At a Glance
- Tasks: Help strengthen cyber resilience in operational technology environments and manage cyber risks.
- Company: Join a forward-thinking company focused on enhancing security in complex industrial settings.
- Benefits: Enjoy opportunities for professional growth, collaboration with experts, and a dynamic work environment.
- Why this job: Make a real impact in cybersecurity while working at the intersection of engineering and operations.
- Qualifications: Experience in OT/ICS environments and a solid understanding of cybersecurity principles required.
- Other info: SC clearance or willingness to obtain is necessary for this role.
The predicted salary is between 36000 - 60000 £ per year.
We are looking for an experienced OT/ICS Cyber Security Specialist to help strengthen cyber resilience across operational technology environments. You will play a key role in identifying and managing cyber risks in OT systems while working closely with internal teams and external partners to improve overall security posture.
This role is ideal for someone who understands the intersection of engineering, operations, and cybersecurity and wants to make a meaningful impact in complex, real-world environments.
- Vulnerability Management
- Security Assessment
- Policy Development
- Compliance and Regulations: Ensuring compliance and providing SME support to programmes of work delivering transformation in line with industry standards such as IEC62443 and industry regulations (NIS, CAF, OG86 and HSE).
- Network Security
Key Responsibilities
- Support the development and implementation of OT cyber security practices
- Contribute to the identification and remediation of vulnerabilities in OT systems
- Work with engineering, operations, and IT teams to embed cyber resilience across environments
- Help monitor and improve security controls, networks, and access policies
- Assist in the response to cyber incidents affecting operational systems
- Maintain documentation and contribute to policy, governance, and awareness efforts
- Engage with third parties, suppliers, or clients as needed to ensure security alignment
- Stay informed on emerging threats, technologies, and best practices in the OT space
What We're Looking For
- Experience working in or securing OT, ICS, or industrial environments
- A strong understanding of cyber security principles and operational risk
- Good communication skills and comfort working with technical and non-technical teams
- Familiarity with regulatory or industry frameworks is beneficial (but not essential)
- SC clearance or willingness to undergo clearance (where applicable)
OT/ICS Security Consultant employer: Gazelle Global
Contact Detail:
Gazelle Global Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land OT/ICS Security Consultant
✨Tip Number 1
Network with professionals in the OT/ICS security field. Attend industry conferences, webinars, or local meetups to connect with others who work in this space. Building relationships can lead to valuable insights and potential job opportunities.
✨Tip Number 2
Stay updated on the latest trends and technologies in OT cyber security. Follow relevant blogs, podcasts, and news sources to ensure you’re aware of emerging threats and best practices. This knowledge will not only help you in interviews but also demonstrate your passion for the field.
✨Tip Number 3
Consider obtaining certifications related to OT/ICS security, such as those from ISC² or CompTIA. These credentials can enhance your profile and show potential employers that you are committed to professional development in this specialised area.
✨Tip Number 4
Prepare to discuss real-world scenarios during interviews. Think about past experiences where you identified vulnerabilities or improved security measures in operational environments. Being able to articulate these examples will showcase your expertise and problem-solving skills.
We think you need these skills to ace OT/ICS Security Consultant
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in OT/ICS environments and cybersecurity. Use specific examples that demonstrate your understanding of cyber resilience and vulnerability management.
Craft a Compelling Cover Letter: In your cover letter, express your passion for cybersecurity and how your skills align with the key responsibilities outlined in the job description. Mention any experience with compliance and regulations, as well as your ability to work with both technical and non-technical teams.
Showcase Relevant Skills: When filling out your application, emphasise your knowledge of industry standards like IEC62443 and your experience with security assessments. Highlight any certifications or training that relate to OT security.
Proofread Your Application: Before submitting, carefully proofread your application for any spelling or grammatical errors. A polished application reflects your attention to detail, which is crucial in cybersecurity roles.
How to prepare for a job interview at Gazelle Global
✨Showcase Your Technical Knowledge
Make sure to brush up on your understanding of OT and ICS environments. Be prepared to discuss specific security principles and how they apply to operational technology. Highlight any relevant experience you have in identifying and managing cyber risks.
✨Demonstrate Communication Skills
Since the role involves working with both technical and non-technical teams, practice explaining complex concepts in simple terms. Use examples from your past experiences where you successfully communicated security issues to diverse audiences.
✨Familiarise Yourself with Relevant Regulations
Even if familiarity with regulatory frameworks isn't essential, having a basic understanding of standards like IEC62443 and regulations such as NIS or HSE can set you apart. Be ready to discuss how these frameworks influence security practices in OT environments.
✨Prepare for Scenario-Based Questions
Expect to face scenario-based questions that assess your problem-solving skills in real-world situations. Think about past incidents you've managed or vulnerabilities you've addressed, and be ready to explain your thought process and actions taken.