JOBS

Vj57aqrrdryhg1px2f3g
Contract starts from 6 months and extension/conversion is available.
 
Profile Summary:
Supported Dell One (Quest) Identity Manager solution set for large scale customers across various industry verticals Knowledge of IAM concepts like JML, RBAC, Provisioning, Access Reviews, etc. Strong background in coding and development using Java Demonstrate strong technical skills   Demonstrate strong problem troubleshooting skills   Able to work under pressure in case of a critical incident Be a strong team player
 
Required Skills
Minimum 2-5 years of experience in support and/or implementation of all of the following Dell One (Quest) tools: Dell One (Quest) Identity Manager tool Dell One (Quest) Password Manager Tool Dell One (Quest) Total Privileged Access. Management (TPAM)
Development of ongoing enhancements to the Dell One (Quest) Identity Management toolset Experience in steady state management of any other identity management tools Should have a good idea of issues that come up in identity management implementations and the solution approaches to address them Should have excellent knowledge of PowerShell, JAVA /J2EE, PERL, JavaScript and other scripting languages and XML Must have excellent knowledge and understanding of LDAP concepts and working experience with at least few of the following directories: NetIQ / Novell  eDirectory Server Oracle Internet Directory/Oracle Virtual Directory Sun Directory Server Active Directory Tivoli Directory Server
Should have the ability to understand customer scenario and requirements (may include integration situations) and be capable of suggesting solutions. Responsible for ensuring appropriate collection and analysis of technical functional requirements based on critical client IAM use cases and expectations. Responsible for generating client delivery documentation such as technical requirement design documents, Visio diagrams, and technical component presentations. Experience working with relational databases (SQL, Oracle, MySQL, etc.) Experience and exposure in RBACx, Compliance solutions, Access certifications solutions is an added advantage Excellent communication skills and ability to work with global counterparts.
 
Qualifications:
4-5 years of strong IAM implementation experience Strong oral, written communications skills Customer Facing Exposure is must Open to travel requirements
 
Interested candidates please send their resumes to *****@bridgeapac.com.au + click to reveal or click 'Apply' below.
Hcdmqetvbaduuy7ivkjx
Our client is looking for an enthusiastic, energetic person to apply their mid-level security skills and join their dynamic team as soon as possible.  The successful candidate will have excellent analytic skills, combined with at least 5 years Security experience.  The role requires someone that has excellent communication skills and has engaged with all levels of senior management.
In your busy day you will:
Elicit, analyse and document business requirements from all identified stakeholders Identify and escalate conflicting information, risks and issues to ensure integrity. Facilitate agreement between stakeholders and project team on requirements and changes Create Work instructions and process maps as required Ensure traceability between scope, requirements, design, test and implemented solution Support the project team around defect analysis and change requests to ensure it aligns with business needs. Assess solution to ensure that it aligns with the business needs. Plan business analysis approach and activities.  
The successful candidate will:
Have proven Security reporting and metric generation Extensive experience in Tableau Have a thorough understanding of all aspects of Security  Leveraging data management, analysis or data mining techniques evaluate trends and
patterns in data looking for areas for issues, incidents or improvements in process,
policy or business operating models; Continually assess and improve internal reporting processes and metrics based on Have a good understanding of risk principles (organisational and project) and how to apply these in a real world situation  
To become eligible for this opportunity please apply online or call Jo Cave on *****33 + click to reveal for a confidential discussion.
 
Q1 Group
K4m3mqhuipxhx2lzh5kn
In this exciting role you will assist with the delivery of the FY18 Security Strategy and drive out remediation activities in the proxy and firewall domains to significantly uplift the  security posture;
 Provide technical SME leadership to the team; Responsible for the training of the team members and uplifting capability in the team;  Responsible for the uplift of existing BAU processes and driving out process improvement; Provides technical SME/consultancy services to projects, other teams in SecOps, the wider Security Services teams and other business units in the bank when needed.
The successful candidate will have a minimum of five years experience with supporting checkpoint firewalls.  It is mandatory that you have proven industry experience in Firewalls (CheckPoint and F5), F5 devices in general, proxies (zScaler and McAfee) Cryto and Certificate Management. In addition, you will require any multiple of the following; Linux/Solaris,  Microsoft XP/2000/2003,Cisco comms equipment (Routers, Switches & Load Balancers)  and proven experience with TCP/IP protocols and networking
 
