Job Title: T&T | Cyber: D&R | Assistant Manager | OT Security Monitoring | Bengaluru
Job Title: Assistant Manager – OT SOC (Claroty, Nozomi & CrowdStrike)
Location: Preferably Bengaluru, Karnataka
Department: Operational Technology Security Operations Center (OT SOC)
Reports To: OT SOC Manager / Cybersecurity Lead
Job Summary:
We are looking for a proactive and technically skilled Assistant Manager to support OT SOC operations with a focus on threat detection, incident coordination, and endpoint security using Claroty, Nozomi, and CrowdStrike platforms. The role also involves handling and responding to client requirements, participating in weekly/monthly calls, and conducting training sessions. The ideal candidate will have 4+ years of experience in OT cybersecurity, with hands-on exposure to industrial network monitoring, alert triage, and incident response in manufacturing or critical infrastructure environments.
Key Responsibilities:
CrowdStrike Incident Management & Technical Support
- Analyze CrowdStrike Falcon detections including behavioural indicators, custom IOAs, and threat intelligence feeds.
- Investigate process trees, parent-child relationships, command-line arguments, registry modifications, and file system activity.
- Identify and assess malicious behavior such as credential dumping, lateral movement, persistence mechanisms, and data exfiltration.
- Use Real Time Response (RTR) to perform remote host investigations and remediation actions .
- Block malicious file hashes and prevent execution across the environment using CrowdStrike’s hash blocking capabilities.
- Troubleshoot sensor-related issues including:
- Installation and uninstallation failures
- Sensor upgrade errors and version mismatches
- Devices stuck in Reduced Functionality Mode (RFM)
- Tagging inconsistencies and policy misalignment
- Assist in sensor deployment, reinstallation, and policy validation across OT and IT assets.
- Perform inventory cleanup and ensure accurate asset visibility in the Falcon console.
Claroty & Nozomi Investigation & Analysis
- Alert Triage & Investigation:
- Monitor and triage alerts generated by Claroty and Nozomi platforms across OT environments.
- Investigate alerts related to unauthorized communications, protocol violations, asset behavior anomalies, and policy breaches.
- Analyze alert metadata including source/destination IPs, ports, protocols, and payloads to determine severity and impact.
- Perform deep packet inspection using integrated tools or external utilities like Wireshark to analyze traffic patterns and validate alerts.
- Decode industrial protocols (Modbus, DNP3, OPC, S7comm, etc.) to identify command misuse, unauthorized reads/writes, and suspicious control messages.
- Capture and review PCAP files for forensic analysis and correlation with asset behavior.
- Fine-tune detection rules and alert thresholds to reduce false positives and improve detection accuracy.
- Customize use cases based on factory-specific protocols, asset types, and operational workflows.
- Collaborate with platform vendors and internal teams for rule updates, feature enhancements, and troubleshooting.
Client Engagement & Proactive Support
- Respond to client queries and requirements related to Claroty, Nozomi, and CrowdStrike platforms.
- Participate in weekly/monthly client calls to provide updates, discuss incidents, and share insights.
- Deliver cybersecurity awareness sessions and technical training to client stakeholders.
- Maintain task trackers and follow-up logs to ensure accountability and timely closure of action items.
Qualifications:
- Bachelor’s degree in Cybersecurity, Information Technology, or related field.
- 4+ years of experience in OT/ICS cybersecurity or SOC operations.
- Hands-on experience with Claroty, Nozomi, and CrowdStrike platforms.
- Understanding of industrial protocols (Modbus, DNP3, OPC, etc.) and ICS/SCADA architectures.
- Familiarity with SIEM tools, threat intelligence, and incident response processes.
- Strong analytical, communication, and documentation skills.
Preferred Certifications:
- GICSP, GRID, or equivalent OT security certifications.
- Claroty, Nozomi, or CrowdStrike platform certifications (if available).