You are viewing a preview of this job. Log in or register to view more details about this job.

Cybersecurity Coordinator

For further inquiries about this opportunity, please contact one of our Talent Specialists, Lavanya at (224) 369 0873, klavanya@divihn.com
 (or) Sri, at (630) 847 0953, sbalan@divihn.com


Title: Cybersecurity Coordinator
Duration: 12 Months with plans to convert to full‑time
Location: Altavista, VA

Travel: Minimal; possible conferences or external training only

Hybrid (1 day WFH per week)


Only W2 candidates are eligible for this position. Third-party or C2C candidates will not be considered.


Job Description:
The Cybersecurity Coordinator plays a critical role in protecting the organization’s digital assets, systems, and infrastructure. This position involves designing secure architectures, performing risk assessments, threat modeling, implementing cybersecurity controls, and ensuring compliance with industry standards and regulatory requirements across Abbott Nutrition. The coordinator will work cross-functionally with IT, Engineering, Operations, and Compliance teams to maintain a robust cybersecurity posture across manufacturing environments.


Key Responsibilities
• Conduct cybersecurity risk assessments for software, systems, and network infrastructure.
• Perform threat modeling using tools such as STRIDE.
• Conduct and support vulnerability assessments and penetration testing.
• Ensure compliance with relevant standards and regulations (e.g., ISO 27001, NIST SP 800-82, FDA, HIPAA, GDPR, PCI DSS, etc).
• Monitor and interpret changes in global cybersecurity regulations and standards, integrating them into Abbott Nutrition policies and procedures.
• Support internal and external audits, including remediation coordination at Abbott Nutrition sites.
• Collaborate with engineering and development teams to design secure system architectures.
• Experience with secure coding practices and encryption technologies.
• Guide teams in applying cybersecurity controls throughout the software development lifecycle (SDLC).
• Monitor cybersecurity threats and develop mitigation strategies.
• Respond to and investigate cybersecurity incidents, identifying root causes and recovery actions.
• Utilize and manage security technologies including:
    o Firewalls
    o Intrusion Detection/Prevention Systems (IDS/IPS)
    o Endpoint protection
    o Data Loss Prevention (DLP)
    o SIEM systems
    o Log aggregation tools
• Support the deployment and operational use of Governance, Risk, and Compliance (GRC) platforms.
• Work with cross-functional teams (e.g., Engineering, QA, IT) and vendors to document and implement cybersecurity controls to achieve program requirements while enabling business outcomes.
• Subject Matter Expertise on security projects to ensure the timely, on-budget, and effective implementation of cyber security improvements that are operationally supported with validation methods in place to measure effectiveness.

Top required skills: Cybersecurity expertise; ability to perform risk assessments and vulnerability analysis; stakeholder management/influence.

Top preferred skills: Understanding of IT/OT architecture, familiarity with OT applications (OSI PI, Ignition, FactoryTalk, PLCs, DeltaV).


Qualifications
Education & Experience
• Bachelor’s degree in Computer Science, Engineering, Information Security/ cybersecurity, or related field.
• 5+ years of experience in cybersecurity, preferably in regulated industries such as food, beverage, healthcare/ pharma, or medical devices.
• Experience with cloud security, network protocols (SSL/TLS, VPNs, IPsec), and secure cloud-based applications.
• Familiarity with regulatory compliance (SOX, HIPAA, GDPR, FDA cybersecurity guidance).
• Proficiency in threat modeling, risk management, vulnerability management, and incident response.
• Experience securing both software and hardware systems in manufacturing environments.
• Strong understanding of cybersecurity frameworks (ISO 27001, NIST, SOC 2, HITRUST, NIST SP 800-82).

Systems used daily: ServiceNow (GRC, CMDB), Process X, Nucleus, RMS, Splunk or ARMS for asset inventory.

Personality traits: Pragmatic, persuasive, calm under pressure, good at translating security needs to operational language, strong at influencing without authority.


Certifications
• GICSP strongly preferred, CISSP, CISM, or equivalent certification preferred.