Job Description:
The OT/Lab Cybersecurity Engineer is responsible for designing, implementing, and maintaining secure Operational Technology (OT) and laboratory environments in alignment with enterprise cybersecurity standards. This role plays a key part in ensuring compliance, protecting Controlled Unclassified Information (CUI), and enabling secure operations across research, testing, and production environments.
Key Responsibilities:
Design & Security Architecture: Develop and secure lab and OT network environments in accordance with corporate cybersecurity frameworks and best practices.
Data Protection: Configure, manage, and monitor Varonis, Data Loss Prevention (DLP), and removable media control solutions to safeguard sensitive data.
Compliance & Governance: Support CUI compliance initiatives, including asset sanitization, secure data handling, and readiness for internal and external audits.
Access & Recovery: Develop and maintain access control models and participate in disaster recovery and business continuity planning specific to lab and OT systems.
Technical Review: Evaluate and provide security guidance on architecture diagrams, data flow documents, and new project intake proposals to ensure alignment with security standards.
Collaboration: Partner with IT, engineering, and compliance teams to identify risks, implement mitigations, and promote cybersecurity awareness across operational environments.
Professional Skills:
-
Bachelor’s degree in Cybersecurity, Computer Engineering, Information Technology, or a related field (or equivalent experience).
-
5+ years of experience in cybersecurity, with at least 2+ years focusing on OT or lab environments.
-
Hands-on experience with Varonis, DLP tools, and removable media controls.
-
Strong understanding of CUI handling, NIST 800-171, or other relevant compliance frameworks.
-
Experience developing access control workflows, incident response, and disaster recovery plans.
-
Excellent communication and documentation skills; ability to interface with technical and non-technical stakeholders.
-
Relevant certifications such as CISSP, GICSP, CISM, or Security+.
-
Familiarity with SIEM, endpoint protection, or industrial control system (ICS) security solutions.
-
Experience supporting audit preparation and security assessments in regulated environments.






