SBN

ICS/SCADA Security Specialist/Technician Role

SCADA technicians play an indispensable role in sectors like energy, oil and gas, water treatment, manufacturing and pharmaceutical development. In a nutshell, they ensure that automated, remote control systems are functioning properly and securely. 

What does a SCADA technician do? 

The work performed by SCADA technicians is highly technical. Their tasks include setting up the SCADA system, in addition to installing, calibrating, and maintaining equipment. A major responsibility is watching the system for any signs of failure. If the technician detects a failure, they need to rapidly diagnose the problem and fix it as quickly as possible. After all, an entire factory or energy grid may depend on it! 

Keeping the system secure and free of intruders is another key responsibility for SCADA technicians. You’ll need to monitor the system constantly for malware and other attacks on the infrastructure. This requires around-the-clock monitoring, so a SCADA technician must be prepared to work a flexible schedule and react to issues on very short notice. 

Salary

The average salary for an ICS/SCADA technician is $50,000 per year, which is equivalent to a mean hourly rate of $24.00. In reality, your annual salary may fall anywhere from $40,000 to $60,000. 

The exact dollar amount depends on a constellation of variables, including your experience level, the cost of living in your area, and the company you plan to work for. You’re also likely to start out at the lower end of the spectrum early in your career and work your way up as you receive raises and gain valuable professional skills and experiences. 

Required skills 

SCADA technicians are responsible for ensuring a vast web of networks, control devices and data circuits are functioning properly and securely. This type of work demands a disciplined, detail-oriented work style. A (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Christine McKenzie. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/xZAg1DZpt4I/