Must Have Skills & Experience:
Hands on experience in Cyber Security, Information Security, or Product Security roles.
Strong hands-on expertise with Linux security (preferably Debian/Ubuntu/RHEL-based environments).
Experience with system hardening, secure configuration baselines, and access control models.
Deep understanding of network security, segmentation concepts, firewalls, VPNs, TLS, and secure protocols.
Experience implementing identity and access management including RBAC, certificate-based authentication, or PKI.
Knowledge of zero-trust architecture and secure edge or distributed system design.
Proven experience with vulnerability management, threat monitoring, and remediation processes.
Familiarity with security standards and frameworks such as IEC62443, NIST, ISO 27001, CIS Benchmarks, or equivalent.
Experience collaborating with engineering teams to integrate security into development and deployment workflows.
Strong documentation and stakeholder communication skills.
Good to Have Skills & Experience:
Experience working in Operational Technology (OT), Industrial Systems, Energy, Manufacturing, or IoT environments.
Exposure to secure boot, hardware root of trust, TPM, or embedded device security.
Experience with DevSecOps, CI/CD security automation, and infrastructure-as-code security practices.
Knowledge of container security, edge orchestration platforms, or lightweight Kubernetes distributions.
Familiarity with compliance programs such as NERC CIP, NIS2, or similar regulatory requirements.
Experience with certificate lifecycle management, SCEP, LDAP, or enterprise identity integrations.
Exposure to threat modelling methodologies (STRIDE, MITRE ATT&CK, etc.).
Experience building security monitoring strategies and incident response playbooks.
Soft Skills:
Strong problem-solving and analytical skills.
Excellent communication and cross-functional collaboration skills.
Proactive attitude and ability to work independently or in a team.
Strong documentation and presentation skills.