ABOUT US
CS Energy is a proudly Queensland-owned and based energy company that provides power to some of our state’s biggest industries and employers. We generate and sell electricity, we are an energy retailer to commercial and industrial businesses, and we are investing in new energy assets including renewable hydrogen, solar and wind farms, and battery storage.
Our vision is to lead Queensland's energy transformation to create a better future which recognises the key role we play in Queensland’s lifestyle and economy as a major energy supplier. We will continue to play a leading role as the energy industry transforms.
Every voice is important to us
CS Energy is proud to foster an environment that builds respect, promotes inclusiveness, celebrates diversity and embraces the unique skills and qualities of all our employees. Reasonable adjustments
THE OPPORTUNITY
The OT Cyber Security Architect is responsible for the design and implementation of secure Industrial Control Systems (ICS) at Callide and Kogan Power Stations. This role ensures that all systems adhere to industry standards such as IEC 62443, and that risk management is effectively integrated into the lifecycle of OT systems from identification through recovery. This will lead the design and secure implementation of ICS and OT systems in compliance with industry standards such as IEC 62443, NIST SP 800-82, and the Australian Energy Sector Cyber Security Framework (AESCSF).
Travel between CS Energy Brisbane, Callide, and Kogan sites on a recurring schedule is a requirement of this role as well as inter and intra state travel as required. Flexible hours of work as required to meet business needs.
This position is categorised as a Critical Worker role at CS Energy as per the Security of Critical Infrastructure Act 2018 (SOCI). For further information about SOCI Critical Worker roles please refer to CS-HR-58 or speak to your HR representative.
Key responsibilities include:
- Develop and maintain cyber security architecture for OT environments, ensuring alignment with enterprise security strategies and policies.
- Conduct risk assessments and implement risk mitigation strategies throughout the system lifecycle, focusing on identification, architecture, detection, response, and recovery.
