Description:
Cyber SOC OT Security Analyst Level 2
Experience Required: 3-6 years
Location: Bengaluru
Shift: Must be flexible to work in 24/7 rotational shifts including weekends
Reports To: OT Security Operations Center Lead/ OT Security Manager
________________________________________
Role Overview:
The OT Security Analyst Level 2 (L2) plays a pivotal role in defending operational technology (OT) environments against evolving cyber threats. This role requires a deep understanding of security incident analysis, threat detection, and incident response, specifically tailored to Industrial Control Systems (ICS) and OT networks. The analyst will investigate complex security incidents within the OT infrastructure, collaborate with IT/OT teams, and enhance security posture through actionable insights.
________________________________________
Key Responsibilities:
Conduct in-depth analysis of security events and incidents within OT environments, leveraging SIEM and OT-specific monitoring tools.
Perform root cause analysis and develop incident timelines to support forensics and remediation efforts.
Apply standard incident response frameworks (e.g., NIST, MITRE ATT&CK for ICS, Cyber Kill Chain) for threat classification and response.
Use threat intelligence platforms and sandbox environments to investigate malware and suspicious artifacts in OT networks.
Analyze access logs, network traffic, and protocol behaviours across OT systems (e.g., SCADA, DCS, PLCs).
Support investigations related to unauthorized device communications, anomalous behaviours, or compromised industrial assets.
Collaborate with OT security engineers and external vendors to escalate and remediate incidents.
Refine alert rules and detection logic to reduce false positives and improve signal-to-noise ratio in OT SOC operations.
Document incident findings and support continuous improvement of the OT SOC playbooks and knowledgebase.
Liaise with the IT SOC and CIR (Cyber Incident Response) teams to align incident handling and cross-domain investigations.
Participate in threat hunting activities tailored for OT environments using behavioural analysis and attack-path simulation.
________________________________________
Technical Skills & Knowledge:
Strong understanding of OT/ICS protocols (Modbus, DNP3, OPC, etc.) and industrial network topologies.
Hands-on experience with OT cybersecurity tools and platforms (e.g., Nozomi Networks, Claroty, Dragos).
Familiar with ISA/IEC 62443, NIST SP 800-82, NIST CSF, and ISO 27001 compliance requirements for OT.
Proficiency in using SIEM systems (e.g., Microsoft Sentinel, Splunk, QRadar) for log correlation and event triage.
Understanding of firewalls, WAFs, proxies, and network segmentation principles in OT.
Working knowledge of tools such as THOR Scanner, VMRay, or Recorded Future is a plus.
Experience in vulnerability management and patch advisory for OT assets with limited patch cycles.
________________________________________
Nice to Have:
Exposure to Red Team/Blue Team exercises focused on OT/ICS.
Familiarity with GRC platforms and risk assessment tools tailored to OT.
Keyskills: Cyber SOC OT Security Analyst OPC Claroty Dragos Microsoft Sentinel Splunk QRadar DNP3 Nozomi Networks Modbus
Acesoft Labs India Pvt Ltd is an ISO 9001 BVQI certified, mid-sized staffing and technology services company managed by a team of dedicated and talented professionals with global IT experience. We provide specialized IT services & solutions and provide the finest talent to meet the custom...