OT Cybersecurity Manager
Date de publication :
25 octobre 2024Taux d'activité :
100%Type de contrat :
Durée indéterminée- Lieu de travail :Warsaw
Johnson & Johnson is recruiting for an Operational Technology (OT) Cybersecurity Manager, located in Warsaw, Poland.
As a part of the Information Security Risk Management (ISRM) organization, the cybersecurity manager will advance the security program which covers Johnson and Johnson’s supply chain and research and development environments to protect our patients and critical operations. The lead will ensure strong controls are in place at our sites for applications, infrastructure, industrial IoT, automation equipment, site security and third-party vendor risk.
The cybersecurity manager will play a meaningful role to:
- Develop the OT security framework to ensure controls are implemented across our sites.
- Build training material for security team members and support partners to strengthen risk and vulnerability management, cybersecurity controls and governance.
- Implement security capabilities needed, partner with business partners to deploy and assist with adoption.
- Drive the advancement of the cyber security strategy for the J&J (Johnson & Johnson) global R&D and supply chain.
- Incorporate insights on emerging threats, technologies, and capabilities from the industry landscape into the OT cybersecurity program
Key Responsibilities include:
Working with the broader security team to design and deploy risk sensing, automation, and analytics solutions for critical security controls to advance vulnerability management and improve the risk posture of the OT environment.
Providing requirements to the engineering teams to advance threat monitoring and detection.
Strengthening the governance framework, including technical standards, training materials, and implementation guidelines to provide visibility of risk posture and improvements.
Continuously improve the OT cyber security framework by enhancing the coverage and integration security tools and design patterns (e.g., ICE (Isolated Computing Environment) firewall deployments, IDR, AV, SIEM, deception technology).
Actively monitor new threats and vulnerabilities, engaging IT (Information Technology) and Engineering teams on appropriate actions to address them.
Contact
Synthes GmbH