Assess industrial environments, control system architectures, process dependencies, and operational constraints across OT/ICS environments.
Support the design and review of OT network architectures, including segmentation, trust zones, conduits, and separation between enterprise, DMZ, and control layers.
Build and validate OT asset inventories, system ownership, process criticality, dependencies, and architecture documentation.
Conduct site visits, workshops, interviews, walkthroughs, and evidence collection to validate how systems operate in practice.
Contribute to risk assessments by identifying threats, consequences, likely attack paths, and operational impacts across cyber-physical environments.
Support the integration of cybersecurity requirements into new projects, plant modifications, and technology changes.
Help define practical controls for remote access, privileged access, vendor access, monitoring, hardening, and exposure reduction.
Translate operational and engineering realities into actionable cybersecurity requirements, standards, procedures, and remediation plans.
Map client environments against IEC 62443, NIST, ISO 27001, NIS2, and sector-specific requirements, with guidance from senior cyber specialists where needed.
Prepare clear reports, architecture inputs, findings summaries, and recommendations for both technical teams and management stakeholders.
Work closely with engineering, operations, IT, security, and project teams to align security measures with safety, operability, and maintenance requirements.
Qualifications
Solid experience in OT/ICS environments such as industrial operations, automation, control systems, marine systems, energy, utilities, manufacturing, or other critical infrastructure.
Good understanding of ICS lifecycle, safety and availability priorities, operational constraints, and change management practices.
Experience with industrial architectures, field-to-control-layer communications, and the practical realities of plant operations.
Familiarity with industrial protocols, system interfaces, control networks, and dependencies between operational systems.
Working knowledge of networking fundamentals such as routing, switching, VLANs, firewalls, DNS, DHCP, and remote access concepts.
Exposure to cybersecurity principles such as defense in depth, access control, logging, hardening, monitoring, and risk-based remediation.
Interest and ability to build stronger knowledge in cybersecurity governance, monitoring, incident response, and OT security architecture.