Uploaded by p1129288

Profinet and Fieldbus

advertisement
Profinet / ProFibus
https://www.profibus.com/technology/profinet/#tab2-208895
Shell ICS
https://arcadvisorygroup.sharepoint.com/sites/extranets/client-portal/arc-forums/Orla
ndo2018/Shell’s%20ICS%20Security%20Strategy.pdf?slrid=56cfb99e-c09a-7000-c7
6c-a9485dcf0bf5
Google - secureplant profinet
fieldbus
https://docplayer.net/21447674-Profibus-profinet-system-design.html
https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/CPwE/5-1/Network_Securi
ty/WP/CPwE-5-1-NetworkSecurity-WP/CPwE-5-1-NetworkSecurity-WP.pdf
You may recall I was in touch with you back in October/November last year
in regard to some potential IT Technician roles focussed around cyber
security of offshore equipment. I sent through your CV for review and had a
meeting with the Hiring Managers at the end of last year.
It now looks like the roles will be going ahead and these are likely to be a 3
year contract, commencing January 2019.
Can you advise me if this still might potentially be of interest?
Based primarily onshore at the Shell offices in Tullos, there will be a
requirement to travel offshore approximately 2-3 weeks a year. The job
description I have is as follows:
The successful candidate will be responsible for executing run and maintain cyber security
activities on ICS systems such as the security hardening, security patching, anti-virus
maintenance, backup/restore, access control reviews, asset inventory maintenance, and
server/desktop break/fix/configuration activities. Additionally, network support of the ICS
network firewalls, switches, routers, and cell modems is also required to configure new
network communication, fix broken communication, and review current device
configurations for cyber security risk. The CS-IT will also be called upon to assist with
project and discretionary work to design, build, and implement the IT solution for new
systems and deployments which may include network design, network equipment
configuration, system design, server building, and risk assessments.
The primary
working location is the Aberdeen office where work is executed remotely, however regular
on and offshore site travel is required.
Windows Server administration and networking
skills are required. GICSP and/or CCNA Industrial certifications are preferred along with
control & automation experience.
Hardening - closing ports (netstat, see what’s open etc). Closing services.
Removing unnecessary software (sccm to meter usage - Java / flash).
AV maintain - dat files. Into a DMZ the pushed to environment?
Backups - Veeam or similar?
Daily job. domain monitoring.
Reviewing reports from Threat Intel.
Reviewing alerts from Anomaly detection system and currently design
deployment into OT environment inc. switch reconfig for SPANs and
management console.
About to do a AV refresh looking at AEP options.
Working with SOC to investigate breaches of Use Cases using Splunk to
determine if threat or not.
Reviewing IPS / IDS rules (Fortigate) to maximise coverage.
Vulnerability management - designed process and rolling it out. Primarily
automated.
Managing Pentest vendors... talk about rubbish so far and intent.
planning Cyber response playbooks and simulations.
SecurePlant (Cisco and Yokogawa) with SecureSite used to control remote
access.
See my future in a hybrid engineering / CyberSec role - this is a great fit for
me.
Look forward to hearing from you
Kind Regards
Alan
Download