×
Register Here to Apply for Jobs or Post Jobs. X

Operational Technology Cyber Security Specialist - Team Lead

Job in East Peoria, Tazewell County, Illinois, 61611, USA
Listing for: Caterpillar Financial Services Corporation
Full Time position
Listed on 2026-03-11
Job specializations:
  • IT/Tech
    Cybersecurity, Systems Engineer
Salary/Wage Range or Industry Benchmark: 80000 - 100000 USD Yearly USD 80000.00 100000.00 YEAR
Job Description & How to Apply Below

Career Area:

Technology, Digital and Data

Job Description:

Your Work Shapes the World at Caterpillar Inc.

When you join Caterpillar, you're joining a global team who cares not just about the work we do – but also about each other. We are the makers, problem solvers, and future world builders who are creating stronger, more sustainable communities. We don't just talk about progress and innovation here – we make it happen, with our customers, where we work and live.

Together, we are building a better world, so we can all enjoy living in it.

Operational Technology Cybersecurity Specialist – Team Lead Role Definition:

This role is team lead and subject matter expert for OT network passive monitoring, OT asset discovery, and OT Threat & Vulnerability Management (TVM). You will lead a team of analysts and own these capabilities end‑to‑end, ensuring reliable visibility, accurate data, and actionable vulnerability insights across OT environments.

The role blends technical credibility with strong leadership, communication, and influence, partnering closely with operations, network engineering, cybersecurity incident response (CSIRT), and global cybersecurity teams to support Caterpillar’s OT cybersecurity program.

What You Will Do:
  • Lead day‑to‑day operations for OT passive monitoring and OT TVM, including asset discovery, vulnerability intelligence, and security visibility.
  • Track OT security metrics, vulnerabilities, and trends and communicate clear insights to leadership.
  • Standardize solutions and deployment patterns across the enterprise to improve consistency, data quality, and audit readiness.
  • Provide OT context and insights to support CSIRT investigations and incident response.
  • Manage vendor relationships, escalations, and feature requests to maximize platform value.
  • Mentor and develop analysts, building both technical capability and operational discipline.
  • Stay current on OT relevant threats, vulnerabilities, and technologies and assess their impact.
What You Have:
  • Solid understanding of computer networking and network management.
  • Experience with network monitoring and health tools.
  • Experience with port and protocol usage.
  • Ability to communicate complex technical concepts to both technical and non‑technical audiences.
  • Demonstrated leadership skills, including mentoring, prioritization, and influencing without authority.
  • Strong problem‑solving skills, sound risk‑based judgment, and operations support mindset.
Top Candidates Will Have:
  • Bachelor’s degree in engineering, computer science, industrial technology, or another related field.
  • Solid understanding of OT networking and industrial environments.
  • Experience with OT security platforms, especially passive monitoring, and asset discovery solutions.
  • Experience leading or coordinating OT cybersecurity programs or teams.
  • Knowledge of OT/ICS standards and frameworks (e.g., NIST 800‑82, ISA/IEC 62443, ISO 27001).
  • Experience presenting vulnerabilities, metrics, or program status to leadership.
  • Relevant cybersecurity certifications (e.g., GICSP, CISSP, GRID, GPEN).
Skills Descriptors:
  • Communicating Complex Concepts: Knowledge of effective presentation tools and techniques to ensure clear understanding; ability to use summarization and simplification techniques to explain complex technical concepts in simple, understandable language appropriate to the audience.
  • Consulting: Knowledge of techniques, roles, and responsibilities in providing technical or business guidance to clients, both internal and external; ability to apply consulting knowledge appropriately.
  • Information Security Management: Knowledge of the processes, tools, and techniques of information security management; ability to deploy and monitor information security systems, while detecting, controlling, and preventing violations of IT security.
  • Cybersecurity Standards and Policies: Knowledge of developing cybersecurity policies, standards, and procedures; ability to develop and communicate policies, standards and procedures that guide interactions with customers.
  • Cybersecurity

    Risk Management:

    Knowledge of tools, techniques, approaches, and processes of cybersecurity risk management; ability to ensure organizational network…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary