Industrial Cybersecurity Engineer
Listed on 2026-03-08
-
IT/Tech
Cybersecurity, Systems Engineer
Who You’ll Work With
You will join one of our 45 offices in the US, be part of a committed team of over 1500 professionals, and work in teams and directly with our clients doing work that is shaping the world around us. You will be welcomed into a rapidly growing business and team and empowered to make an impact. You will be valued, cared for, and challenged on your path to becoming a world-class professional consultant and surrounded by leaders who are committed to creating an environment that enables you to realize your own success and fulfillment.
When you join Design Group as a Cybersecurity Engineer you are joining a team that will challenge you and position you for growth. In this role, you will work with a team of industry experts to help the world’s leading companies solve their most difficult problems. You will partner with seasoned leaders, technical specialists, and subject matter experts to deliver the highest quality solutions to our clients with consistency and accuracy.
You’ll Do
You’ll work individually and in teams to support capital projects and implement solutions for our clients. Together, you will help our clients make critical changes to improve their performance and realize their most important goals.
Client Engagement, Collaboration and Stakeholder Management- Collaborate closely with client teams, including IT, OT personnel, and management, to understand their unique requirements and align cybersecurity strategies with business objectives
- Effectively communicate technical information to both technical and non-technical stakeholders
- Manage project timelines, deliverables, and ensure successful implementation of cybersecurity solutions
- Think critically, spanning the sales process through client support, troubleshooting, and developing new use cases for internal and external utilization
- Understand client challenges and pain points related to OT/ICS cybersecurity
- Gather client requirements, design architecture, and present solutions for project quotes and implementation
- Plan, manage, and execute Proof of Concepts (PoCs) and technical evaluations
- Document and present PoC results, demonstrating the value and ROI of the solution
- Conduct comprehensive assessments of clients' OT systems, including ICs, SCADA systems, distributed control systems (DCS), and other industrial automation equipment
- Identify potential vulnerabilities, risks, and security gaps within the OT environment
- Analyze and evaluate the effectiveness of existing security controls and configurations
- Identify, assess, and mitigate cyber risks across OT systems, and networks
- Design and implement robust cybersecurity strategies, policies, and procedures tailored to the client's OT environment
- Design, develop, and deploy secure architectures, network segmentation, and access control mechanisms for OT systems
- Identify configurations to harden OT devices, controllers, and other components according to industry best practices and standards
- Design security solutions with existing networks and security infrastructure
- Integrate security solutions, such as firewalls, intrusion detection/prevention systems (IDS/IPS), and security information and event management (SIEM) systems, into the OT environment
- Identify and prioritize operational security issues and incidents within client OT environments
- Manage security tickets and incident response workflows, ensuring timely resolution and proper escalation procedures
- Investigate security alerts, anomalies, and potential threats across OT systems and networks
- Configure and optimize platform settings, rules, and policies to meet client-specific operational requirements
- Coordinate and collaborate with 3rd party application and equipment OEM vendors to integrate security solutions and resolve technical issues
- Provide ongoing platform usage guidance and best practices to maximize security effectiveness
- Develop and present mitigation options and remediation strategies for identified security risks
- Deliver ongoing operational support and technical guidance to ensure sustained security program effectiveness
- Monitor…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).