×
Register Here to Apply for Jobs or Post Jobs. X

Senior OT Security Shift

Job in Dallas, Dallas County, Texas, 75215, USA
Listing for: Cynet systems Inc
Full Time position
Listed on 2025-12-27
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer, Network Security
Salary/Wage Range or Industry Benchmark: 100000 - 125000 USD Yearly USD 100000.00 125000.00 YEAR
Job Description & How to Apply Below

Job Description Responsibilities

  • Oversee SOC operations during assigned shifts, ensuring efficient workflow, proper escalation procedures, adherence to SLAs, and effective communication between analysts.
  • Lead investigations and response to complex security incidents impacting OT systems, networks, and applications.
  • This includes coordinating efforts with other teams and business units (e.g. Networking, Architecture, CIP Compliance).
  • Perform in-depth analysis of security alerts and logs common in ICs/SCADA systems to identify indicators of compromise (IOCs).
  • Make real‑time decisions on incident severity, containment strategies, and escalation paths along with actions taken by Tier 1 & 2 analysts for incidents.
  • Evaluate and provide feedback on the performance of security technologies (e.g. SIEM, SOAR, IIDS/IPS) used in the SOC.
  • Identify and oversee the optimization of detection rules to reduce false positives.
  • Develop, test, and implement custom detection rules, correlation searches, baseline drift and use cases within the toolset to improve threat detection capabilities specifically tailored to OT protocols and environments.
  • Proactively search for IOCs and misconfigurations within the OT environment using threat intelligence, anomaly detection techniques, and knowledge of attacker tactics, techniques, and procedures (TTPs) relevant to ICs/SCADA systems.
  • Create, maintain, and refine incident response playbooks, standard operating procedures (SOPs), and runbooks based on lessons learned from incidents, threat intelligence, and industry best practices.
  • Ensure all actions, findings, and decisions made during incident handling are thoroughly documented in the SOC’s ticketing system.
  • Prepare clear and concise reports for management on security incidents and trends.
  • Provide guidance, training, and mentorship to Tier 1 & 2 analysts on incident handling, analysis techniques, tools, and OT security concepts.
  • Participate in training sessions and simulations to stay current on cyber threats, OT security best practices, and monitoring tools.
  • Stay current on NERC‑CIP standards (specifically 2/3), NIST CSF, Client Model for Industrial Control Systems, ISO 27001 frameworks, and other relevant OT security regulations.
Education, Experience, and Skill Requirements
  • Bachelor’s Degree in Information Technology, Computer Science, Cybersecurity, or a related field required. Master’s degree preferred.
  • Minimum of 5–7 years of experience in a cybersecurity‑focused role; SOC experience strongly preferred.
  • 3+ years of direct experience working with Operational Technology (OT)/Industrial Control Systems (ICS) environments – including hands‑on knowledge of SCADA systems, PLCs, RTUs, HMIs, and industrial networks.
  • Advanced certifications strongly desired.
  • Examples include:
    CySA+, CEH, OSCP, GICSP, CCNA Security, or relevant OT security certifications (e.g., ISA/IEC 62443).
  • Deep understanding of cybersecurity fundamentals such as networking protocols (TCP/IP, UDP, DNS), operating systems (Windows, Linux), and security architecture principles.
  • Strong knowledge of OT Protocols such as DNP3, Modbus, IEC 104, OPC UA, including packet analysis and understanding protocol vulnerabilities.
  • Experienced with Security Technologies such as SIEM, SOAR, IIDS/IPS, endpoint detection solutions, and network traffic analysis tools.
  • Exceptional analytical mindset and attention to detail.
  • Ability to analyze complex data sets, identify patterns, and draw meaningful conclusions.
  • Excellent verbal and written communication skills to effectively communicate technical information to both technical and non‑technical stakeholders.
  • Ability to create clear and concise reports.
  • Demonstrated ability to lead and mentor junior analysts.
  • Ability to work in a 24/7 shift‑based SOC environment.
Measures of Success
  • Demonstrates leadership in handling complex security incidents and coordinating response efforts.
  • Significant improvement in key performance indicators (e.g., reduction in mean time to detect (MTTD), mean time to respond (MTTR), false positives).
  • Successful development and implementation of new detection rules and use cases that improve threat coverage.
  • Ensures clients’ timelines, budgets, and deliverable objectives are met.
  • Ensures the DGM SOC’s SLAs are met or exceeded.
  • Works closely with multiple business units to improve cross‑functional communication and efficiencies.
  • Demonstrates skills in prioritization and multitasking, and success in adapting to change in a fast‑paced environment.
  • Demonstrates ability to interface with internal and external business partners professionally.
#J-18808-Ljbffr
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary