Enterprise Security Solutions Architect

NEW-INDY CATAWBA LLCCatawba, SC
1dOnsite

About The Position

New-Indy Containerboard (NICB), an enterprise-level manufacturing company, seeks a highly skilled Security Solutions Architect to lead the design, implementation, and governance of security architecture across IT and OT environments. This role requires a hands-on approach to identifying cyber risks, developing mitigation strategies, and ensuring compliance with industry security standards. To ensure success, the ideal candidate should have in-depth knowledge of complex manufacturing environments, IT & OT landscapes, and their convergence. The candidate should be driven to understand all aspects of NICB’s business and vested in the success of both New-Indy IT and organizations in supporting the individual sites, collaborating with multiple stakeholders to promote a cybersecurity culture across all the manufacturing plants, protect sensitive data, drive risk mitigation, optimize cybersecurity postures, and enforce security policies and procedures.

Requirements

  • Business Continuity
  • Computer Network Defense
  • Cybersecurity
  • Database Administration
  • Encryption
  • Enterprise Architecture
  • Information & Operational Systems/Network Security
  • Information & Operational Technology Assessment
  • IT & OT Infrastructure, Network & Operations Management
  • Operating Systems
  • Policy Management
  • Risk Management
  • SOC Management
  • Technology Awareness
  • Threat Analysis
  • Vendor & Contract Management
  • Vulnerabilities Assessment
  • Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, Electrical/Mechanical Engineering, or a related field.
  • 10+ years in cybersecurity, with a strong focus on enterprise security architecture, risk management, and OT security.
  • Expertise in security frameworks, network security, identity and access management, cloud security, and endpoint protection.
  • Hands-on experience with security tools such as SIEM, IDS/IPS, EDR, and vulnerability management solutions.
  • Deep understanding of OT security technologies, including SCADA, PLCs, MES, industrial networks, and related protocols (Modbus, OPC, TCP/IP).
  • Strong programming and scripting skills (Python, PowerShell, C++, etc.).
  • Knowledge of data backup and recovery.
  • Knowledge of business continuity and disaster recovery continuity of operations plans.
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Knowledge of controls related to the use, processing, storage, and transmission of data.
  • Knowledge of encryption algorithms.
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
  • Knowledge of measures or indicators of system performance and availability.
  • Knowledge of network traffic analysis methods, and tools.
  • Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
  • Knowledge of server and client operating systems.
  • Skill in creating policies that reflect system security objectives.
  • Knowledge of new and emerging information and operational technologies (IT & OT) and cybersecurity technologies.
  • Knowledge of current and emerging threats/threat vectors.
  • Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
  • Knowledge of penetration testing principles, tools, and techniques.

Nice To Haves

  • Advanced degrees and certifications (CISSP, CISM, GICSP, etc.) are a plus.
  • Organizational skills, attention to detail, follow up, documentation preparation and maintenance skills, and customer service orientation are crucial for success in this role.
  • Exceptional interpersonal skills, with a focus on rapport-building, listening, and questioning.
  • Experience in managing cross-functional teams and processes.
  • Exceptional written and oral communication skills.
  • Mentorship: Guide junior engineers and technicians, fostering a culture of knowledge sharing and skill development.
  • Ability to conduct research into a wide range of issues as required.
  • Ability to absorb and retain information quickly.
  • Ability to present ideas in a user-friendly language.
  • Highly self-motivated and directed.
  • Proven analytical and problem-solving abilities.
  • Ability to effectively prioritize and execute tasks in a high-pressure environment.
  • Experience working in a team-oriented, collaborative environment.
  • Reliable and available to work a flexible schedule including nights and weekends.

Responsibilities

  • Security Architecture & Integration: Develop, implement, and maintain robust security architecture across IT/OT infrastructures, ensuring seamless least privilege integration into enterprise systems.
  • Cyber Risk Management: Identify vulnerabilities, analyze security threats, and develop strategies to mitigate risks while ensuring business continuity.
  • Compliance & Governance: Establish and enforce security policies and procedures in compliance with industry regulations (e.g., NIST, ISO 27001, IEC 62443).
  • Process Control Security: Ensure the secure implementation of process control systems, including SCADA, MES, PLCs, and DCS, in manufacturing environments.
  • Cross-functional collaboration: Work with IT, OT, engineering, infrastructure, and operations teams to ensure security solutions align with enterprise objectives.
  • Incident Response & Forensics: Analyze and assist in maintaining incident response plans and improve threat detection capabilities.
  • Security Awareness & Training: Provide guidance and training to IT and OT personnel and the end-user community on cybersecurity with the best practices and compliance requirements.
  • Continuous Improvement: Stay ahead of industry trends and emerging security threats, applying best practices to enhance enterprise security postures.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service