AMVETS Jobs

Job Information

Eaton Corporation Lead Engineer - Cybersecurity (Applied Cryptography) in Hadapsar, India

What you’ll do:

Lead Engineer - Cybersecurity (Applied Cryptographic Operations) will drive the implementation of Public Key Infrastructure (PKI) and Key Management System (KMS) to support the Cryptographic needs of Eaton Cyber-Physical products and lead the R&D activities associated with securing current and future Eaton Digital products.

Lead Engineer - Cybersecurity (Applied Cryptography) will be part of a global team of security experts in driving the cybersecurity initiative for Eaton’s product solutions in applied cryptographic operations. He/she will be responsible for:

• Plan the implementation of, execute and manage cryptographic technologies, such as Public Key Infrastructure (PKI) and Key Management System (KMS), for server/client implementations and to ensure all security, quality and compliance requirements are met.

• Guide product teams and develop expertise over the acceptable use of a PKI system and issuance of associated certificates.

• Assist and develop expertise over the acceptable use of a KMS and issuance of associated keys.

• Create technical documentation for all new or modified processes.

• Developing and executing initiatives designed to increase the domain expertise and solution efficiency for product engineering of PKI/KMS.

• Support the team to help analyze risk assessments and recommend acceptable use of encryption technology and security measures for OT/ICS devices or systems.

• Assist Eaton research labs in development of new technologies and techniques to secure OT/ICS devices or systems, such as intrusion detection, prevention, and cybersecurity resiliency initiatives.

• Execution of complex projects, tasks, and assignments with minimal or strong management direction, depending on project requirements

• Identifying and evaluating technologies and partners that can increase Eaton’s capabilities to address customer ICS/OT cybersecurity challenges and drive revenue growth for Eaton products and services.

• Keeping current with the Eaton intelligent products and platforms and maintain expert knowledge of specific applications. "

Qualifications:

  • Bachelor’s degree in Computer Science, Computer [Cyber]Security, Computer Engineering, Software Engineering, Electrical Engineering, or comparable degree.

  • Specialized degree (Masters/PhD) in any stream of security preferred.

  • 8-10 years of Overall experience

Skills:

• Self-driven professional with 8-10 years of experience

• At least 4 years of implementation/support experience in at least one of the following technologies / tools: PKI, KMS, or HSM

• Advanced level of knowledge of Public Key Infrastructure (PKI) systems

• Knowledgeable of encryption and key management security practices.

• Two or more years’ experience in the application of cryptography in OT/ICS devices or systems

• Excellent technical writing skills and the ability to organize and document process and procedures

• Ability to respond quickly and effectively to changing priorities.

• Is Security minded, and knows the security implications of every decision being made.

• Possesses ability to manage ambiguity and is able to seek out the needed information to make informed decisions

• Basic understanding of secure product development lifecycle including threat modeling, assessing cybersecurity risk, deriving cybersecurity requirements, and designing protection mechanisms for Cyber-Physical systems, devices, solutions in Electrical, Industrial & Mobility domains.

• Proven abilities of handling projects in International, multi-cultural environments.

• Ability to collaborate across multi-disciplinary teams (Eaton Research Labs, IT, Enterprise Centers of Excellence, product management, project management)

• Strong communication skills with proven abilities to present to Eaton's Global engineering and business leadership.

• Pragmatic mindset and customer-oriented attitude.

• Ability to coach and train lesser experienced developers, Penetration testers on PKI / KMS & Applied Cryptography.

• Stong analytical skills and target-oriented, action-oriented execution.

• Proven abilities to deliver excellent quality.

• Team player and flexibility in handling multiple constantly changing roles

DirectEmployers