Cybersecurity Operational Technology Specialist
Date: Dec 4, 2025
Location: SA, 12345
Company: WTTCO
Job Purpose
The job holder is responsible for the development of cybersecurity operational technology activities by monitoring, testing, identifying and dealing with cybersecurity assets threats and incidents to protect WTCO from any cyber-attacks or threats.
Key Roles and Responsibilities
- Identify opportunities for continuous improvement, practices, cost optimization, and productivity & efficiency improvement.
- Ensures compliance with all applicable laws, rules, regulations, and standards within WTCO and related functions such as but not limited to (HC, HSSE, Risk, Cybersecurity, etc..).
- Escalate problems to ensure case/issue is closed efficiently and in a timely manner.
- Ensure assessing and developing the effectiveness of WTCO's' cybersecurity operational technology enhancement capabilities
- Ensure identifying technical vulnerabilities that may lead to a cyber breach based on the simulated cyber-attack results on assets, and the remediation of vulnerabilities on running systems, networks and applications.
- Develop assets penetration tests and vulnerability assessments of systems and networks on a periodic basis to validate WTCO’s resilience and identify weak areas and provide recommendations on actions to be taken.
- Ensure protecting the confidentiality, integrity, and availability of WTCO's assets data and information, in line with WTCO's policies & procedures, and the relevant regulations and legislation.
Key Roles and Responsibilities 2
- Ensure protecting the information and technical of the assets from third-party and cloud computing by applying cybersecurity operational technology requirements of cloud computing and hosting.
- Ensure applying cybersecurity operational technology incident response program as a plan of action that is developed based on anticipated risks and thorough post-event analysis.
- Develop the identification and detection of cybersecurity operational technology events and threats in a timely manner and deal with them effectively to prevent or reduce the negative impacts on WTCO's operations.
- Develop, collect, analyze and monitor cybersecurity operational technology events to detect cyber-attacks early, with the aim of preventing or minimizing their negative impacts on WTCO’s operations.
- Perform all day-to-day cybersecurity operational technology on WTCO's systems and ensure that they are properly performing in accordance with WTCO's standards, procedures, and best practices.
- Ensure implementing cybersecurity operational technology vendor assessment across WTCO and projects.
- Ensure implementing cybersecurity operational technology requirements and ensure that relevant regulations and legislation are adhered to.
Key Roles and Responsibilities 3
Education Requirements
Experience Requirements
Job Purpose
The job holder is responsible for the development of cybersecurity operational technology activities by monitoring, testing, identifying and dealing with cybersecurity assets threats and incidents to protect WTCO from any cyber-attacks or threats.
Key Roles and Responsibilities
- Identify opportunities for continuous improvement, practices, cost optimization, and productivity & efficiency improvement.
- Ensures compliance with all applicable laws, rules, regulations, and standards within WTCO and related functions such as but not limited to (HC, HSSE, Risk, Cybersecurity, etc..).
- Escalate problems to ensure case/issue is closed efficiently and in a timely manner.
- Ensure assessing and developing the effectiveness of WTCO's' cybersecurity operational technology enhancement capabilities
- Ensure identifying technical vulnerabilities that may lead to a cyber breach based on the simulated cyber-attack results on assets, and the remediation of vulnerabilities on running systems, networks and applications.
- Develop assets penetration tests and vulnerability assessments of systems and networks on a periodic basis to validate WTCO’s resilience and identify weak areas and provide recommendations on actions to be taken.
- Ensure protecting the confidentiality, integrity, and availability of WTCO's assets data and information, in line with WTCO's policies & procedures, and the relevant regulations and legislation.
Key Roles and Responsibilities 2
- Ensure protecting the information and technical of the assets from third-party and cloud computing by applying cybersecurity operational technology requirements of cloud computing and hosting.
- Ensure applying cybersecurity operational technology incident response program as a plan of action that is developed based on anticipated risks and thorough post-event analysis.
- Develop the identification and detection of cybersecurity operational technology events and threats in a timely manner and deal with them effectively to prevent or reduce the negative impacts on WTCO's operations.
- Develop, collect, analyze and monitor cybersecurity operational technology events to detect cyber-attacks early, with the aim of preventing or minimizing their negative impacts on WTCO’s operations.
- Perform all day-to-day cybersecurity operational technology on WTCO's systems and ensure that they are properly performing in accordance with WTCO's standards, procedures, and best practices.
- Ensure implementing cybersecurity operational technology vendor assessment across WTCO and projects.
- Ensure implementing cybersecurity operational technology requirements and ensure that relevant regulations and legislation are adhered to.
Key Roles and Responsibilities 3
Education Requirements
Experience Requirements
Key Communications
Internal Stakeholders
- All Departments
External Stakeholders
- Consultants/Contractors
- Vendors/Suppliers/Service providers
- Government authorities and entities
Disclaimer
The above job description is meant to describe the general nature and level of work being performed; it is not intended to be constructed as an exhaustive list of all responsibilities, duties, and skills required for the position. Accordingly, there is no way this Job Description states or implies that these are the only duties to be performed by the employee in this position. Employees will be required to follow any other job-related instructions and to perform other job-related duties.
Job Purpose
The job holder is responsible for the development of cybersecurity operational technology activities by monitoring, testing, identifying and dealing with cybersecurity assets threats and incidents to protect WTCO from any cyber-attacks or threats.
Key Roles and Responsibilities
- Identify opportunities for continuous improvement, practices, cost optimization, and productivity & efficiency improvement.
- Ensures compliance with all applicable laws, rules, regulations, and standards within WTCO and related functions such as but not limited to (HC, HSSE, Risk, Cybersecurity, etc..).
- Escalate problems to ensure case/issue is closed efficiently and in a timely manner.
- Ensure assessing and developing the effectiveness of WTCO's' cybersecurity operational technology enhancement capabilities
- Ensure identifying technical vulnerabilities that may lead to a cyber breach based on the simulated cyber-attack results on assets, and the remediation of vulnerabilities on running systems, networks and applications.
- Develop assets penetration tests and vulnerability assessments of systems and networks on a periodic basis to validate WTCO’s resilience and identify weak areas and provide recommendations on actions to be taken.
- Ensure protecting the confidentiality, integrity, and availability of WTCO's assets data and information, in line with WTCO's policies & procedures, and the relevant regulations and legislation.
Key Roles and Responsibilities 2
- Ensure protecting the information and technical of the assets from third-party and cloud computing by applying cybersecurity operational technology requirements of cloud computing and hosting.
- Ensure applying cybersecurity operational technology incident response program as a plan of action that is developed based on anticipated risks and thorough post-event analysis.
- Develop the identification and detection of cybersecurity operational technology events and threats in a timely manner and deal with them effectively to prevent or reduce the negative impacts on WTCO's operations.
- Develop, collect, analyze and monitor cybersecurity operational technology events to detect cyber-attacks early, with the aim of preventing or minimizing their negative impacts on WTCO’s operations.
- Perform all day-to-day cybersecurity operational technology on WTCO's systems and ensure that they are properly performing in accordance with WTCO's standards, procedures, and best practices.
- Ensure implementing cybersecurity operational technology vendor assessment across WTCO and projects.
- Ensure implementing cybersecurity operational technology requirements and ensure that relevant regulations and legislation are adhered to.
Key Roles and Responsibilities 3
Education Requirements
Experience Requirements