Operational Technology Consultant (OT Infrastructure) – Saudi

Full time in IT, Technology
Email Job
  • Share:

Job Detail

  • Job Reference IDINS-64149
  • Career Level Experienced Professional
  • Industry IT, Software & Internet Services
  • Nationality Default

Operational Technology Consultant (OT Infrastructure):

Role:
• Understand various industrial control systems and their purpose, application, function, and
dependencies on network IP and industrial communications.
• Work with control network infrastructure design (network architecture concepts, including
topology, protocols, and components) and their relation to IEC 62443 and the Purdue
Model.
• Run Windows and Linux command line tools to analyze the system looking for high-risk
items and basic scripting to automate the running of programs to perform continuous
monitoring of various tools.
• Operating Systems administration (system administration concepts for Unix/Linux and/or
Windows operating systems).
• Aware of ICS systems’ security lifecycle.
• Better understand information assurance principles and tenets (confidentiality, integrity,
availability, authentication, non-repudiation).
• Support on incident response and handling.
• Map different ICS technologies, attacks, and defenses to various cybersecurity standards.
• Ensure that the logging and monitoring requirements of OT systems are determined,
documented in policies and distributed to stakeholders.
• Establish a process for performing real time log- correlation and integration with threat
intelligence processes.
• Ensure that encryption controls are applied for ICS laptops, removable media, USB drivers.
• Monitor the use of approved removable media and ensure that unauthorized removal of
media is detected and media related incidents are recorded, analysed and tracked.
• Ensure that network defense controls are implemented on external network gateways and
access points.
• Ensure that web proxy are implemented to limit connections and access to websites.
• Manage the network firewall operations through a centralized firewall rule/ request and
approval process.
• Establish a DMZ and install the firewalls between the DMZ and internal networks.
• Ensure that network security scans are conducted in order to detect rogue devices.
• Integrate the NAC solution with enterprise tools/ capabilities such as SIEM, DLP, network
forensics and malware protection.
• Review and update the NAC rules periodically.
• Integrate the wireless network access points with IDS/IPS and NAC.
• Configure wireless access on ICS machines to allow access to only authorized wireless
networks.
Knowledge:
• Network components, their operation and appropriate network security controls and
methods.
• Knowledge and understanding of risk assessment, mitigation and management methods.
• Appropriate data backup and recovery methods and solutions, including testing. Best practices for incident response and incident management.
• Best practice network traffic analysis methods.
• Network traffic protocols, methods and management.
• Industry standard systems diagnostic tools and fault identification techniques.
• The components of a network attack and their relationship to threats and vulnerabilities
• Network security architecture concepts including topology, protocols, components, and
principles.
• Windows and Unix ports and services.
• Intrusion detection and prevention system tools and applications.
• Network protocols and directory services.
• Software related IT security principles and methods.
• Basic system, network and OS hardening techniques.
• Test procedures, principles and methodologies relevant to developing and integrating
cybersecurity capability.
• Transmission technologies and jamming techniques that enable and prevent transmission of
undesirable information or prevent installed systems from operating correctly and the laws
relating to their usage.
• Network traffic analysis tools, methodologies and processes.
• Web filtering technologies.
• Network technologies in IT and ICS/OT environments.
• Supervisory control and data acquisition system components.
• ICS operating environments and functions.
• ICS network architectures and communication protocols.
• ICS devices and industrial programming languages.
• ICS threat landscape.
• threats and vulnerabilities in ICS systems and environments.
• intrusion detection methodologies and techniques for detecting ICS intrusions.

Qualifications:
• Bachelor’s degree in computer science, information technology, or any other engineering
field.
• 7-15+ years of experience with industrial control systems.
• ICS410: ICS/SCADA Security Essentials.
• ICS456: Essentials for NERC Critical Infrastructure Protection.
• ICS515: ICS Active Defense and Incident Response.
• ICS612: ICS Cybersecurity In-Depth.
• GICSP, GCIP, GRID