Operational Technology Security Architect
**onsite 3 days and WFH 2 days per week**
**office location is in Dublin 4 – free parking and free canteen**
Our client has a unique role to play in leading this radical transformation of Ireland’s power system in support of the transition to renewable energy. This will require pioneering engineering effort together with enhanced IT capability to respond successfully to the scale of disruption.
This offers a unique opportunity to further your career in IT while playing a significant role in delivering the company’s IT transformation.
The Operational Technology (OT) Security Architect is an exciting role in a well-established Enterprise Security team, who will lead in the design, implementation and troubleshooting of OT and IT security solutions across a variety of technical platforms, data networks and security domains. The solutions involved underpin the organisation’s corporate, market and power system operational functions.
We are seeking a skilled and experienced OT Security Architect to join our organisation. As an OT Security Architect, you will be responsible for designing, implementing, and maintaining secure architectures for our operational technology and information technology systems. Your expertise will play a crucial role in safeguarding our critical infrastructure from cyber threats and ensuring the continuous operation of our OT and IT environments.
1. Design and Architecture:
- Develop and implement secure OT and IT system architectures, considering industry best practices, regulatory requirements, and business needs.
- Collaborate with cross-functional teams to integrate security controls into the design and deployment of OT and IT systems, including network infrastructure, industrial control systems, and associated components.
- Conduct risk assessments and security audits to identify vulnerabilities and recommend appropriate security measures.
2. Security Implementation:
- Implement robust security controls, policies, and procedures to protect OT and IT systems against unauthorised access, data breaches, and cyber threats.
- Define and enforce security standards for OT and IT infrastructure, including authentication, access controls, encryption, and monitoring mechanisms.
- Deploy intrusion detection and prevention systems (IDPS), firewalls, and other security technologies to detect and respond to potential security incidents.
3. Threat Management and Incident Response:
- Develop incident response plans and procedures for OT and IT environments.
- Coordinate with incident response teams to investigate and mitigate security incidents, minimizing impact and downtime.
- Conduct post-incident analysis and recommend improvements to prevent future security breaches.
4. Security Governance and Compliance:
- Stay up-to-date with emerging OT and IT security threats, vulnerabilities, and best practices.
- Ensure compliance with relevant industry standards, regulations, and frameworks such as NIST CSF, IEC 62443, and ISO 27001.
- Collaborate with internal and external stakeholders to provide guidance on security matters and promote a security-conscious culture.
5. Documentation and Reporting:
- Create comprehensive documentation of OT and IT system architectures, security controls, and incident response procedures.
- Generate regular reports on security posture, vulnerabilities, and remediation progress.
- Contribute to executive-level briefings and presentations to communicate security risks, strategies, and recommendations.
Desirable Knowledge, Skills & Experience
- Bachelor’s or Master’s degree in Computer Science, Information Security, or a related field. Extensive experience in designing and securing IT and OT environments, including industrial control systems (ICS), SCADA, and related technologies.
- In-depth knowledge of OT security frameworks, standards, and best practices.
- Proficiency in security technologies, including firewalls, IDPS, SIEM, and endpoint protection systems.
- Familiarity with network protocols, routing, and switching in OT environments.
- Strong understanding of risk assessment methodologies and threat modelling techniques.
- Relevant certifications such as CISSP, GICSP, OSCP, or CISM are highly desirable.
- Excellent problem-solving skills and the ability to analyse complex security issues.
- Effective communication skills to convey technical concepts to both technical and non-technical stakeholders.
- Familiarity with cyber security frameworks (e.g. NIST) and standards (e.g. ISO 27001).