Senior Technical Cyber Security Specialist

  • Australia
  • Brisbane
  • Contract
  • Negotiable

ROLE ACCOUNTABILITIES:

This role has the following accountabilities:

  • Assist in the discovery, design, documentation, delivery, and operationalisation of multiple cyber security capability initiatives across the Corporate (IT) and Operational Technology (OT) environments, including but not limited to:
  • Controls aligned with the Australian Cyber Security Centre’s Essential Eight.
  • Controls aligned with internal ACSC Remediation activities.
  • Implementation of a network and asset monitoring / vulnerability management solution (OT).
  • Implementation of role-based access control and privileged access management solutions.
  • Implementation of logging ingestion into the Security Information and Event Management (SIEM) system.
  • Assess and evaluate the adequacy of existing cyber security controls for Corporate and Operational Technology systems, through internal stakeholder collaboration to understand their technical requirements and identifying areas of improvement to meet controls.
  • Liaise and assist third party service providers throughout project delivery.
  • Support the Technical Security lead in the delivery of project outcomes and operational handover.

ROLE DIMENSIONS AND RELATIONSHIPS:

Internal Relationships

  • Technical Security Delivery Lead (direct supervisor)
  • Cyber Security Project Manager
  • Cyber security capability improvement project team
  • Operational Cyber Security team, Operational Technology team, and Information Technology team.
  • Head of Cyber Security
  • Managers and Team Leaders

External Relationships

  • Project-related consultants, service providers and system vendors
  • Project and delivery partners

Knowledge and Experience

The role requires the following knowledge and experience:

  • Demonstrated experience delivering cyber security capability improvement initiatives in line with recommended frameworks.
  • Demonstrated cyber security networking experience, including configuration of access control lists, firewall rulesets, proxy services.
  • Demonstrated experience role-based authorisation methodologies, authentication technologies and security attack methodologies.
  • Detailed understanding of Azure and network security technologies.
  • Detailed knowledge and understanding of Windows, UNIX, and Linux operating systems.

Apply now

Submit your details and attach your resume below. Hint: make sure all relevant experience is included in your CV and keep your message to the hiring team short and sweet - 2000 characters or less is perfect.