involves designing and implementing cybersecurity solutions specifically for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The position requires extensive experience in cybersecurity frameworks and protocols, as well as the ability to define and enforce security policies. The architect will also be responsible for deploying security platforms and conducting vulnerability assessments across global sites. This is a long-term contract position based in Coventry, England, with a hybrid working arrangement.
Key Responsibilities:
- Designing and implementing technical solutions for asset discovery and OT cybersecurity.
- Defining and implementing OT-specific security policies and monitoring rules within Nozomi.
- Deploying OT Security (Nozomi)/IDS platform across global sites.
- Providing implementation support and reporting for ICS security using tools like SIEM.
- Testing OT security use cases.
Key Skills:
- 10+ years of experience in cybersecurity.
- Expertise in designing and implementing ICS/OT network architectures.
- Knowledge of cybersecurity frameworks for ICS/OT environments (NIST SP 800-82, IEC 62443).
- Familiarity with OT network communication protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104).
- Experience with Information Event Management (SIEM).
Salary (Rate): undetermined
City: Coventry
Country: United Kingdom
Working Arrangements: hybrid
IR35 Status: undetermined
Seniority Level: undetermined
Industry: IT
OT/IOT Security SME Coventry, England - Hybrid Long-term Contract 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and IEC 62443, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM).
Key Responsibilities:
- Designing and implementing technical solutions for asset discovery, OT cyber security, vulnerability assessment tools
- Define and implement OT-specific security policies and monitoring rules within Nozomi to detect anomalies, threats and compliance violations.
- Deploy OT Security (Nozomi)/IDS platform across global sites.
- Implementation support & reporting for ICS security with help of tools like SIEM
- Test the OT security use cases.