Industrial Control Systems - OT Security Manager
Listed on 2026-01-02
-
IT/Tech
Cybersecurity, Systems Engineer
Accenture is a global collective of innovators whose aim is to improve the way the world works and lives. Empowered with innovative tools, continuous learning and a global community of diverse talent, we drive success in new business architecture that disrupts conventional practices. And we are looking to add an experienced IC (Industrial Control Systems)/OT (Operational Technology) Cybersecurity Consultant to an already outstanding team.
Accenture Security helps organizations prepare, protect, detect, respond to, and recover, at all points of the security lifecycle. We hire the very best security talent and arm them with the coolest tools and latest tech so they can help our clients build resilience as we create integrated, customized turnkey solutions. We blend risk strategy, digital identity, cyber defense, application security and managed service solutions to rethink the entire security lifecycle.
You Are passionate about security, love what you do and have a genuine desire to outsmart the bad guys. You have the experience to analyze a clients’ security posture, anticipate security requirements and help find right-sized solutions based on industry leading practices. You have a proven track record working successfully in a fast-paced, agile environment.
The Work is an exciting opportunity to lead, influence and execute on IC/OT security engagements in critical infrastructure and/or mission critical industry environments. In this role, you will assess, identify, and develop security solutions for OT environments and the latest industrial technologies across multiple industries. Responsibilities include helping clients access their security posture, recommending improvements and implementing those solutions. Assessments include security frameworks, existing security measures and alignment with best practices.
In addition, you’ll have the opportunity perform testing against IC/OT devices, networks and security control mechanisms. This includes testing on devices used in the field as well as future deployment devices, and investigation of device ecosystem and monitoring.
- Monitoring & response operations for OT environments, equipment, and/or systems,
- IC/OT security sensor/tool deployment,
- IC/OT security assessment experience,
- IC/OT security program/governance development,
Travel may be required for this role. The amount of travel will vary from 0 to 100% depending on business need and client requirements.
Basic Qualifications- Minimum 5 years’ relevant experience (e.g., manufacturing facilities, and/or oil and gas facilities, and/or automotive plants, and/or electric substations, and/or water treatment facilities, and/or power generation facilities, and/or natural gas environments, and/or life sciences, and/or data center OT, etc.)
- Minimum 3 years’ experience working with IC technologies and/or environments. Examples include: SCADA, DCS, EMS, DMS, ADMS, PCN, RTUs, IACS, PLCs, HMIs, etc.
- Minimum 3 years’ experience with cybersecurity functions including vulnerability assessment and management processes, identity and access management in IC environments, incident response and monitoring, etc.
- Minimum 3 years’ experience of common IC protocols and technologies.
- Minimum 3 years’ experience authoring detailed reports and/or deliverables on IC security assessments and recommendations with ability to present findings to non-technical executive staff
- Bachelor's degree or equivalent (minimum 12 years) work experience. (If Associate’s Degree, must have minimum 6 years work experience)
- Minimum 5 years’ experience providing consulting services to Fortune / Global 1000 clients and/or domain experience within relevant industry verticals such as Oil and Gas, Utilities, Manufacturing, etc.
- Minimum 3 years’ experience assessing against standards and frameworks including DOE C2M2, IEC-62243/ISA-99, NIST CSF, NERC CIP, etc.
- Minimum 3 years' of experience working with security analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).