Search by job, company or skills

A

OT SOC Analyst

2-4 Years
0.04 - 1.04 LPA
Save
new job description bg glownew job description bg glownew job description bg svg
  • Posted 5 months ago
  • Be among the first 30 applicants
Early Applicant

Job Description

Job Description

Mandate skill:- Nozomi/ claroty , Implementation

Notice period : immediate

We are seeking a highly skilled and experienced OT Security Operations Center (SOC) Analyst / Engineer with a strong background in Nozomi Networks and operational technology (OT) environments. The ideal candidate will have a minimum of 2 years of hands-on experience with OT IDS and Nozomi, combined with a solid understanding of ICS/SCADA systems, OT cybersecurity, and threat detection methodologies. This is a critical role aimed at enhancing visibility, threat detection, and incident response capabilities for a global client.

Responsibilities

  • Deploy, configure, maintain, and optimize Nozomi Networks platforms across multiple OT environments.
  • Monitor and investigate alerts and anomalies across OT networks, providing detailed incident analysis and response actions.
  • Correlate OT and IT security events to identify threats, vulnerabilities, and misconfigurations. Develop and fine-tune detection use cases, signatures, and alerts within Nozomi and SIEM platforms.
  • Coordinate with OT engineers, IT security teams, and third-party vendors for threat hunting and response efforts.
  • Lead or support forensic investigations and root cause analysis in OT/ICS incidents.
  • Ensure compliance with internal policies and industry standards such as IEC 62443, NIST CSF, and others.
  • Provide detailed reports, dashboards, and threat intelligence insights to stakeholders. Requirement Essentials Minimum 2 years direct hands-on experience with Nozomi Networks tools and services.
  • Proven experience in OT/ICS cybersecurity, especially within critical infrastructure environment.
  • Experience with virtualization platforms (VMware, Proxmox etc)
  • Hands-on experiences with SIEM tools - configuring data sources, filtering, parsing
  • Strong understanding of industrial protocols (Modbus, DNP3, IEC 104, OPC, etc.).
  • Demonstrated experience with network traffic analysis, anomaly detection, and alert tuning in OT environments.
  • Knowledge of SOC operations, SIEM tools, and incident response workflows.
  • Excellent communication and documentation skills ability to explain technical issues to non-technical stakeholders.
  • Experience working with cross-functional teams in IT/OT converged environments. Nice to Have
  • Certifications such as Nozomi Certified Engineer.
  • Experience with other OT security platforms (Claroty, Dragos, SCADAfence, etc.).
  • Basic knowledge about Linux, Familiarity with SIEM tools such as Splunk, QRadar, or LogRhythm.
  • Exposure to threat intelligence frameworks, MITRE ATT&CK for ICS, or threat hunting techniques in OT.
  • Experience with firewalls, NAC, or asset management tools in industrial environments and operational technology (OT) environments. The ideal candidate will have a minimum of 2 years of hands-on experience with OT IDS and Nozomi, combined with a solid understanding of ICS/SCADA systems, OT cybersecurity, and threat detection methodologies. This is a critical role aimed at enhancing visibility, threat detection, and incident response capabilities for a global client.

Check Your Resume for Match

Upload your resume and our tool will compare it to the requirements for this job like recruiters do.

More Info

About Company

Antal International is a global executive search organisation with over 130 offices in more than 30 countries. We have a network of over 800 people operating under the Antal brand, successfully placing talent for professional positions in over 75 countries around the world. We believe our value and uniqueness lie in our skill base and industry

Job ID: 133136921