Zero Trust Security for Real World Operations
Cybersecurity • Zero Trust • Critical Infrastructure Protection • Industrial IoT Security • Operational Technology Security
August 9
🏡 Remote – Anywhere in California
Zero Trust Security for Real World Operations
Cybersecurity • Zero Trust • Critical Infrastructure Protection • Industrial IoT Security • Operational Technology Security
• Work creatively with customer and internal stakeholders to define technical solutions that meet customer use cases and requirements using a combination of internal and in some cases 3rd party software/hardware/tools. • Create and present detailed technical and business proposals demonstrating how Xage addresses customer challenges, including solution architecture, use case description, and deployment schedules. • Represent Xage at industry events and conferences, including occasional speaking engagements. • Identify gaps in product functionality and flexibility and proactively work with product management and engineering organizations to address these gaps using a combination of internal R&D and technology/product partnerships.
• Demonstrated hands-on technical knowledge and experience working with industrial networking solutions, industrial control systems, or cybersecurity solutions (e.g., identity and access management). • Demonstrated success in creating winning solutions and proposals that result in customer wins and exceeded sales goals. • Demonstrated success forming technology solutions and system integration partnerships in industrial verticals. • Experience and understanding of the operational requirements of utility companies, oil & gas operators, renewable energy operators, and/or transportation operations. • Experience with product or service delivery with Identity and Access Management solutions. • Deep understanding of IT and OT network communication protocols. • Knowledge and understanding of various security control frameworks (e.g., IEC62443, NERC CIP, NIST, NCSC CAF). Knowledge of Perdue Reference Architecture. • Experience with the application of threat modeling or other risk identification techniques. • Knowledge and experience in cybersecurity assessments for both OT & IT security. • Good understanding of Operational Technologies such as Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA) software, RTUs, HMI, and Distributed Control Systems (DCS). • Strong experience with Windows, Active Directory, LDAP with knowledge of UNIX/Linux systems. • Ability to communicate & present to a range of technical and executive stakeholders. • Excellent architecture life-cycle design and documentation skills.
Apply Now