기본 콘텐츠로 건너뛰기
Digital & Analytics Card@2X

Technology, Digital and Data

Manager Cybersecurity

위치 Brisbane, Queensland, Australia
게시된 날짜
신청자
계약 유형 Full time
작업 유형 Regular
요청 ID R0000368083

묘사

Career Area:

Technology, Digital and Data

Job Description:

Your Work Shapes the World at Caterpillar Inc.

When you join Caterpillar, you're joining a global team who cares not just about the work we do – but also about each other. We are the makers, problem solvers, and future world builders who are creating stronger, more sustainable communities. We don't just talk about progress and innovation here – we make it happen, with our customers, where we work and live. Together, we are building a better world, so we can all enjoy living in it.

Why This Role Exists
We build and operate large, mission‑critical software platforms that run in customer operational technology (OT) environments, often integrated with cloud services and enterprise systems.

These platforms must remain secure across trust boundaries—cloud, enterprise IT, and customer OT networks—while operating in environments actively targeted by real‑world adversaries.

This role exists to ensure those systems are secure by design, not by after‑the‑fact controls.

As the Security Architect, you will define, defend, and evolve the security architecture that allows modern, cloud‑connected applications to operate safely on customer OT networks. This is an architecture leadership role focused on system design, threat‑driven decisions, and long‑term risk reduction, not operational execution.

What You’ll Do

You are the security architecture authority for application platforms deployed into OT environments under Autonomy and Automation.

You will:

  • Own and evolve security architecture patterns across:

    • Authentication and authorization (human and machine)

    • API security and service‑to‑service trust

    • Data protection and trust boundary enforcement

  • Design architectures that safely bridge cloud services and customer OT networks

  • Apply modern network and IAM patterns in environments that are not cloud‑native

  • Explicitly incorporate Purdue Model principles, including zones, conduits, and segmentation, into architecture decisions

  • Define how applications securely communicate across:

    • Cloud ↔ Enterprise ↔ OT boundaries

    • High‑trust and low‑trust network zones

  • Lead architecture‑level threat modeling, with particular focus on:

    • “Red network” threats to OT environments

    • Lateral movement, protocol abuse, and weak segmentation

  • Establish reference security architectures for large Java‑based platforms operating on OT networks

  • Provide security architecture sign‑off at design and release decision points

  • Translate security requirements into clear, developer‑consumable guardrails

  • Influence platform and product roadmaps to remove systemic, repeatable security risks

Overall accountability for security outcomes remains with the Security Engineering Manager; you own the technical security architecture decisions that shape those outcomes.

How You’ll Work

This is an architecture‑first role, focused on making correct security decisions before systems are built and deployed.

You will work in environments that include:

  • Cloud services integrated with on‑premise and customer‑managed OT networks

  • Java application platforms (Spring / Spring Boot)

  • Modern IAM architectures (OAuth2, OIDC, service identities) adapted for constrained, non‑cloud‑native environments

  • Public Key Infrastructure (PKI) used to establish identity and trust for:

    • Services and applications

    • Devices and workloads operating in OT environments

  • Encrypted communications across all trust boundaries, including:

    • Cloud ↔ Enterprise ↔ OT

    • Zone‑to‑zone and conduit communications aligned to the Purdue Model

  • Segmented networks designed to limit blast radius and resist lateral movement

You will design and review architectures that:

  • Use PKI and certificates to authenticate systems, services, and endpoints

  • Enforce encryption in transit as a baseline, even in legacy or constrained OT networks

  • Explicitly mitigate red‑network threats, including credential theft, protocol abuse, and unauthorized east‑west movement

  • Balance strong security controls with real‑world customer and operational constraints

You will spend your time designing, reviewing, and influencing architecture, not administering tooling, rotating certificates, or operating infrastructure.

Explicitly Out of Scope

This role does not include:

  • Day‑to‑day vulnerability management or ticket queues

  • SOC, incident response, or on‑call rotations

  • Compliance audit execution or evidence collection

  • Cloud infrastructure ownership or operations

  • Hands‑on CI/CD tooling administration

This role exists to make hard architecture decisions early, not to clean up avoidable mistakes later.

What We’re Looking For

You are likely a strong fit if you have:

  • Strong understanding of cloud security fundamentals (identity, networking, trust boundaries, shared responsibility)

  • Experience designing systems that run on customer OT networks, not just enterprise IT or cloud

  • Deep understanding of modern network and IAM patterns applied outside pure cloud environments

  • Working knowledge of the Purdue Model, including zones, conduits, and segmentation strategies

  • Experience securing network communications in OT environments, including:

    • Encrypted communications

    • Authentication of services and endpoints

    • Mitigation of lateral movement and protocol abuse

  • Ability to reason clearly about red‑network threats to OT systems and design architectural mitigations

  • Strong background in Java application development and application security

  • Expertise in authentication and authorization architectures (OAuth2, OIDC, identity federation)

  • Experience defining API security patterns and service‑to‑service trust models

  • Advanced threat modeling skills at system and platform scale

  • Confidence making—and defending—architecture decisions that impact multiple teams

Nice to Have

  • Experience with regulated, safety‑critical, or industrial systems

  • Familiarity with zero‑trust concepts applied in constrained networks

  • Prior experience partnering closely with AppSec, platform, and product teams

Experience Profile

  • 7–10+ years in software engineering and security

  • 3–5+ years in a security architecture or senior security engineering role

  • Demonstrated ownership of architecture decisions across multiple platforms or products

This position requires working onsite five days a week.

Visa Sponsorship is not available for this position.

Posting Dates:

May 14, 2026 - May 28, 2026

Caterpillar is an Equal Opportunity Employer. Qualified applicants of any age are encouraged to apply

Not ready to apply? Join our Talent Community.

인재 커뮤니티

최신 채용 정보와 Caterpillar 소식을 받아보세요.

다양성을 갖춘 팀 확인하기
웃고 있는 사람들의 콜라주