OT / ICS Security Engineer (Intern)

  • Islamabad, Islamabad Capital Territory, Pakistan
  • Internship
  • Hybrid

Job Description:

AirOverflow is stepping into one of the most critical and underserved domains in the entire cybersecurity landscape — the security of Operational Technology and Industrial Control Systems — and we are looking for a driven, technically curious intern to be part of building this capability from the ground up. OT and ICS environments power the infrastructure that the modern world depends on: power grids, water treatment facilities, manufacturing plants, oil and gas pipelines, and transportation systems. Unlike traditional IT environments, these systems were designed for reliability and uptime — not security — making them uniquely vulnerable and extraordinarily high-stakes targets for cyberattacks. The consequences of a breach here are not just data loss; they can be physical, operational, and even life-threatening. This is precisely why securing them matters so deeply, and why AirOverflow is committed to developing expertise in this space. As an OT/ICS Security Engineer Intern, you will be introduced to the specialized protocols, architectures, and threat models that define industrial environments, working alongside our security team to research vulnerabilities, study real-world incidents, and explore how adversaries target critical infrastructure. This is a rare and forward-looking opportunity in Pakistan's cybersecurity ecosystem, and we are looking for someone who understands the weight of that responsibility and is excited to rise to meet it.


What You'll Do

  • Research OT/ICS-specific attack techniques, threat actors, and real-world incidents targeting critical infrastructure
  • Study and develop familiarity with industrial protocols such as Modbus, DNP3, PROFINET, and EtherNet/IP
  • Assist in evaluating the security posture of simulated or lab-based OT/ICS environments
  • Support the team in identifying vulnerabilities in SCADA systems, PLCs, RTUs, and HMI interfaces
  • Research and document CVEs, advisories, and threat intelligence relevant to industrial control systems
  • Explore network segmentation, the Purdue Model, and security architecture principles specific to OT environments
  • Contribute to the development of internal OT security methodologies, playbooks, and research documentation
  • Participate in team knowledge-sharing and stay updated on ICS-specific cybersecurity frameworks such as NERC CIP and IEC 62443


What We're Looking For

  • Foundational understanding of networking concepts including TCP/IP, network architecture, and basic protocols
  • Basic familiarity with industrial systems, SCADA, PLCs, or control systems — whether through coursework, projects, or personal interest
  • A background or strong interest in electrical engineering, instrumentation, mechatronics, or computer engineering
  • Curiosity about how physical systems interact with digital infrastructure and where security gaps emerge
  • Strong research and analytical skills with the ability to self-direct learning in unfamiliar territory
  • Ability to document and communicate technical findings clearly and concisely
  • A serious and responsible mindset — this domain carries real-world consequences that demand careful, methodical thinking


Nice to Have

  • Hands-on exposure to PLCs, HMIs, or SCADA platforms such as Siemens, Rockwell, or Schneider Electric
  • Familiarity with OT-specific security tools such as Claroty, Dragos, or Nozomi (even at a conceptual level)
  • Knowledge of cybersecurity frameworks relevant to industrial environments — IEC 62443, NERC CIP, or NIST SP 800-82
  • Prior experience in penetration testing, CTFs, or offensive security
  • Understanding of network packet analysis using tools like Wireshark, with exposure to industrial traffic
  • Any coursework or projects in industrial automation, control systems, or SCADA environments


What We Provide

  • Mentorship from security professionals operating at the intersection of IT and OT security
  • Hands-on exposure to industrial security concepts, tools, and simulated environments
  • The opportunity to build expertise in one of the most critical and least saturated niches in cybersecurity
  • Internship certificate and letter of recommendation upon successful completion
  • Access to AirOverflow's internal research resources and security knowledge base
  • A potential pathway to a full-time role as AirOverflow develops its OT/ICS security practice
  • The chance to contribute to work that has a direct and meaningful impact on national critical infrastructure security