TC-CS-Cyber Architecture- OT- Engineering-OT-Security -Senior
Bengaluru, KA, IN, 560048
EY
EY provides consulting, assurance, tax and transaction services that help solve our client’s toughest challenges and build a better working world for all.At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
EY GDS - Cyber Security-TDR Senior (OT Sr Analyst – L2)
As part of our EY GDS - cyber security team, who shall work as Sr Analyst for OT/IIOT security solutions.
The opportunity
We’re looking for Senior Analyst with expertise in OT/IIOT security solutions. This is a fantastic opportunity to be part of a leading firm whilst being instrumental in the growth of a new service offering.
Your key responsibilities
- Acting as a member of the security operation centre with specific responsibility for the Operational Technology (OT) cyber security
- Provide operational support for globally deployed enterprise deployment of OT network monitoring solution such as Nozomi, Claroty, Armis, DarkTrace, Azure Defender.
- Coordinates with operational team to assess the security of OT and Industrial Internet of Things (IIoT) systems.
- Assist in collecting network or security log files.
- Serves as the primary technical analyst for the OT Network Monitoring service offering.
- Work directly with various organizational team(s) to help analyse OT & IIoT network traffic patterns
- Assist in implementing improvements in cybersecurity threat monitoring, attack response methods, and incident response plans
- In coordination with the Cyber Security team and other structures, be able to respond to the CSIRT and associated emergency preparedness procedures
- Conduct and Participate in Cyber Incident Response exercises
- Validate Security controls policies based on incidents and threat intelligence.
- Participate in OT security incident response.
- Conduct hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP).
- Establish strong working relationships with manufacturing sites and related personnel to drive recommendations to improve the Cybersecurity posture.
Skills and attributes for success
- Knowledge of a relevant OT Cyber Framework such as NIST 800-82 or ISA62443.
- Experience and expertise in control systems (ICS, SCADA, DCS, etc.) and OT, IIoT security
- In-depth knowledge and understanding of how to handle and respond to OT security incidents as part of a specialised incident response team
- Strong working knowledge and thorough understanding of Protective Monitoring, Vulnerability Monitoring, Threat Intelligence and Threat Hunting within OT data
- Knowledge and understanding of a wide variety of security technologies and processes
- Up-to-date knowledge of current exploit techniques, vulnerability disclosures, data breach incidents, and security analysis techniques, combined with the understanding of the potential OT impact on the security posture
- Working knowledge of cybersecurity policies and standards related to ICS/SCADA, OT/IIoT Security solutions (e.g. Industrial IDS, Industrial Firewall etc.)
- Knowledge and understanding of the OT world as related to different components such as HMI, PLC etc.)
- Knowledge and understanding of tools used to protect industrial environment
- Understanding of IT/OT/IIoT communication protocols e.g., TCP/IP, UDP, DNP3, Modbus, IEC 61850, OPC, OPC UA, PROFINET, BLE, Zigbee
- Experience supporting industrial protocols such as OPC, Modbus TCP, HART, Foundation Fieldbus
- Understand and be hands on, able to work with a wide range of Cyber Security related toolsets, SIEM, EDR/MDR, Vulnerability management, Microsoft and Linux operating systems, Firewalls, IDS/IPS to name a few
- Ability to work with minimal levels of supervision or oversight.
- Exposure to IIOT/OT monitoring solutions (Claroty, Nozomi Networks, Armis, Azure Defender etc.)
- Good knowledge and experience in Security Monitoring and Cyber Incident Response
To qualify for the role, you must have
- B. Tech./ B.E/M.Tech/M.E with sound technical skills
- Strong command on verbal and written English language.
- Demonstrate both technical acumen and critical thinking abilities.
- Strong interpersonal and presentation skills.
- 5+ years’ overall experience in cyber security with 2+ previous experience supporting cyber defence analysis of Operational Technology (OT).
- Relevant certifications (Security +, GCIA, GCIH, GMON, GICSP, GRID, GCCC etc.)
Ideally, you’ll also have
- People/Project management skills.
What working at EY offers
At EY, we’re dedicated to helping our clients, from start–ups to Fortune 500 companies — and the work we do with them is as varied as they are.
You get to work with inspiring and meaningful projects. Our focus is education and coaching alongside practical experience to ensure your personal development. We value our employees and you will be able to control your own development with an individual progression plan. You will quickly grow into a responsible role with challenging and stimulating assignments. Moreover, you will be part of an interdisciplinary environment that emphasizes high quality and knowledge exchange. Plus, we offer:
- Support, coaching and feedback from some of the most engaging colleagues around
- Opportunities to develop new skills and progress your career
- The freedom and flexibility to handle your role in a way that’s right for you
EY | Building a better working world
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: APT Azure CSIRT DNP3 EDR Exploit Firewalls GCIA GCIH GICSP ICS IDS IEC 61850 Incident response Industrial Internet of Things IPS Linux Log files Modbus Monitoring NIST PROFINET SCADA Security analysis SIEM Strategy TCP/IP Threat intelligence Vulnerability management
Perks/benefits: Career development Startup environment
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Officer jobs
- Open Information Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cybersecurity Analyst jobs
- Open Staff Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Senior Information Security Analyst jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open Consultant SOC / CERT H/F jobs
- Open IT Security Analyst jobs
- Open Security Researcher jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open Cybersecurity Specialist jobs
- Open IT Security Engineer jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Agile-related jobs
- Open Application security-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open Analytics-related jobs
- Open CISA-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open Security assessment-related jobs
- Open APIs-related jobs
- Open Malware-related jobs
- Open Forensics-related jobs
- Open Java-related jobs
- Open Security Clearance-related jobs
- Open DevOps-related jobs
- Open CEH-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs