What are the responsibilities and job description for the Enterprise Security Solutions Architect position at THE NEW-INDY GROUP?
Job Details
Description
What we are looking for:
New-Indy Containerboard (NICB), an enterprise-level manufacturing company, seeks a highly skilled Security Solutions Architect to lead the design, implementation, and governance of security architecture across IT and OT environments. This role requires a hands-on approach to identifying cyber risks, developing mitigation strategies, and ensuring compliance with industry security standards.
To ensure success, the ideal candidate should have in-depth knowledge of complex manufacturing environments, IT & OT landscapes, and their convergence. The candidate should be driven to understand all aspects of NICB’s business and vested in the success of both New-Indy IT and organizations in supporting the individual sites, collaborating with multiple stakeholders to promote a cybersecurity culture across all the manufacturing plants, protect sensitive data, drive risk mitigation, optimize cybersecurity postures, and enforce security policies and procedures.
What you will do:
- Security Architecture & Integration: Develop, implement, and maintain robust security architecture across IT/OT infrastructures, ensuring seamless least privilege integration into enterprise systems.
- Cyber Risk Management: Identify vulnerabilities, analyze security threats, and develop strategies to mitigate risks while ensuring business continuity.
- Compliance & Governance: Establish and enforce security policies and procedures in compliance with industry regulations (e.g., NIST, ISO 27001, IEC 62443).
- Process Control Security: Ensure the secure implementation of process control systems, including SCADA, MES, PLCs, and DCS, in manufacturing environments.
- Cross-functional collaboration: Work with IT, OT, engineering, infrastructure, and operations teams to ensure security solutions align with enterprise objectives.
- Incident Response & Forensics: Analyze and assist in maintaining incident response plans and improve threat detection capabilities.
- Security Awareness & Training: Provide guidance and training to IT and OT personnel and the end-user community on cybersecurity with the best practices and compliance requirements.
- Continuous Improvement: Stay ahead of industry trends and emerging security threats, applying best practices to enhance enterprise security postures.
Qualifications
What you need:
- Business Continuity
- Computer Network Defense
- Cybersecurity
- Database Administration
- Encryption
- Enterprise Architecture
- Information & Operational Systems/Network Security
- Information & Operational Technology Assessment
- IT & OT Infrastructure, Network & Operations Management
- Operating Systems
- Policy Management
- Risk Management
- SOC Management
- Technology Awareness
- Threat Analysis
- Vendor & Contract Management
- Vulnerabilities Assessment
Education & Experience
- Bachelor’s degree in Computer Science, Cybersecurity, Information Systems, Electrical/Mechanical Engineering, or a related field.
- Advanced degrees and certifications (CISSP, CISM, GICSP, etc.) are a plus.
- 10 years in cybersecurity, with a strong focus on enterprise security architecture, risk management, and OT security.
Technical Expertise:
- Expertise in security frameworks, network security, identity and access management, cloud security, and endpoint protection.
- Hands-on experience with security tools such as SIEM, IDS/IPS, EDR, and vulnerability management solutions.
- Deep understanding of OT security technologies, including SCADA, PLCs, MES, industrial networks, and related protocols (Modbus, OPC, TCP/IP).
- Strong programming and scripting skills (Python, PowerShell, C , etc.).
- Knowledge of data backup and recovery.
- Knowledge of business continuity and disaster recovery continuity of operations plans.
- Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
- Knowledge of controls related to the use, processing, storage, and transmission of data.
- Knowledge of encryption algorithms.
- Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
- Knowledge of measures or indicators of system performance and availability.
- Knowledge of network traffic analysis methods, and tools.
- Knowledge of network systems management principles, models, methods (e.g., end-to-end systems performance monitoring), and tools.
- Knowledge of server and client operating systems.
- Skill in creating policies that reflect system security objectives.
- Knowledge of new and emerging information and operational technologies (IT & OT) and cybersecurity technologies.
- Knowledge of current and emerging threats/threat vectors.
- Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
- Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
- Knowledge of penetration testing principles, tools, and techniques.
Other Good Skills/Qualifications to Have:
- Organizational skills, attention to detail, follow up, documentation preparation and maintenance skills, and customer service orientation are crucial for success in this role.
- Exceptional interpersonal skills, with a focus on rapport-building, listening, and questioning.
- Experience in managing cross-functional teams and processes.
- Exceptional written and oral communication skills.
- Mentorship: Guide junior engineers and technicians, fostering a culture of knowledge sharing and skill development.
- Ability to conduct research into a wide range of issues as required.
- Ability to absorb and retain information quickly.
- Ability to present ideas in a user-friendly language.
- Highly self-motivated and directed.
- Proven analytical and problem-solving abilities.
- Ability to effectively prioritize and execute tasks in a high-pressure environment.
- Experience working in a team-oriented, collaborative environment.
- Reliable and available to work a flexible schedule including nights and weekends.
Work Conditions:
- 40-hour on-site work week. Emergency call-in availability for 24/7 production environment.
- Ability to work on-site at industrial facilities, which may include working in hazardous environments or under strict safety protocols.
- Dexterity of hands and fingers to operate a computer keyboard, mouse, power tools, and other computer components. Be able to lift 40 lbs. unassisted.
- Physically able to participate in sessions, presentations, and meetings.
- Some travel (approximately 25%) may be required for the purpose of offsite software and system integration efforts, and team building and development activities.
This is an excellent opportunity for a highly skilled security professional to make a significant impact on the cybersecurity landscape of a large manufacturing enterprise. If you are passionate about securing critical systems and ensuring the integrity of IT/OT environments, we encourage you to apply.