OT Security Consultant

Bureau Veritas Group
Greater London
11 months ago
Applications closed

Related Jobs

View all jobs

Operational Technology (OT) Security Consultant

Cyber Security Consultants - DV Cleared

Head of Digital Transformation

Operational Technology Risk Manager

Cyber Subject Matter Expert

System Engineer - Networks 2089

OT Security Consultant

UK - Home Based 

Imagine your customer is a leadingenergy providerorcritical infrastructure operator, specializing in the delivery of essential services that keep industries and communities running. As an OT security professional, your mission is ambitious: to optimize operational efficiency, ensure compliance with industry-leading certifications, and protect the systems at the heart of your client’s operations.

That’s where you step in. Through targeted training, you introduce your client to the world ofIEC 62443, the gold standard in OT cybersecurity. Our gap assessment identifies weaknesses in both processes and systems, ensuring a clear path to enhanced cybersecurity and compliance. You work side by side with your client, providing advisory and support to address challenges with precision and confidence.

With our expertise inpenetration testing,risk assessments, andindependent OT security assessments,you empower your client to achieve exceptional cyber resilience. From securing industrial control systems to safeguarding critical processes, your efforts not only strengthen defenses but pave the way for certification success.

Your success story? It’s not just about compliance, it’s about ensuring your client’s OT environment is resilient, secure, and ready for the future.

We are looking for an OT Security Consultant based in the United Kingdom, to be involved in security assessment projects for various industries.

As our OT Security Consultant you:

Perform advisory services on our client’s SCADA/ICS/OT infrastructure for small to large-sized projects. This will include security risk assessments based on IEC 62443 methodology, gap assessments, security maturity reviews, trainings and consultancy support;Provide support in security design and security architecture of industrial networks and provide recommendations to improve the design; Assist customers in establishing or extending their SCADA/ICS/OT security programby building joined roadmaps; Assist customers with secure digital transformation and Industry 4.0 initiatives;Interpret security vulnerabilities, risks, policies, and procedures concerning the operational business impact;Manage and execute assessments based on internationally recognized frameworks or specific frameworks developed by Secura and support in certification journey;Support our sales with your technical expertise;

You will work on gap assessments or risk assessments based on IEC62443, IT/OT site assessments, Threat Modeling, NIS compliance checks and Security Maturity Assessments. All these services are designed to support our customers to identify risks and improve their security resilience, no matter their current security maturity state. On top of these services, you will also provide specific OT security training, offer a comprehensive IT/OT security awareness behavior program, and perform OT security research.

You recognize yourself in the following:

A completed bachelor or master’s degree;Practical security experience within industrial networks and industrial devices like PLCs, DCS, Safety systems, and SCADA;Experience with industrial communication protocols, like Modbus, IEC104, and vendor-specific protocols; Experience with conducting risk assessments and threat modelings; Strong ability to communicate technical concepts and assessment results verbally and in written reports in simple terms; Knowledge of IEC 62443, MITRE ATT&CK for ICS, NIST CSF, NIST SP 800-82andrelevant regulations in EU and UK;Interest and ability to write exciting whitepapers and publications;A supportive and a proactive personality, you know how to attract and engage both customers and colleagues.

At Bureau Veritas Cybersecurity we have:

A strong focus on technical cybersecurity, delivering high-quality technical services in the field of digital security. You will be part of a team of motivated international specialists, where knowledge exchange is highly valued.

At Bureau Veritas Cybersecurity we provide an environment for you to develop your talents and stimulate your professional growth. Together, we work to safeguard the security and integrity of valuable data while facing the challenges of the everchanging cybersecurity world.

The Cybersecurity division from Bureau Veritas is fast-growing with ambitious goals. You will have the opportunity to grow along with us and shape your career allowing you to become an expert in your field. In terms of content, we offer you a diverse portfolio of exciting clients and projects.

Are you the OT Security Consultant we are looking for?

Apply Now!

Pre-employment screening and assessments are part of the selection process and annual social media screenings and check of criminal record will be conducted.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.