ICS/OT Tier 2 Analyst at Diverto
Zagreb, , Croatia -
Full Time


Start Date

Immediate

Expiry Date

31 May, 26

Salary

0.0

Posted On

02 Mar, 26

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Security Event Monitoring, Incident Response, Threat Analysis, ICS Security, OT Security, Network Infrastructure, SIEM Tools, Log Analysis, Threat Hunting, Vulnerability Analysis, Industrial Protocols, SOC Operations, Customer Integration, Reporting, Process Improvement, Asset Inventory

Industry

Information Technology & Services

Description
Company Description Wherever our customers are in the world, we help them digitalise and optimise their remote business processes using advanced hybrid network solutions and digital technologies. At Marlink, we empower our customers worldwide by helping them digitalize and optimize their remote operations through advanced hybrid network solutions and cutting-edge digital technologies. Our teams operate globally, harnessing innovation, expertise, and applied technology to connect systems and people, driving success in today’s digital-first world. With 1,500 employees in over 30 countries, and customers in the maritime, energy, and government sectors, we push boundaries to deliver excellence. The ICS/OT Tier 2 Analyst is responsible for monitoring, analysing, and responding to security events and alerts affecting industrial control systems (ICS), operational technology (OT), and network infrastructure. Job Description Monitor and analyse security events across ICS/OT and network environments Investigate and respond to security alerts and incidents Perform threat analysis and contextual incident evaluation Support Tier 1 analysts with advanced incident handling Participate in customer integrations and SOC projects Maintain communication with customers and internal stakeholders Contribute to documentation, reporting, and process improvement Stay up-to-date with emerging OT cybersecurity threats and technologies Monitor SIEM and security monitoring tools for ICS/OT alerts Analyse logs, network traffic, and telemetry data to detect anomalies Investigate potential security incidents and determine scope and impact Perform threat hunting and proactive vulnerability analysis Produce incident reports with technical findings and recommendations Assist in integration of new customer OT environments into SOC systems Document network architectures, asset inventories, and system baselines Provide technical guidance to Tier 1 analysts Communicate incident status and findings to customers Support continuous improvement of SOC processes and detection capabilities Qualifications Bachelor’s degree in IT, cybersecurity, electrical engineering, automation, or related field Minimum 3 years of experience in cybersecurity, preferably within ICS/OT environments Solid understanding of OT architectures and industrial protocols Experience working in a Security Operations Center (SOC) environment Familiarity with threat intelligence concepts and attacker TTPs Strong sense of responsibility and professional integrity Analytical mindset with attention to detail Proactive approach to problem-solving Ability to work under pressure during security incidents Commitment to continuous learning and professional development Customer-oriented mindset Additional Information What we offer: Dynamic and fast-paced work environment, with a high level of autonomy. Impactful role in a growing cyber business within a global group. Opportunity to achieve your biggest potential and development in your area of ​​responsibility. Professional development (training, certifications) and a culture of ownership and trust. Hybrid work – office work + work from home. Flexible working hours. Additional and supplementary health insurance packages. Multisport membership. Pet-friendly office. Social events and team bonding gatherings. Compensation package consisted of base + bonus part, competitive in the market.
Responsibilities
The Tier 2 Analyst monitors, analyzes, and responds to security events across ICS/OT and network environments, while also supporting Tier 1 analysts with advanced incident handling. Responsibilities include performing threat analysis, contributing to documentation, and assisting in customer integrations and SOC projects.
Loading...