 Join a growing team of security professionals. Our client offers rewarding careers for outstanding professionals in an open and friendly culture.  If you enjoy being part of a fun team, please forward your resume to Jo Cave at *****@q1ps.com.au + click to reveal or call Jo on *****56. + click to reveal
 
Q1 - taking the risk out of securing the right professionals
Tbvioq98qbc1ghpskegz
NEC Australia is a leading technology company that delivers a complete portfolio of ICT solutions and services to large enterprise, small business and government customers. NEC Australia helps customers gain greater business value from their technology investments, by delivering end-to-end technology solutions, encompassing consulting, professional services, application development, systems integration and engineering, communications solutions, and application and infrastructure managed services and support. www.nec.com.au.
NEC is going from strength to strength in South Australia leveraging its extensive experience providing managed ICT services to enterprise and government across Australia. NEC is committed to ensuring the best people, expertise and tools are used to deliver quality innovative services to our customers. 
We now have an opportunity for a Security Analyst to become part of our winning team.
The role is required to design, scope and uplift the Security platform. This is more than just a technically focused role, it's about implementing security tools but also engaging with the business to take them on the journey. 
 
Key responsibilities will include:
 
Expand and improve existing security project plans and identify potential Security threats from both an internal and external perspective Collaborate and follow-up with other technical stakeholders to architect and discuss technical solutions and address any major impacts Conduct technical research and analysis Create technical project plans and milestones Review requests for equivalent technologies that may already exist or been vetted Assist with configuring and testing existing security tools Conduct security architecture verification and validation activities Design, develop, engineer, and implement solutions to security requirements Perform complex risk analyses including risk assessments Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands Investigate, troubleshoot and analyse and resolve/escalate technical issues within agreed SLAs.     Major incident and problem management resolution Detailed project design involvement and installations.  Present solutions within customer's requirements and within budget Maintain effective and trusted relationships with key stakeholders Major Incident and Problem Management and assisting with escalations Attend vendor specific updates and keep up with latest technology in field of expertise
 
 
Knowledge, skills and experience relevant to this role:
 
