[Close] 

IT Security Engineer, Operational Technology

Job Description Summary: The IT Security Engineer will support the Security Program protecting Eversource Operational Technology (OT) systems.  The IT Security Engineer will administer computer assets, networks and information systems that support Critical Infrastructure.  This position will also support the security controls and team running the NERC CIP compliance requirements for Eversource Critical Infrastructure.  As part of this responsibility the IT Security Engineer will: Assist and represent the Eversource CIP program in audit situations and regional compliance committees. Provide training to OT employees on cybersecurity and compliance applications and tools.  Support the implementation of cybersecurity policies, architectures, technical standards, technical controls, security solutions, guidelines, procedures, and other elements necessary to maintain security and compliance posture.  Follow industry standards, regulatory requirements and the potential impacts to Eversource OT policies, standards, and procedures.  Support security projects and day to day security controls supporting Eversource Operational Technology Produce high quality oral and written work, presenting complex technical matters clearly and concisely with audiences ranging from peers to Sr. Management Recommend effective process changes to enhance defense and response procedures. Evaluate, test and select security tools, evaluation products and control products. Perform OT Engineering functions including secure software / hardware design and implementation, software installation, configuration, testing, and documentation, software upgrades, maintenance and security administration. Technical support including trouble shooting and problem resolution. Network analysis, administration, and configuration. Operating system, related software products, application and data backup and recovery and disaster recovery. Performance analysis, tuning and capacity planning. Technical Knowledge/Skill: Experience with one or more of the following: security perimeter technology, Operating System security, logging and monitoring tools, malware prevention, policy and procedure, Active Directory, risk assessments, security awareness, or related information security subject area. Must have an understanding of Security Standards, Industrial Control Systems and underlying principles of networking, infrastructure and system integration. Education: A Bachelor's degree in Information Systems or a related technical field.  Degree in Information Security or security certification preferred. Experience:  A minimum of two (2) to four (4) years of experience in the field of inform
Salary Range: NA
Minimum Qualification
Less than 5 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.