The Sensoring & Monitoring Control Systems Cybersecurity Consultant will leverage 35 years of experience to support Customer Defensive Cyber Operations (DCO) by integrating OT cyber requirements into the Defensive Cyber Operations (DCO) community. Will oversee sensor deployments (IDCS VOLTRN) and work to drive OT incident detection/incident response capabilities into the community. Acting as a technical liaison to Customer cyber forces this mid-tier consultant will translate OT mission criticality into actionable plans to manage effectiveness of monitoring sensors and ensure personnel roles and certifications align with evolving threat-monitoring requirements. The role demands strong analytical acumen hands-on familiarity with security sensor (intrusion-detection) platforms and clear communication with both technical operators and senior leadership. Work is 40% onsite.
Responsibilities
OT Defense Cyber Operations Liaison (35%): Serve as the point of contact between sensor teams and DCO operators; prepare and deliver concise reports and briefings on sensor effectiveness and threat posture
Sensor Operations Support (25%): Prioritize and oversee the integration and deployment of IDCS and VOLTRN sensor platforms into Customer OT environments
Dashboard Development & Analytics (20%): Design and maintain real-time dashboards for monitoring sensor outputs trending key metrics and alert volumes
Workforce Certification Alignment (20%): Assess sensor-monitoring roles against DoD certification requirements recommend training/certification paths and track compliance
Requirements
US Citizenship; TS/SCI Clearance
3-5 years of experience in the following areas:
Sensor Deployment & Management Configuring deploying and tuning cybersecurity intrusion detection systems
Dashboard Analytics & Visualization Building and maintaining real-time threat dashboards (e.g. Splunk ELK or similar platforms)
Defensive Cyber Operations Support Collaborating with DCO teams to translate OT data into incident-detection and response actions
Control Systems Security Understanding of OT/ICS network protocols and how sensor data maps to control-system assets
Stakeholder Communication Preparing and presenting technical briefings and reports to both operators and senior leaders
Compliance & Certification Alignment Familiarity with workforce certification frameworks (e.g. DoD IAM CSSP) and mapping roles to sensor-monitoring requirements
Cyber Operations Previous working experience with Air Force cyber operations (OCO DCO Cyber Protection Teams Mission Defense Teams CSSP CVA-H toolkits etc.)
Cyber Training Working knowledge of Customer cyber career field training programs and pipelines
Cloud-Based Monitoring Experience integrating IDCS/VOLTRN or equivalent sensors with AWS/Azure security monitoring intrusion-detection systems and services; knowledge of cyber toolkits (CVA-H)
Machine-Learning Applications Applying basic ML techniques to identify anomalous patterns in OT/ICS telemetry
Data Fusion & Correlation Aggregating multiple sensor feeds and external intelligence sources to enrich detection capability
Incident Response Coordination Participating in playbook development and after-action reviews for sensor-generated alerts
GRC Tool Familiarity Working with eMASS or equivalent systems with sensor-monitoring control evidence
About Us For more than 20 years NewGen Technologies has solved our clients toughest IT challenges with integrity security and outstanding service by delivering both technology and talent. We have helped secure borders have used artificial intelligence (AI) to fight terror aided the identification of criminals and have helped to prevent crime through the introduction of team of Highly Cleared Specialists have hard-to-find skills and expertise in a wide spectrum of technologies to provide solutions that transform business processes and solve problems of national significance. #CJ
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.