2+ years' experience in a similar role Experience with IT security products via GUI and CLI Understanding of regulations relating to technology risk, data privacy and security compliance Experience in supporting information security devices and procedures Bachelor Degree in IT Security or similar Completion of relevant certifications such as: CISSP, Security Vendor Industry qualifications, CISA / CISM, CEH or similar, CCNA / CCNP; ITIL V3 Foundation certification 
We offer an outstanding working environment and the opportunity to be part of a high performance team. We place great emphasis on our staff satisfaction and have a vigorous professional development program, a fantastic corporate culture and a highly responsive management team. Apply now or contact Paul at *****@nec.com.au + click to reveal for further information.
NEC is committed to achieving a diverse workforce and strongly encourages applications from Aboriginal and Torres Strait Islanders and candidates from culturally diverse backgrounds.
Xcawky9ldk6frbdlz8ar
A leading Australian bank is hiring multiple talented IAM Security Analysts to work on their identity provisioning and on boarding team in Sydney.
Key Responsibilities:
Experience in supporting and independently performing complex identity and access management analysis User account provisioning and on boarding Engage with business owners, SMEs and other stakeholders covering all aspect of IT systems
Key Requirements:
2-5 years working in a IT security/ service desk role Exceptional customer service and aptitude for IT software and applications Expertise in Active Directory, IBM Tivoli Access Management and Identity Manager
The successful candidate will join an expanding team of like minded individuals contributing to transformation and upgrade projects within the bank's IAM function.
To apply please click apply or call Jet Sim on *****04 + click to reveal for a confidential discussion.
Mifemwgifyjp5qczuszg
Our enterprise scale customer has just created a new role for someone to join their Cyber Security team. Security is one of the high priority objectives for the organisation and therefore the successful candidate will be given the opportunity to make a real difference.
As this is an Analyst role we are looking for someone who is at the early to mid stages of their career and looking for a step up into a more complex and challenging environment.
The key to success in this role will be the ability to engage with a variety of people across the business, therefore we are looking for someone who has excellent communication and interpersonal skills.
Key responsibilities include;
Support security governance processes including vulnerability management, security analytics, assessments, and KPI reporting Operate and configure vulnerability management and testing tools Conduct security risk and control effectiveness assessments for corporate and operational technologies Provide security input into changes, designs, and design reviews Increase general awareness of security threats and risks by creating and communicating security awareness material Assist supervisors to develop and deliver job-specific security training material On an ad-hoc basis, provide technical and business explanation of security risks to technical staff and suppliers to increase their understanding
Skills and Experience required:
Computer Science or Software Engineering degree preferred Experience working with log management, security monitoring and SIEM tools Knowledge of Cyber threat capabilities and technical capabilities to defend networks and systems Ability to interact well with others and facilitate different operational teams for event investigations Critical thinking, problem solving and high attention to detail
This role would suit someone who is looking for a secure long term position where your input will be valued.
To register your interest send your CV in WORD format via the link 'Apply now' links below. For more information contact Steve Corby on *****98 + click to reveal or via email on *****@fourquarters.com.au + click to reveal
Vuqlre2ehfvrfpk8twn2
Global Systems Integrator 6 month contract - potential perm offer Brisbane CBD
Our client is seeking a Technical Consultant t to be a part of their growing QLD security practice. Role: Providing technical assistance to colleagues during design and implementation of security solutions Performing security architecture assessments for clients, providing recommendations and driving deliverables Performing reviews of client security configuration components, making recommendations and remediating Providing peer review of documentation and input for proposals Identifying and driving consulting opportunities
Mandatory Skills & Qualifications  (in order of preference): Security Architecture Framework/Design Security Risk and Maturity Assessment Security Solution Design (high-level and detailed) Firewall Analysis, Design, Implementation and Support Network IDPS Design, Implementation and Support Load Balancing Design, Implementation and Support Web proxy/filtering Design, Implementation and Support Scanning/Vulnerability Assessment Technical documentation writing
Technical Knowledge: McAfee Network Security Platform McAfee Vulnerability Manager McAfee Enterprise Security Manager (SIEM) McAfee ePolicy Orchestrator F5, Palo Alto Networks Firewall Blue Coat ProxySG CISCO ASA/PIX Firewall CISCO AMP/IOS Imprivata OneSign RSA SecurID/Authentication Manager UNIX – Redhat, Linux distributions LDAP EndPoint Protection Palo Alto Networks Firewall/ Checkpoint Firewall/ CISCO ASA/FTD Firewall F5 Big-IP Splunk
Desirable: McAfee endpoint Suite Symantec endpoint suite Symantec BlueCoat Vulnerability Scanning (Qualys, Nessus) Knowledge of PCI-DSS, ISO 27001, GRDP
 Other Skills: Run workshops Strong consultancy and influencing skills Excellent documentation skills Design / As built documentation Good client interaction skills
Certifications: CISSP (mandatory) SABSA (desirable) TOGAF (desirable) CISM (desirable)
The company is a global systems integrator who offers a competitive career path and excellent opportunities for growth. You will be part of a highly successful, functional team and at the forefront of security solutions. 
Please provide your CV in Word format.
Janet Streczynski   *****76 + click to reveal
Iddv0pu8adhy9ewiichg
Global Systems Integrator Attractive Base Brisbane CBD
Our client is looking for a Senior Security Engineer to be a part of their growing QLD security practice.  Responsibilities Technical design and implementation of security solutions Providing client assessments, recommendations and deliverables Reviewing, recommending and remediating client security configuration components  Preparing proposals Identifying and driving consulting opportunities
Required Skills 
Security Architecture Framework/Design Security Risk and Maturity Assessment Security Solution Design (high-level and detailed) Firewall Analysis, Design, Implementation and Support Network IDPS Design, Implementation and Support Load Balancing Design, Implementation and Support Web proxy/filtering Design, Implementation and Support Scanning/Vulnerability Assessment Technical documentation writing Strong consultancy, influencing and documentation skills CISSP Certification F5, Palo Alto Networks Firewall Blue Coat ProxySG CISCO ASA/PIX Firewall/FTD Firewall CISCO AMP/IOS Imprivata OneSign McAfee Network Security Platform  McAfee Vulnerability Manager  McAfee Enterprise Security Manager (SIEM)  MAfee ePolicy Orchestrator  RSA SecurID/Authentication Manager  UNIX – Redhat, Linux distributions  LDAP EndPoint Protection Checkpoint Firewall F5 Big-IP Splunk
 Desired Skills/Technologies
McAfee endpoint Suite Symantec endpoint suite Symantec BlueCoat Vulnerability Scanning (Qualys, Nessus) Knowledge of PCI-DSS, ISO 27001, GRDP Certifications: SABSA / TOGAF / CISM
 The company is a global systems integrator who offers a competitive career path and excellent opportunities for growth. You will be part of a highly successful, functional team and at the forefront of security solutions. 
 
