Job Description
Mandate skill : - Nozomi / claroty , Implementation
Notice period : immediate
We are seeking a highly skilled and experienced OT Security Operations Center (SOC) Analyst / Engineer with a strong background in Nozomi Networks and operational technology (OT) environments. The ideal candidate will have a minimum of 2 years of hands-on experience with OT IDS and Nozomi, combined with a solid understanding of ICS / SCADA systems, OT cybersecurity, and threat detection methodologies. This is a critical role aimed at enhancing visibility, threat detection, and incident response capabilities for a global client.
Responsibilities
- Deploy, configure, maintain, and optimize Nozomi Networks platforms across multiple OT environments.
- Monitor and investigate alerts and anomalies across OT networks, providing detailed incident analysis and response actions.
- Correlate OT and IT security events to identify threats, vulnerabilities, and misconfigurations. Develop and fine-tune detection use cases, signatures, and alerts within Nozomi and SIEM platforms.
- Coordinate with OT engineers, IT security teams, and third-party vendors for threat hunting and response efforts.
- Lead or support forensic investigations and root cause analysis in OT / ICS incidents.
- Ensure compliance with internal policies and industry standards such as IEC 62443, NIST CSF, and others.
- Provide detailed reports, dashboards, and threat intelligence insights to stakeholders. Requirement Essentials Minimum 2 years direct hands-on experience with Nozomi Networks tools and services.
- Proven experience in OT / ICS cybersecurity, especially within critical infrastructure environment.
- Experience with virtualization platforms (VMware, Proxmox etc)
- Hands-on experiences with SIEM tools - configuring data sources, filtering, parsing
- Strong understanding of industrial protocols (Modbus, DNP3, IEC 104, OPC, etc.).
- Demonstrated experience with network traffic analysis, anomaly detection, and alert tuning in OT environments.
- Knowledge of SOC operations, SIEM tools, and incident response workflows.
- Excellent communication and documentation skills ability to explain technical issues to non-technical stakeholders.
- Experience working with cross-functional teams in IT / OT converged environments. Nice to Have
- Certifications such as Nozomi Certified Engineer.
- Experience with other OT security platforms (Claroty, Dragos, SCADAfence, etc.).
- Basic knowledge about Linux, Familiarity with SIEM tools such as Splunk, QRadar, or LogRhythm.
- Exposure to threat intelligence frameworks, MITRE ATT&CK for ICS, or threat hunting techniques in OT.
- Experience with firewalls, NAC, or asset management tools in industrial environments and operational technology (OT) environments. The ideal candidate will have a minimum of 2 years of hands-on experience with OT IDS and Nozomi, combined with a solid understanding of ICS / SCADA systems, OT cybersecurity, and threat detection methodologies. This is a critical role aimed at enhancing visibility, threat detection, and incident response capabilities for a global client.
Check Your Resume for Match
Upload your resume and our tool will compare it to the requirements for this job like recruiters do.
Skills Required
VMware, Opc, proxmox , network traffic analysis , anomaly detection, Siem Tools, Modbus