At a Glance
- Tasks: Join us to develop and implement cutting-edge security policies for OT environments.
- Company: Cognizant is a leader in Cloud, Infrastructure & Security Services, driving innovation and efficiency.
- Benefits: Enjoy opportunities for career growth, collaboration, and a diverse work environment.
- Why this job: Be part of exciting technology projects that make a real impact in the security landscape.
- Qualifications: Experience in micro-segmentation, Palo Alto Networks products, and OT security principles required.
- Other info: We value creativity, collaboration, and a belief that anything is possible.
The predicted salary is between 48000 - 72000 £ per year.
This is an excellent opportunity for OT Cyber Security professionals to be part of leading-edge technology projects. Cognizant’s Cloud, Infrastructure & Security Services Practice provides end-to-end solutions covering architecture, design, implementation, management, and on-going support across the entire enterprise technology infrastructure. Our services include a spectrum of management, consulting, and systems integration services to help our clients maximize value in their infrastructure resources, while optimizing infrastructure performance and cost.
Responsibilities:
- Develop and implement micro-segmentation policies based on Zero Trust principles, with a focus on limiting access to only what is required for specific applications and devices.
- Configure and manage Palo Alto Networks Next-Generation Firewalls (NGFW) to enforce micro-segmentation policies.
- Leverage Palo Alto Networks’ capabilities to identify OT (Operational Technology) protocols and communications, establish device inventories, and prioritize assets for security measures.
- Apply security principles specifically to OT environments, understanding the unique challenges of industrial control systems.
- Continuously assess OT devices and applications for security posture, identifying vulnerabilities and potential threats.
- Collaborate with OT stakeholders to identify needs and implement suitable security measures.
- Configure, manage, and monitor security policies within Strata Cloud Manager.
- Utilize Strata’s IoT Security features for device segmentation, policy enforcement, and threat detection.
- Employ AI-powered capabilities in Strata for automated policy analysis and remediation.
- Secure industrial networks and devices effectively.
- Understand OT/IoT protocols and apply security best practices such as Zero Trust and least privilege.
- Recognize vulnerabilities in plant automation systems.
- Design and implement IDMZ architectures to isolate and secure IoT/OT devices.
- Use firewalls and other security appliances for effective network segmentation and threat containment.
- Understand segmentation in OT/plant environments.
- Be knowledgeable about industrial automation, SCADA/HMI systems, and their security implications.
- Develop incident response procedures specific to OT environments.
- Respond to security incidents, isolate compromised systems, and coordinate mitigation with cross-functional teams.
- Design and manage security policies for Palo Alto Networks firewalls.
- Ensure policies align with Zero Trust principles and are effective, efficient, and compliant.
- Conduct regular policy audits and improvements.
- Work with various teams to ensure security policies are communicated, implemented, and managed effectively.
- Lead initiatives to enhance the organization’s security posture.
Required Skills:
- Proven experience in designing and implementing micro-segmentation and security policies across IT and OT environments.
- Expertise with Palo Alto Networks products including NGFW, PAN-OS, and Panorama.
- Understanding of Zero Trust principles as applied to OT environments.
- In-depth OT security knowledge including industrial protocols, identity management, and standards (ISA/IEC 62443).
- Familiarity with automation and orchestration tools.
- Experience with cloud-based security solutions, including integration of Strata services with OT systems.
At Cognizant you will experience an exciting mix of innovation by design, creativity, collaboration, and efficiency within a framework of stimulating objectives and a passion for delivering the best to our customers. You will be joining a network of some of the most creative, innovative, and dedicated people in the industry with ample opportunities to learn and develop your career. Our Associates are chosen for their attitude, skills, knowledge, and enthusiasm but above all, their belief that anything is possible. Cognizant is an equal opportunities employer, and we welcome all applications regardless of race, colour, gender, ethnic origin, nationality, religion or beliefs, disability, age, sexual orientation, political opinions, or trade union membership.
Contact Detail:
Cognizant Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land OT Cyber Security Architect
✨Tip Number 1
Familiarise yourself with the latest trends and technologies in OT Cyber Security, especially around micro-segmentation and Zero Trust principles. This knowledge will not only help you during interviews but also demonstrate your commitment to staying current in a rapidly evolving field.
✨Tip Number 2
Network with professionals in the OT Cyber Security space through platforms like LinkedIn or industry-specific forums. Engaging with others can provide insights into the role and may even lead to referrals, which can significantly boost your chances of landing the job.
✨Tip Number 3
Prepare to discuss specific experiences where you've implemented security measures in OT environments. Be ready to share examples of how you've tackled challenges related to industrial control systems, as this will showcase your practical knowledge and problem-solving skills.
✨Tip Number 4
Research Cognizant's Cloud, Infrastructure & Security Services Practice and understand their approach to OT Cyber Security. Tailoring your discussions to align with their values and methodologies can make a strong impression during interviews.
We think you need these skills to ace OT Cyber Security Architect
Some tips for your application 🫡
Tailor Your CV: Make sure your CV highlights relevant experience in OT Cyber Security, particularly with micro-segmentation and Palo Alto Networks products. Use specific examples that demonstrate your expertise in Zero Trust principles and OT environments.
Craft a Compelling Cover Letter: Write a cover letter that showcases your passion for OT Cyber Security and your understanding of the unique challenges in this field. Mention how your skills align with the responsibilities outlined in the job description.
Highlight Relevant Skills: In your application, emphasise your knowledge of industrial protocols, identity management, and cloud-based security solutions. Make sure to mention any experience you have with automation and orchestration tools.
Proofread Your Application: Before submitting, carefully proofread your application for any spelling or grammatical errors. A polished application reflects your attention to detail and professionalism, which are crucial in the field of Cyber Security.
How to prepare for a job interview at Cognizant
✨Understand the Zero Trust Principles
Make sure you have a solid grasp of Zero Trust principles, especially how they apply to OT environments. Be prepared to discuss how you would implement micro-segmentation policies and limit access for specific applications and devices.
✨Showcase Your Technical Expertise
Highlight your experience with Palo Alto Networks products, particularly NGFW and PAN-OS. Be ready to explain how you've configured and managed firewalls in previous roles, and how you would apply that knowledge to enhance security measures.
✨Demonstrate Knowledge of OT Security
Familiarise yourself with industrial protocols and the unique challenges of securing OT environments. Be prepared to discuss specific vulnerabilities in plant automation systems and how you would address them.
✨Prepare for Scenario-Based Questions
Expect scenario-based questions that assess your problem-solving skills in real-world situations. Think about past incidents you've handled, how you isolated compromised systems, and coordinated mitigation efforts with cross-functional teams.