Please provide your CV in Word format.
 
Janet Streczynski *****76 + click to reveal
 
 
 
 
Xe18so0szkusuburvflp
JOB ID: 180029
SALARY RANGE: $109,858 to $116,439 pa (plus 17% super)
EMPLOYMENT TYPE: Full-time (36.75 hours per week) and fixed term for 2 years
LOCATION: Geelong Waterfront Campus
ABOUT THE ROLE
Project Managers to work on the following types of projects:
Cyber Security Big Data Student Administration Financial Systems Enterprise Service Bus Integrations

Take responsibility for the scoping, setup, ongoing project management and delivery of technology related projects within the Division.
This will include:
Managing the entire project life cycle of projects within eSolutions. Successfully implementing technology related projects to defined service standards, budgets and timeframes. Identifying and managing risk throughout the project. Managing the financial aspect of the project.

ABOUT YOU
Tertiary degree in a computer-related discipline or a degree in another discipline plus a postgraduate qualification in information technology or related discipline. Proven record in successfully managing and delivering projects. Substantial experience in an IT industry. Demonstrated ability to develop collaborative work teams.
For a full list of the selection criteria please see the position description CONTACT FOR FURTHER INFORMATION: Kristine McCormack, Tel: *****83 + click to reveal
CLOSING DATE: Sunday 4 February 2018
We value our staff and understand that they are more than just their jobs, that's why we offer benefits that enhance work life. Further information on Deakin's workplace benefits can be found here: deakin.edu.au/about-deakin/work-at-deakin/why-work-at-deakin/staff-benefits TO APPLY
For a full copy of the position description and to apply online, please visit deakin.edu.au/about-deakin/work-at-deakin Deakin University values diversity, enables access and promotes inclusion. Deakin University is an employer of choice for women and strongly encourages applications from Aboriginal and Torres Strait Islander people.
Igx1skdi4xrqqqhtcstm
TEKsystems has partnered with an ASX Top 20 organisation in Melbourne to assist with a key project in their Cyber Security team. The company is the industry leader within their field and are known to be a fast-paced, dynamic, and technology-driven organisation. This role would be working from their CBD location.
 
About the Role
The Security Specialist will be primarily focused on a new implementation for FireEye, which will be used for Security Monitoring and Logging, and will be integrated with their internal SOC. You may be called upon to assist with other Security Platform deployments or upgrades, however FireEye will be the key task.
 
Desired Experience
Must have experience in either Implementation / Deployment of FireEye, or have backend platform Administration / Support of the tool Experience in Building / Implementing other Cyber Security tools (i.e. SIEM, DLP, IDAM, etc) at an Enterprise level Come from a Cyber Security, Network Engineering, or Systems Engineering background

