OT Security Engineer

icon briefcase Job Type : Full Time

Number of Applicants

 : 

000+

Click to reveal the number of candidates who applied for this job.
icon loader
icon loader

This job is no longer accepting applications.

Scroll down below to view similar jobs .

Job Description - OT Security Engineer

Role Purpose

The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.

Do

  1. Design and develop enterprise cyber security strategy and architecture
    1. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses
    2. Identify risks associated with business processes, operations,

information security programs and technology projects

  1. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge
  2. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
  3. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations
  4. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.
  5. Provide support during technical deployment, configuration, integration and administration of security technologies
  6. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.
  7. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity
  8. Provide solution of RFP’s received from clients and ensure overall design assurance
    1. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives
    2. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture
  • Depending on the client’s need with particular standards and technology stacks create complete RFPs
  1. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology
  2. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions
  3. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps
  • Evaluate and recommend solutions to integrate with overall technology ecosystem
  • Tracks industry and application trends and relates these to planning current and future IT needs
  1. Stakeholder coordination & audit assistance
    1. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations
    2. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security
    3. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements
    4. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers
    5. Provide training to employees on issues such as spam and unwanted or malicious emails

Stakeholder Interaction

Stakeholder Type

Stakeholder Identification

Purpose of Interaction

Internal

Program Manager/Director

Regular reporting & updates

Infrastructure (CIS team)

For infrastructure support

External

Customer

To coordinate for all security breaches & resolutions

Display

Lists the competencies required to perform this role effectively:

  • Functional Competencies/ Skill
    • Leveraging Technology - Knowledge of current and upcoming security technologies (e.g. Firewalls, IPS, DDoS, SIEM, WAF, Endpoint etc.) and understanding of compliance regulatory requirement like PCI DSS, HIPAA, etc.- Expert
    • Systems Thinking – Understanding of the Wipro system (interrelatedness, interdependencies and boundaries) and perform problem solving in a complex environment - Expert
    • Leveraging Technology – In-depth knowledge of and mastery over ecosystem technology that commands expert authority respect – Master
    • Technical Knowledge - Certified Information Systems Security Professional (CISSP), Cloud Architect Certification from AWS and Azure, ToGAF or SABSA certification- Master

Competency Levels

Foundation

Knowledgeable about the competency requirements. Demonstrates (in parts) frequently with minimal support and guidance.

Competent

Consistently demonstrates the full range of the competency without guidance. Extends the competency to difficult and unknown situations as well.

Expert

Applies the competency in all situations and is serves as a guide to others as well.

Master

Coaches others and builds organizational capability in the competency area. Serves as a key resource for that competency and is recognized within the entire organization.

  • Behavioral Competencies
    • Effective Communication
    • Managing Complexity
    • Client centricity
    • Technology Acumen
    • Innovation
    • Problem Solving approach
    • Collaborative Working
    • Execution Excellence

Deliver

No.

Performance Parameter

Measure

1.

Customer centricity

Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers.

2.

Support sales team to create wins

% of proposals with Quality Index  >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

JDs - Roles & Responsibilities
OT Security Engineer / Lead


• Manage operation and quality teams.
• Maintain agreed SLA.
• Review all operation and quality report.
• Present report to SABIC.
• Responsible to operation and quality team performance.
• Conduct interview for internal resources.
• Engage SABIC in Engineers and Sr. engineer interview.
• Submit enhancement recommendation to SABIC.
• Submit program plan and update including work force progress, training, documentation and quality reviews.
• Facilitate audit and investigation requirement including document preparation, site visit, one to one interview with team.
• Insure smooth operation and handover.
• Review operation team shift roster to cover 24x7 OT CyberHub operation with enough workforce to maintain SLAs.
• Escalate high priority cases to proper team.

OT SECURITY

Original job OT Security Engineer posted on GrabJobs ©. To flag any issues with this job please use the Report Job button on GrabJobs.

This job is no longer accepting applications.

Scroll down below to view similar jobs .

Share this job with your friends

icon get direction How to get there?

icon geo-alt Jubail

icon get direction How to get there?
View similar Technology jobs below

Similar Jobs in Saudi Arabia

Share this job with your friends

💰

Browse the Top Paying Jobs Technology Salaries

GrabJobs is the no1 job portal in Saudi Arabia, connecting you to thousands of jobs fast! Find the best jobs in Saudi Arabia, apply in 1 click and get a job today!

Mobile Apps

Copyright © 2024 Grabjobs Pte.Ltd. All Rights Reserved.