Submitting more applications increases your chances of landing a job.

Here’s how busy the average job seeker was last month:

Opportunities viewed

Applications submitted

Keep exploring and applying to maximize your chances!

Looking for employers with a proven track record of hiring women?

Click here to explore opportunities now!
We Value Your Feedback

You are invited to participate in a survey designed to help researchers understand how best to match workers to the types of jobs they are searching for

Would You Be Likely to Participate?

If selected, we will contact you via email with further instructions and details about your participation.

You will receive a $7 payout for answering the survey.


User unblocked successfully
https://bayt.page.link/f8czKP7GvUommB6RA
Back to the job results
Other Business Support Services
Create a job alert for similar positions
Job alert turned off. You won’t receive updates for this search anymore.

Job description

Company Description

Bosch Global Software Technologies Private Limited is a 100% owned subsidiary of Robert Bosch GmbH, one of the world's leading global supplier of technology and services, offering end-to-end Engineering, IT and Business Solutions. With over 27,000+ associates, it’s the largest software development center of Bosch, outside Germany, indicating that it is the Technology Powerhouse of Bosch in India with a global footprint and presence in the US, Europe and the Asia Pacific region.



Job Description

Roles & Responsibilities :
•       Design and implement comprehensive end-to-end cybersecurity architecture for OT/ICS environments.


•       Develop and maintain security reference architectures and blueprints for Linux-based SCADA control systems


•       Conduct comprehensive threat modeling, risk assessments, and vulnerability analysis for critical infrastructure systems


•       Define network segmentation strategies and security zones for OT/IT convergence environments


•       Establish defense-in-depth strategies and implement zero-trust principles for industrial control systems


•       Lead enterprise-wide Linux hardening initiatives including OS-level security configurations, secure boot implementation.


•       Design and enforce file system security policies, implement robust logging and auditing mechanisms, and establish continuous monitoring frameworks


•       Harden network stack configurations including firewall rules secure protocol implementations, and network segmentation strategies


•       Develop and maintain Linux hardening baselines, security benchmarks and automated compliance validation frameworks


•       Minimize attack surface through service reduction, secure default configurations, and elimination of unnecessary software components


•       Implement security controls Required to secure MQTT communication protocols.


•       Design and implement secure architectures for visualization platforms


•       Establish OT-specific security monitoring, anomaly detection, and incident response capabilities


•       Develop and implement security controls for web-based UI/UX operational dashboards


•       Collaborate with development teams to embed security into web applications, ensuring secure coding practices


•       Ensure implementation and enforcement of IEC 62443 controls during the development and deployment phases.


•       Maintain compliance with global OT cybersecurity best practices and regulatory requirements


•       Develop and maintain security policies, procedures, and technical documentation


•       Perform regular vulnerability assessments, penetration testing coordination, and security gap analysis


•       Stay current with emerging threats, vulnerabilities, and security technologies relevant to OT/ICS environments



Qualifications

Mandatory Skills


  • Linux Security Architecture & Hardening


  • OT/ICS Cybersecurity Architecture Design


  • OT Risk Assessment & Risk Management Frameworks


  • SCADA Security (Linux-Based Control Systems)


  • Network Security & Segmentation


  • MQTT Protocol Security


  • IEC 62443 Implementation & Compliance


  • Defense-in-Depth Security Architecture


  • Vulnerability Management & Threat Modeling


  • OT Security Monitoring, Logging & Incident Response


Good-to-Have Skills


  • Energy / Battery Storage / Renewable Energy Domain Experience


  • Advanced UI/UX Security


  • DevSecOps Integration


  • SIEM & SOAR Platforms (Splunk, QRadar, Sentinel)


  • Advanced Threat Intelligence & Threat Hunting


  • Endpoint Detection & Response


Education & Experience


•       Bachelor’s degree in computer science, Cybersecurity, Information Technology, Engineering, or related field


•       10-12 + years of experience in cybersecurity


•       Expert-level knowledge of Linux system hardening and secure configuration


•       Extensive hands-on experience in OT cybersecurity, SCADA systems, and ICS environments


•       Proven expertise in implementing IEC 62443 controls and compliance frameworks for industrial systems


•       Strong knowledge of MQTT protocol security, including TLS/SSL implementation, authentication mechanisms, and authorization controls


•       Experience securing web-based applications and UI/UX systems with knowledge of OWASP Top 10


•       Strong understanding of network security principles including firewalls, VPNs, network segmentation, and secure protocols


Preferred Qualifications


•       Master's degree or Bachelor Degree in Cybersecurity, Computer Science, or related technical field


•       Professional certifications such as GICSP (Global Industrial Cyber Security Professional), CISSP, CISM, CEH, or OSCP


•       Specific experience in the energy sector, renewable energy, or battery energy storage systems




This job post has been translated by AI and may contain minor differences or errors.

You’ve reached the maximum limit of 15 job alerts. To create a new alert, please delete an existing one first.
Job alert created for this search. You’ll receive updates when new jobs match.
Are you sure you want to unapply?

You'll no longer be considered for this role and your application will be removed from the employer's inbox.