For more information, please contact Sam Saks in our Melbourne office on *****41 + click to reveal or *****@teksystems.com + click to reveal citing Job #502993; alternatively you can apply here to submit your application.
W6cb80u4lzn5puljbe9j
Information Security Manager
The Role:
The Information Security Manager is considered a thought leader within the confines of IT Security, Risk and Compliance. Working with the commercial requirements of the organisation, the Information Security Manager is overall responsible for the day to day protection of the firm from intending threats through implementing and maintaining a security framework.
Responsibilities:
Assess and manage risk associated with the firm’s business operations through IT security and/or legislative/regulatory compliance. Ownership and day to day operations of anti-virus, security incident management, security information and event management (SIEM), data loss prevention (DLP), vulnerability management Perform investigations, report and escalation of possible breaches of IT policies Coordinate regular risk assessments of IT systems either inhouse or outsourced. Oversee the dissemination of security policies and practices. Provide expertise on Architecture, authentication and security controls. To work outside normal hours where necessary to ensure the provision of critical computing services.
The Candidate:
Demonstrated experience in implementing, maintaining and improving information security risk management systems in alignment with ISO 27001/27002. Knowledge of Australia government ISM and PSPF framework. Ability to influence and inspire others by being a specialist within the security space. Strong personal integrity and ethics. Self-Starter with the ability to work autonomously as well as part of a larger team. Excellent interpersonal skills and the ability to establish effective working relationships. Excellent presentation, written and verbal communication with an understanding of the importance of IT security to business operations.
Certification:
CISSP or CISM
If this sounds like you please apply directly or email your CV through to Michael:
*****@halcyonknights.com.au + click to reveal
Please note only shortlisted candidates will be contacted.
For other exciting job opportunities and to keep up-to-date with the IT world, please 'Follow' Halcyon Knights on LinkedIn @ www.linkedin.com/company/halcyon-knights
Sg7ei0qxlxb5m6dsolfg
ABOUT THE COMPANY
Unisys is a global information technology company that solves organisations' most pressing IT and business challenges. With more than 20,000 employees serving clients around the world, Unisys offerings include cloud and infrastructure services, application services, security solutions, and high-end server technology.
YOU WILL BRING:
Demonstrated experience with Software Defined networking e.g. VXlan. Expertise in end-to-end Security Architecture for hybrid cloud environments.  This is an infrastructure centric role. Demonstrated expertise in the design, development and deployment of F5 and Palo Alto devices into a on premises  CISCO ACI network Experience in the design, development and deployment of public cloud security solutions e.g. Azure, AWS or Google Cloud. Demonstrated expertise in leading a project implementation integrated into client infrastructure; Solution design at a high and detailed level.  Security solution design for end to end Hybrid Clouds Design and deploy F5 and Palo Alto solutions Experience of CISCO ACI network construct in support of the F5 and Palo Alto design Solution Design covering end to end enterprise Edge Security Expertise with Load Balancers - F5, Citrix, Radware Expertise with Checkpoint, Juniper Knowledge of integration with Cisco NFV & SD WAN Experience with Riverbed Appliances Expertise with Cisco Wireless solutions ISE Knowledge of Architectural Frameworks (TOGAF)
YOUR NEW ROLE:
Advise, analyze, research, design, and guide the install and implementation of complex integrated solutions for an entire enterprise. Uses diagnostic, analytical and design capabilities to ensures the best solution is provided to the customer Demonstrate the ability to work within an architectural framework and expertise with risk based design principals. Ability to work in a team environment, show technical leadership and provide overarching technical governance
Primary Responsibilies:
Delivery of detailed architecture documentation and artefacts to support a project Define standards and policy for Unisys clients and regionally for Asia Pacific Work collaboratively with client and Unisys technical staff Plan and manage technical activities including deployment pilots, transition planning and proof of concept testing Manage and advise technical staff through deployment and handover to operational management. Work to schedules
THE BENEFITS:
Career progression and development – move up or move across! Flexibility to work across either Melbourne or Sydney location Bonuses based on global targets Travelling across regions for business
HOW TO APPLY
Please apply via the Seek advertisement. Alternatively, please email *****@unisys.com + click to reveal if you have any questions.
A6aimpsnvu0msxo3lsi9
NEC Australia is a leading technology company that delivers a complete portfolio of ICT solutions and services to large enterprise, small business and government customers. NEC Australia helps customers gain greater business value from their technology investments, by delivering end-to-end technology solutions, encompassing consulting, professional services, application development, systems integration and engineering, communications solutions, and application and infrastructure managed services and support. www.nec.com.au.
                                                                                                                 
NEC Australia offers comprehensive security services to its customers covering a broad spectrum of end-to-end delivery, provisioning, managed and cyber security services.  Each of the security services are focussed on delivering to specific agreed customer requirements with dedicated skilled and experienced security engineers and analysts from locations across Australia.
 
