At Johnson & Johnson, we believe health is everything. Our strength in healthcare innovation empowers us to build a world where complex diseases are prevented, treated, and cured, where treatments are smarter and less invasive, and solutions are personal. Through our expertise in Innovative Medicine and MedTech, we are uniquely positioned to innovate across the full spectrum of healthcare solutions today to deliver the breakthroughs of tomorrow, and profoundly impact health for humanity. Learn more at jnj.com.
As guided by Our Credo, Johnson & Johnson is responsible to our employees who work with us throughout the world. We provide an inclusive work environment where each person is considered as an individual. At Johnson & Johnson, we respect the diversity and dignity of our employees and recognize their merit.
Job Function:
Technology Enterprise Strategy & SecurityJob Sub Function:
Security & ControlsJob Category:
Scientific/TechnologyAll Job Posting Locations:
São José dos Campos, São Paulo, Brazil, São Paulo, Brazil, Warsaw, Masovian, PolandJob Description:
We are searching for the best talent for Senior Analyst, OT Cybersecurity Engineering
Johnson & Johnson is currently recruiting for a Senior Analyst Operational Technology Cyber Security within the Information Security and Risk Management (ISRM) organization.
This position is based out São José dos Campos or Sao Paulo, Brazil or Warsaw, Poland.
As a member of the Operational Technology Cybersecurity Engineering team, you will focus on developing and maintaining automation solutions that enhance the functionality and efficiency of OT services. You will contribute to custom script development, platform optimization, and integration efforts to support cybersecurity operations across IT and OT environments. This role offers opportunities to lead technical initiatives and collaborate with cross-functional teams to improve visibility, compliance, and platform performance.
This position will also partner with internal ISRM teams such as the Supply Chain security, Cyber Security Operations Center (CSOC), and other groups under the J&J Technology umbrella, including but not limited to End User, Server, and Network support.
Key Responsibilities:
Build and deploy custom scripts aligned with security stakeholder requests and Platform standards.
Maintain a repository of reusable code for remediation and data retrieval across IT & OT environments.
Refactor and validate existing code for performance, security, and maintainability.
Conduct structured testing of code samples during upgrade cycles and recommend improvements.
Define and implement strategies for platform performance, security hardening, and automation.
Validate data flows and integration points to maintain accuracy and compliance.
Collaborate with security and infrastructure teams to ensure platform reliability and adherence to operational standards.
Develop sensors, scripts and packages to enhance endpoint data visibility and monitor workflows.
Support Cybersecurity workflows, to assess risk, increase visibility and reduce impact of vulnerabilities across IT & OT environments.
Test and validate security controls throughout the different phases of the Cyber Kill Chain, and the MITRE ATT&CK framework to prevent, detect, and respond.
Generate threat behavior analytics for discovering historical and emerging threats to networks and systems.
Implement detection strategies based on internal and external intelligence reporting and vulnerability research.
Perform administrative tasks associated with tuning, alerts, correlation rules, signatures, device configurations, patching, and upgrades.
Establish and maintain relationships with the suppliers, vendors, and partners.
Assists with security events/incidents, coordinating activities with the CSOC and others – as needed.
Qualifications
Education:
A bachelor's degree or equivalent experience in the information security or information technology sector
Experience and Skills
Required:
Strong programming skills in scripting languages (e.g., Python, PowerShell, Bash) for automation and integration.
Strong foundation in information security principles, with proven ability in debugging and root cause analysis in IT & OT environments.
Experience in engineering, installing, configuring, and operating security solutions and appliances across large-scale, hybrid environments (AWS, Azure, GCP, on-prem).
Ability to engineer, customize, and extend endpoint management and visibility platforms, including developing integrations, automation, and product-level enhancements.
Familiarity with agile frameworks and DevSecOps practices, with the ability to deliver iteratively while maintaining reliability in high-risk environments.
Proven track record leading complex implementations, demonstrating risk-aware problem solving and balancing security with operational continuity.
Strong communication skills (written and verbal), able to translate technical details into clear guidance for both technical and non-technical stakeholders.
Knowledge of security frameworks and standards (NIST CSF, CIS Controls, OWASP, SANS) and ability to apply them pragmatically in OT contexts.
Working knowledge of the MITRE ATT&CK framework, including OT-specific TTPs, and ability to map telemetry to adversary behaviors.
Experience collaborating with distributed, global teams, working effectively across diverse cultural and technical backgrounds.
Johnson & Johnson is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, age, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
Required Skills:
Preferred Skills:
Communication, Corrective and Preventive Action (CAPA), Critical Thinking, Information Security Auditing, Information Security Management System (ISMS), Information Technology (IT) Security Assessments, Information Technology Strategies, Mentorship, Network Optimization, Presentation Design, Process Optimization, Report Writing, Security Policies, Technical Credibility, Technologically Savvy, Training People, Vulnerability Assessments