About The Position

As an Electronic Technician - Operational Technology Cybersecurity, you will be responsible for robust cybersecurity solutions tailored to operational technology environments, such as industrial control systems (ICS), SCADA, and other Operational Technology (OT) infrastructures for Aviation Maintenance. You will develop architecture, mitigate risks, ensure regulatory compliance to safeguard critical systems against cyber threats and protect business operations from catastrophic failures and evolving risks. You will develop, implement, and enforce information security policies, procedures, and standards to ensure compliance with Information Security (IS) team. You will perform regular vulnerability scans and compliance audits to identify and mitigate potential security risks and ensure adherence to regulatory requirements. You will monitor systems for security incidents, lead investigations, and coordinate response efforts to contain and resolve threats, minimizing impact on operations. You will support cybersecurity incident response by performing containment, eradication, and restoration actions on OT systems in collaboration with Information Security. You will design and implement intrusion detection/prevention systems (IDS/IPS) and endpoint protection solutions to secure and safeguard critical OT infrastructure and environments. You will keep up to date with emerging cybersecurity threats, vulnerabilities, and regulatory changes, recommending proactive measures to strengthen the system security. You will configure, monitor, and optimize Security Information and Event Management (SIEM) platforms to collect, analyze, and correlate security event data, enabling real-time threat detection and incident response. You will help design, implement, and maintain firewall policies and rules to secure network perimeters, ensuring robust protection against unauthorized access and cyber threats while optimizing system performance. You will configure, manage, and secure Active Directory environments by designing and implementing Group Policy Objects (GPOs) to enforce security settings, such as password policies, account lockout rules, and access controls, to mitigate unauthorized access and privilege escalation risks. You will work on hardening Linux systems by configuring secure user authentication, file permissions, and implementing tools like SELinux or AppArmor, and disabling unnecessary services to reduce attack surfaces. You will oversee the timely deployment of security patches and software updates for Linux systems, Windows systems, applications, and dependencies and automate patch management solutions to mitigate vulnerabilities. You will secure, update and harden VMware infrastructure by configuring secure access controls, implementing least privilege principles, and applying VMware security vest practices to protect virtualized environments from unauthorized access and vulnerabilities. You will develop an OT inventory model for cybersecurity purposes, inventory OT assets, identify gaps in OT network architecture and assign security level targets to network zones for control systems. You will develop cybersecurity countermeasures for systems and applications, define baseline system security requirements in partnership with Information Security, oversee implementation of system controls and develop system upgrade specifications. You will be doing design, administration, maintenance, installation, and repair of complex electronic systems, server installation and maintenance, network infrastructure troubleshooting and repair. You will execute cybersecurity countermeasures, including server patching, firmware updates, and firewall configuration. You will provide field service and engineering support to systems such as Video Management System, Access Control, Terminal Wide Voice Paging, Baggage Sortation Systems, Parking Revenue Control Systems, Flight Information Management System (FIMS), Common Use System Environment (CUSE), 800 MHz Trunked Radio System, and numerous other electronic systems. You will be providing software support and troubleshooting for SQL databases, Windows and Linux applications, virtual machine clusters, network monitoring tools and unique airline applications.

Requirements

  • Experienced – You have five (5) years’ experience in electronic and computer systems with hardware and software design, administration, and troubleshooting of complex systems.
  • Committed to Equity – You will apply equity and exemplify shared values, behaviors, and practices in all aspects of the work. At the Port of Seattle, equity is a daily responsibility and a foundational expectation for all Port employees.
  • Technical – You possess the skills to design, administer and troubleshoot complex networked electronic and computer systems under stringent time constraints.
  • Troubleshooting – You are proficient in troubleshooting and problem-solving in order to manage critical electronic system failure responses and recovery efforts.
  • Communication – You have excellent interpersonal and communication skills while interacting with airport personnel and the public.
  • Teamwork – You are a strong team-oriented person and willing to help and also have the ability to independently.

Nice To Haves

  • Desired – We hope you have an Associate Degree or certification from a recognized electronic technical school, or related program and ten (10) years experience in complex computer-managed electronic systems. We also hope you have experience in Operational Technology Systems and/or Global Industrial Cyber Security Professional Certification(GICSP), GIAC Critical Infrastructure Protection Certification(GCIP) or GIAC Response and Industrial Defense(GRID) Certifications a plus.

Responsibilities

  • Develop, implement, and enforce information security policies, procedures, and standards to ensure compliance with Information Security (IS) team.
  • Perform regular vulnerability scans and compliance audits to identify and mitigate potential security risks and ensure adherence to regulatory requirements.
  • Monitor systems for security incidents, lead investigations, and coordinate response efforts to contain and resolve threats, minimizing impact on operations.
  • Support cybersecurity incident response by performing containment, eradication, and restoration actions on OT systems in collaboration with Information Security.
  • Design and implement intrusion detection/prevention systems (IDS/IPS) and endpoint protection solutions to secure and safeguard critical OT infrastructure and environments.
  • Keep up to date with emerging cybersecurity threats, vulnerabilities, and regulatory changes, recommending proactive measures to strengthen the system security.
  • Configure, monitor, and optimize Security Information and Event Management (SIEM) platforms to collect, analyze, and correlate security event data, enabling real-time threat detection and incident response.
  • Help design, implement, and maintain firewall policies and rules to secure network perimeters, ensuring robust protection against unauthorized access and cyber threats while optimizing system performance.
  • Configure, manage, and secure Active Directory environments by designing and implementing Group Policy Objects (GPOs) to enforce security settings, such as password policies, account lockout rules, and access controls, to mitigate unauthorized access and privilege escalation risks.
  • Work on hardening Linux systems by configuring secure user authentication, file permissions, and implementing tools like SELinux or AppArmor, and disabling unnecessary services to reduce attack surfaces.
  • Oversee the timely deployment of security patches and software updates for Linux systems, Windows systems, applications, and dependencies and automate patch management solutions to mitigate vulnerabilities.
  • Secure, update and harden VMware infrastructure by configuring secure access controls, implementing least privilege principles, and applying VMware security vest practices to protect virtualized environments from unauthorized access and vulnerabilities.
  • Develop an OT inventory model for cybersecurity purposes, inventory OT assets, identify gaps in OT network architecture and assign security level targets to network zones for control systems.
  • Develop cybersecurity countermeasures for systems and applications, define baseline system security requirements in partnership with Information Security, oversee implementation of system controls and develop system upgrade specifications.
  • Design, administration, maintenance, installation, and repair of complex electronic systems, server installation and maintenance, network infrastructure troubleshooting and repair.
  • Execute cybersecurity countermeasures, including server patching, firmware updates, and firewall configuration.
  • Provide field service and engineering support to systems such as Video Management System, Access Control, Terminal Wide Voice Paging, Baggage Sortation Systems, Parking Revenue Control Systems, Flight Information Management System (FIMS), Common Use System Environment (CUSE), 800 MHz Trunked Radio System, and numerous other electronic systems.
  • Provide software support and troubleshooting for SQL databases, Windows and Linux applications, virtual machine clusters, network monitoring tools and unique airline applications.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service