-
SalaryJob Description
Mandate skill:- Nozomi/ claroty , Implementation
Notice period : immediate
We are seeking a highly skilled and experienced OT Security Operations Center (SOC) Analyst / Engineer with a strong background in Nozomi Networks and operational technology (OT) environments. The ideal candidate will have a minimum of 2 years of hands-on experience with OT IDS and Nozomi, combined with a solid understanding of ICS/SCADA systems, OT cybersecurity, and threat detection methodologies. This is a critical role aimed at enhancing visibility, threat detection, and incident response capabilities for a global client.
Responsibilities
- Deploy, configure, maintain, and optimize Nozomi Networks platforms across multiple OT environments.
- Monitor and investigate alerts and anomalies across OT networks, providing detailed incident analysis and response actions.
- Correlate OT and IT security events to identify threats, vulnerabilities, and misconfigurations. Develop and fine-tune detection use cases, signatures, and alerts within Nozomi and SIEM platforms.
- Coordinate with OT engineers, IT security teams, and third-party vendors for threat hunting and response efforts.
- Lead or support forensic investigations and root cause analysis in OT/ICS incidents.
- Ensure compliance with internal policies and industry standards such as IEC 62443, NIST CSF, and others.
- Provide detailed reports, dashboards, and threat intelligence insights to stakeholders. Requirement Essentials Minimum 2 years direct hands-on experience with Nozomi Networks tools and services.
- Proven experience in OT/ICS cybersecurity, especially within critical infrastructure environment.
- Experience with virtualization platforms (VMware, Proxmox etc)
- Hands-on experiences with SIEM tools - configuring data sources, filtering, parsing
- Strong understanding of industrial protocols (Modbus, DNP3, IEC 104, OPC, etc.).
- Demonstrated experience with network traffic analysis, anomaly detection, and alert tuning in OT environments.
- Knowledge of SOC operations, SIEM tools, and incident response workflows.
- Excellent communication and documentation skills; ability to explain technical issues to non-technical stakeholders.
- Experience working with cross-functional teams in IT/OT converged environments. Nice to Have
- Certifications such as Nozomi Certified Engineer.
- Experience with other OT security platforms (Claroty, Dragos, SCADAfence, etc.).
- Basic knowledge about Linux, Familiarity with SIEM tools such as Splunk, QRadar, or LogRhythm.
- Exposure to threat intelligence frameworks, MITRE ATT&CK for ICS, or threat hunting techniques in OT.
- Experience with firewalls, NAC, or asset management tools in industrial environments and operational technology (OT) environments. The ideal candidate will have a minimum of 2 years of hands-on experience with OT IDS and Nozomi, combined with a solid understanding of ICS/SCADA systems, OT cybersecurity, and threat detection methodologies. This is a critical role aimed at enhancing visibility, threat detection, and incident response capabilities for a global client.
Check Your Resume for Match
Upload your resume and our tool will compare it to the requirements for this job like recruiters do.
Check for Match
It has come to our attention that clients and candidates are being contacted by individuals fraudulently posing as Antal representatives. If you receive a suspicious message (by email or WhatsApp), please do not click on any links or attachments. We never ask for credit card or bank details to purchase materials, and we do not charge fees to jobseekers.
