Remote Operational Technology Jobs in Leamington Spa

3 of 3 Remote Operational Technology Jobs in Leamington Spa

Security Architect (Utilities / Guardrails)

Royal Leamington Spa, England, United Kingdom
Hybrid / WFH Options
JR United Kingdom
/Guardrails) Utilities Predominantly remote: onsite in Warwick maybe 1 day per month 6 months In short: Security Architect, ideally, from a Utilities background (CNI and an appreciation of OT) required to review and design control guardrails covering Cloud and on-prem technology. Strong knowledge around CAF is required to be successful in this role. In full: As a Security … ll combine excellent communication skills, strong technical knowledge (including emerging Digital technologies), and a practical approach to real-world risk reduction. Key responsibilities include the following: Securely integrate new technology capabilities into business products and services, with a focus on ensuring the security of gas operations Define and document security architecture blueprints for new systems and applications, including threat … Experienced in cloud security architectures (AWS, Azure, GCP) and associated security technologies. Proven experience designing and implementing security solutions for complex enterprise environments Familiarity with ICS/SCADA/OT environments and architecture, along with industry-relevant standards such as NIST, CIS benchmarks and CAF Framework Fosters strong working relationships with others and will be able to collaborate with people More ❯
Posted:

Security Consultant - NESO

Royal Leamington Spa, England, United Kingdom
Hybrid / WFH Options
National Energy System Operator
net-zero operability by 2025. Title: Security Consultant - NESO Location: Warwick, GB, CV34 6DA Division: NESO Security Job Type: Full Time Requisition Number: 66748 Department: ESO Job Function: Information Technology Description About the Role NESO (National Energy System Operator) is on a digital and transformative journey. We are transforming the way that we operate and are in the process … ago Birmingham, England, United Kingdom 2 weeks ago Birmingham, England, United Kingdom 1 day ago Birmingham, England, United Kingdom 4 days ago Cyber Security Manager Operational Technology (OT) West Midlands, England, United Kingdom 3 weeks ago SC cleared - Cybersecurity Certification Consultant IT Infrastructure and cyber security Team Lead Birmingham, England, United Kingdom 2 days ago Cyber Security Manager … Operational Technology (OT) Rugby, England, United Kingdom 5 days ago Internal Audit - Global Banking and Markets Engineering, Cyber Security SME - Vice President West Midlands, England, United Kingdom 1 week ago Check Team Members/Cyber Consultants/Pen Testers Principal OT Cyber Security Consultant, Utilities & Defence (UK Wide) Birmingham, England, United Kingdom 1 week ago Lecturer in Cyber More ❯
Posted:

Cyber Threat Intelligence Analyst

Royal Leamington Spa, England, United Kingdom
Hybrid / WFH Options
Adecco
actors. What You'll Be Doing: In this role, you'll lead intelligence gathering and analysis to help identify, track, and counter cyber threats targeting Operational Technology (OT) and Critical National Infrastructure (CNI). Your research will inform the work of threat hunters, detection engineers, and security teams - and play a central part in strengthening national cyber resilience. … open sources, dark web communities, and commercial threat feeds. Communicate threat trends and intelligence findings clearly to both technical and non-technical stakeholders. Stay ahead of evolving threats in OT, ICS, and cloud-based environments. What We're Looking For: You'll be a natural problem-solver with a proactive mindset and a passion for detail. Ideally, you'll bring … Proven analytical skills with a methodical approach to intelligence gathering. Strong stakeholder management and communication capabilities. A solid grasp of cyber threat landscapes, particularly those affecting OT/CNI environments. Experience with intelligence frameworks such as MITRE ATT&CK. Familiarity with tools and technologies used in threat intelligence and monitoring. An inquisitive, self-driven approach and a commitment to continual More ❯
Posted: