<span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;"><b>Operational Technology (OT) Security Engineer</b><br><b>Location:</b> Government site and/or off-site<br><b>Clearance:</b> DoD Secret (IT-II / Tier 3 eligible)</span></span></span><br><br><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;"><b>Position Summary</b></span></span></span><br><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Nationwide IT Services, NIS, is seeking an Operational Technology (OT) Security Engineer to perform project tasks supporting information assurance for OT systems. To integrate OT processes with IT systems to resolve cybersecurity and system challenges. Analyze security requirements and supports planning, design, development, testing, and integration of OT systems.</span></span></span><br> <div align="center" style="text-align:center;margin-bottom:11px;"><hr align="center" size="2" width="100%"></div><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;"><b>Key Responsibilities</b></span></span></span><ul style="margin-bottom:11px;"><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Manage POA&M entries (track findings, remediation, milestones) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Develop cybersecurity artifacts (STIGs, TCGs, IAVMs, RMF documentation) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Generate audit-ready reports (vulnerabilities, compliance, risk) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Translate technical findings into actionable recommendations </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Build automated workflows for remediation, compliance, and reporting </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Recommend risk-based mitigation strategies for OT environments </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Develop and maintain cybersecurity documentation and artifacts </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Implement OT-specific incident response plans </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Stay current on emerging OT threats and best practices </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Use tools such as Excel, Access, Power BI, and Power Platform </span></span></span></span></li></ul><div align="center" style="text-align:center;margin-bottom:11px;"><hr align="center" size="2" width="100%"></div><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;"><b>Required Qualifications</b></span></span></span><ul style="margin-bottom:11px;"><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">7+ years of cybersecurity policy experience </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Active DoD Secret clearance (IT-II / Tier 3 eligible) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Experience with OT protocols (Modbus, EtherNet/IP, IEC 61850, ICCP, DNP3, BACnet) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Knowledge of OT systems (SCADA, ICS, DCS, PLCs, HMIs, RTUs) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Understanding of secure OT architectures (segmentation, firewalls, IDS/IPS) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Experience with secure remote access and OT patch/update processes </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Familiarity with frameworks (NIST CSF, ISA/IEC 62443, NERC CIP) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Experience preparing for DoD cybersecurity inspections </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Knowledge of compliance and regulatory requirements </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Experience with vulnerability assessments and tools (ACAS, Nessus, Qualys, Forescout, EyeInspect) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">OT risk assessment experience (threats, vulnerabilities, impacts) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Knowledge of hardening, baselines, and compliance enforcement </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Experience with monitoring solutions, anomaly detection, threat intelligence </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Familiarity with OT forensics and incident analysis </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Understanding of patch and change management processes </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Ability to produce analytics and trend reports from security tools </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Knowledge of vendor/supply chain security practices </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Experience aligning IT and OT cybersecurity requirements </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Strong analytical, research, and communication skills </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Ability to work independently and collaboratively </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Experience with DoD cybersecurity policies and processes </span></span></span></span></li></ul><div align="center" style="text-align:center;margin-bottom:11px;"><hr align="center" size="2" width="100%"></div><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;"><b>Certifications / Training</b></span></span></span><ul style="margin-bottom:11px;"><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">ICS300 or equivalent OT/ICS training </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">DoD 8570 IAT Level II (current); DoD 8140E (future) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Forescout certification </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">DLA Computing Environment (M Account Access) </span></span></span></span></li><li style="margin-bottom:11px;"><span style="font-size:12pt;"><span><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Work Role: ISSM (722), Intermediate </span></span></span></span></li></ul><div align="center" style="text-align:center;margin-bottom:11px;"><hr align="center" size="2" width="100%"></div><h2 style="margin-top:11px;margin-bottom:5px;"><span style="font-size:16pt;"><span style="line-height:115%;"><span style="font-family:'Aptos Display', sans-serif;"><span style="color:#0f4761;"><span style="font-weight:normal;">Why Join Nationwide IT Services?</span></span></span></span></span></h2><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Nationwide IT Services is a trusted government contractor supporting Department of Defense customers. We offer the opportunity to work on high-impact cybersecurity missions alongside experienced professionals in a collaborative and growth-focused environment.</span></span></span><br><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Our benefits package includes medical, dental, and vision insurance, life, and disability insurance, 401(k) plan with employer match, paid holidays, PTO (sick/vacation), commuter benefits, employee assistance program (EAP), and educational reimbursement, along with Pet Insurance.</span></span></span><br><span style="font-size:12pt;"><span style="line-height:115%;"><span style="font-family:Aptos, sans-serif;">Nationwide IT Services, Inc. provides equal employment opportunities (EEO) to all qualified applicants regardless of race, color, religion, sex, national origin, sexual orientation, gender identity, genetics, disability, or protected veteran status.</span></span></span><br><br>