Start Date
Immediate
Expiry Date
02 Sep, 25
Salary
0.0
Posted On
02 Jun, 25
Experience
3 year(s) or above
Remote Job
Yes
Telecommute
Yes
Sponsor Visa
No
Skills
Communication Protocols, Isa, Computer Science, Interpersonal Skills, Mitigation Strategies, Assessment Tools, Active Directory, Information Systems, Color
Industry
Information Technology/IT
Cyderes (Cyber Defense and Response) is a pure-play, full life-cycle cybersecurity services provider with award-winning managed security services, identity and access management, and professional services designed to manage the cybersecurity risks of enterprise clients. We specialize in multi-technology, complex environments with the in speed and agility needed to tackle the most advanced cyber threats. We leverage our global scale and decades of experience to accelerate our clients’ cyber outcomes through a full lifecycle of cybersecurity services. We are a global company with operating centers in the United States, Canada, the United Kingdom, and India.
ABOUT THE JOB:
We are seeking a highly skilled and experienced Senior Security Consultant OT/ICS to lead and deliver critical security solutions for our clients’ operational technology and industrial control systems. This role is pivotal in safeguarding critical infrastructure and ensuring the resilience of our clients’ operations.
The Senior Security Consultant OT/ICS is a senior-level position responsible for working directly with clients to ensure the cybersecurity of their Industrial Automation and Control Systems (IACS) environments. This role requires a deep understanding of industry standards, regulations, and best practices, and the ability to communicate technical information to both technical and non-technical audiences effectively. The Senior Security Consultant will play a critical role in protecting our clients’ critical infrastructure from evolving cyber threats by designing, implementing, and maintaining security solutions, performing security assessments, and supporting the identification and mitigation of security vulnerabilities.
REQUIREMENTS: