OPERATIONS TECHNOLOGY (OT) ADMINISTRATOR

Job Locations US-PA-Canonsburg
Job ID
2026-21960
# of Openings
1
Category
Information Technology

Overview

Location:Onsite near Bridgeville, PA

Job Type: Full Time Permanent position

Work Authorization: No Sponsorship

 

The A.C.Coy company has an immediate opening for an Operations Technology (OT) Administrator.  Ideal candidates must have 3+ years of professional IT experience with atleast 1+ years of OT administration or cybersecurity.

Responsibilities

 

  • Design, implement, and manage a comprehensive OT security program addressing risks in both IT and OT environments
  • Collaborate with IT and networking teams to deploy and maintain OT discovery solutions across the enterprise
  • Perform device discovery, classification, and risk assessments of OT environments
  • Research and develop mitigation strategies for identified OT risks in coordination with cybersecurity teams
  • Conduct OT risk and vulnerability assessments using industry-standard frameworks
  • Deploy OT-specific cybersecurity hardware and software tools
  • Develop and enforce security policies and procedures for OT systems
  • Monitor OT systems for security incidents and conduct investigations as needed
  • Lead or support responses to OT-related cybersecurity incidents
  • Collaborate with Information Security and Architecture teams to align all OT integrations with security standards
  • Document architectures and integrations used between OT platforms, systems, and vendors
  • Travel based on business needs (50-75%)

Qualifications

Education:

  • Bachelor’s degree in a related field or equivalent practical experience

Experience:

  • Minimum of 3 years of professional IT experience, with at least 1+ years focused on OT administration and/or cybersecurity
  • Proven experience working in OT security
  • Familiarity with industrial control systems (ICS) and other operational technologies in manufacturing environments
  • Strong understanding of cybersecurity risk management and mitigation strategies
  • Solid knowledge of networking, including TCP/IP, protocols, firewalls, and endpoint protection
  • Experience with cybersecurity frameworks (e.g., NIST, ISO 27001, etc.)

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed