Job Title - OT Threat & Vulnerability Management Analyst
Request # 75880-1
Location : Preferably in East Peoria, IL office, but open to Nashville or Dallas office - On-Site
Duration : 12 months
Education & Experience Required :
- Years of experience : 10 years exp ( combination of OT or IT and cybersecurity)
- Degree requirement : not required
- Do you accept internships as job experience : No
Required Technical Skills
Experience managing vulnerabilities of OT assets.Proficiency in data analysis using ServiceNow, Nozomi Vantage, or similar monitoring tools.bility to document and present technical information to non-technical decision makers.Experience working with OT (Operational Technology) devices.Strong organizational, task management, and time management skills.Process engineering skills; ability to develop and refine processes outside of a specific toolset.Experience with PowerBI, Visio, Azure DevOps, ServiceNow, and Agile methodologies.Strong problem-solving, critical thinking, and interpersonal communication abilities.Foundational understanding of cybersecurity and vulnerability managementDisqualifiers / Red Flags / Overqualifications :
Choppy tenure on resumeResumes where the candidate has a lot of Mgmt. exp and not as much hands-on experience, they will not be considered.If candidat is not local but open to relocating on their own dime, please make sthat clear on resume or they will be DQJob Description
The OT Threat & Vulnerability Management Analyst will be responsible for quantifying, assessing, tracking, and managing the resolution of identified vulnerabilities across various Operational Technology (OT) assets and systems. This role requires the ability to work independently and collaboratively with business representatives, security architects, and IT owners to drive cybersecurity compliance and remediation efforts. The analyst will leverage foundational IT asset, OT asset, and cybersecurity knowledge and apply it to OT environments, utilizing a variety of tools and methodologies to enable effective risk management and reporting.
Position's Contributions to Work Group :
Collaborate with business teams to identify, assess, and manage vulnerabilities across OT devices and systems.Analyze and extract data from security tools such as ServiceNow, Nozomi Vantage, or other passive monitoring solutions.Document, organize, and present vulnerability data to IT leaders and business leaders, ensuring actions, timelines, and priorities for compliance and remediation are clear.Develop and engineer processes related to vulnerability management, applying both IT and OT principles.Utilize project management, leadership, and communication skills to coordinate vulnerability tracking and resolution efforts.Create effective data visualizations and dashboards using PowerBI, Visio, and ServiceNOW.Employ Azure DevOps and Agile methodologies for ongoing process improvement and coordination.Maintain strong interpersonal relationships with subject matter experts and stakeholders, both within and outside the security team.Demonstrate foundational knowledge in cybersecurity, specifically in vulnerability management; relevant certifications are a plus.Typical task breakdown :
Collaborate with business teams to identify, assess, and manage vulnerabilities across OT devices and systems.Analyze and extract data from security tools such as ServiceNow, Nozomi Vantage, or other passive monitoring solutions.Document, organize, and present vulnerability data to IT leaders and business leaders, ensuring actions, timelines, and priorities for compliance and remediation are clear.Develop and engineer processes related to vulnerability management, applying both IT and OT principles.Utilize project management, leadership, and communication skills to coordinate vulnerability tracking and resolution efforts.Create effective data visualizations and dashboards using PowerBI, Visio, and ServiceNOW.Employ Azure DevOps and Agile methodologies for ongoing process improvement and coordination.Maintain strong interpersonal relationships with subject matter experts and stakeholders, both within and outside the security team.Demonstrate foundational knowledge in cybersecurity, specifically in vulnerability management; relevant certifications are a plus