OT Security Shift Lead Hybrid - US

DS Technologies Inc

OT Security Shift Lead

Full Time • Hybrid - US
OT Security Shift Lead
Location: Dallas, TX – Onsite 5 days
End client: Oncor

 
Description:
The Threat Detection, Response & Intelligence Consultant plays a vital role in safeguarding an organization's digital infrastructure by identifying, analyzing, and mitigating cyber threats. This position involves monitoring, prioritizing, investigating and responding to security incidents using a variety of cybersecurity tools, including SIEM, SOAR, EDR, and XDR platforms. The consultant is expected to understand and apply industry frameworks like MITRE ATT&CK and the Cyber Kill Chain to understand and counter adversary tactics effectively. Key responsibilities are conducting events investigation, managing incident report, and providing actionable recommendations and response to strengthen the clients security posture. The role also requires a deep understanding of network and endpoint events, as well as the ability to interpret security tools and logs from Windows, MAC, and Linux systems. The consultant will engage in vulnerability management and cyber threat intelligence activities, crucial for identifying and anticipating potential threats. Continuous learning and adaptation are essential to stay ahead of emerging threats and evolving technologies.
 
Required skills:
OT Security Shift Lead (ONSITE DALLAS)
Bachelor’s Degree in Information Technology, Computer Science, Cybersecurity, or a related field required. Master's degree preferred.
Minimum of 5-7 years of experience in a cybersecurity-focused role; SOC experience strongly preferred.
3+ years of direct experience working with Operational Technology (OT) / Industrial Control Systems (ICS) environments – including hands-on knowledge of SCADA systems, PLCs, RTUs, HMIs, and industrial networks.
Advanced certifications strongly desired. Examples include: CySA+, CEH, OSCP, GICSP, CCNA Security, or relevant OT security certifications (e.g., ISA/IEC 62443).
Deep understanding of cybersecurity fundamentals such as networking protocols (TCP/IP, UDP, DNS), operating systems (Windows, Linux), and security architecture principles...
Cont...

Nice to have skills:
Strong knowledge of OT Protocols such as DNP3, Modbus, IEC 104, OPC UA, including packet analysis and understanding protocol vulnerabilities.
Experienced with Security Technologies such as SIEM, SOAR, IIDS/IPS, endpoint detection solutions, network traffic analysis tools.
Exceptional analytical mindset and attention to detail. Ability to analyze complex data sets, identify patterns, and draw meaningful conclusions.
Excellent verbal and written communication skills to effectively communicate technical information to both technical and non-technical stakeholders. Ability to create clear and concise reports.
Demonstrated ability to lead and mentor junior analysts.
Ability to work in a 24/7 shift-based SOC environment, including covering for teammates and occasional after-hours support.

Flexible work from home options available.

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.





(if you already have a resume on Indeed)

Or apply here.

* required fields

Location
Or
Or

U.S. Equal Opportunity Employment Information (Completion is voluntary)

We are an equal opportunity employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability status, protected veteran status, or any other characteristic protected by law.

You are being given the opportunity to provide the following information in order to help us comply with federal and state Equal Employment Opportunity/Affirmative Action record keeping, reporting, and other legal requirements.

Completion of the form is entirely voluntary. Whatever your decision, it will not be considered in the hiring process or thereafter. Any information that you do provide will be recorded and maintained in a confidential file.