GSIC (Global Security Intelligence Centre) is a specialised NEC environment located in Adelaide the intent of which is to provide a secure facility for the development and delivery of NEC's Cyber Security services as well as providing technical support to NEC Federal, State and Government and Enterprise customers. 
We are now looking for a Subject Matter Expert - Security to join our team.
This role is a subject matter expert (SME) and part of a team delivering system engineering services within the NEC GSIC environment located in the NEC Adelaide offices.
The primary objective of this role is to work as a subject matter expert (SME) on assigned customer network, and be responsible for ensuring that the subscribed customer security environment and systems are maintained in accordance with contractual deliverables, meeting required Service Level Agreements (SLA).  The role includes project detailed design and installations, working closely with the Project Management Office (PMO); attending customer operations and project meetings as technical SME on various security technologies; and work with closely with the design authority office (DAO).  You will also be responsible for the ongoing day to day complex security operational activities and is the escalation point for customer security requests that cannot be resolved by security engineers; the escalation point on major incident and complex problem management activities; and the mentoring of junior staff when and where required.
 
Knowledge, skills and experience relevant to this role:
7+ years' experience in a similar role; Solid experience with IT security products via GUI and CLI; Solid understanding of regulations relating to technology risk, data privacy and security compliance; Proven track record and experience in supporting information security devices and procedures; Very good written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and non-technical audiences; High level of personal integrity, as well as the ability to professionally handle confidential matters Excellent analytical skills, the ability to manage multiple tasks, as well as the ability to work well in a demanding, dynamic environment and meet overall objectives; Experience and ability to working effectively with industry partners and suppliers; Ability to create detailed design documentation and install complex solutions; Bachelor Degree in IT Security or similar; CCNP or CCIE Security CISSP or CISA
We offer an outstanding working environment and the opportunity to be part of a high performance team. We place great emphasis on our staff satisfaction and have a vigorous professional development program, a fantastic corporate culture and a highly responsive management team. Please apply now or contact Paul at *****@nec.com.au + click to reveal for further information.
 
NEC is committed to achieving a diverse workforce and strongly encourages applications from Aboriginal and Torres Strait Islanders and candidates from culturally diverse backgrounds.
 
W6cb80u4lzn5puljbe9j
Kinexus' Naval team is the largest naval specific recruitment team in Australia and as such, is in a position to provide unique support to projects across the country. As a trusted partner to the industry, we have access to existing and new opportunities across all major Maritime projects including SEA1000, SEA5000, Collins, LHD, SEA1180 and others.
Kinexus is currently looking to recruit a Cyber Manager in support of the SEA1000 Future Submarine Program.
This program is the largest defence program in Australian history with a value of over $50bn. With the designer and combat systems integrator selected, the program is well underway.
A complex design with technologically advanced systems, all within the confines of a pressurised hull, this will arguably be one of the most challenging and rewarding programs to be part of, in Australia for many years to come.
The first vessel is expected to enter service in the early 2030s with construction of the 12 submarines continuing well into the 2040s.
This is a unique opportunity to be involved at the very start.
Role description:
Under limited supervision, the Future Submarine Cyber Manager will provide engineering, technical and cyber services including but not limited to: a. Coordinate the FSP Cyber Security Program including; Liaising with relevant Australian Government and Defence Stakeholders; and Overseeing the implementation of FSP Industry Partners cyber accreditation and test programs for the Information and Communications Technology (ICT) systems that are integral to the Mission and Support Systems of the Future Submarine (FSM);
Review Cyber Security-related services and products delivered by the FSP Industry Partners and their subcontractors; Undertake complex activities and tasks relating to FSM system Cyber Security requirements including; Development, support and review of the system design to minimise the vulnerability of the FSM systems from malicious cyber activity; and Support and review the integration, verification and validation and vulnerability testing of mission and support systems to demonstrate cyber worthiness;

As a member of the Combat System team: (i) Evaluate technical deliverables to ensure alignment with project objectives; Review, analyse and report upon submarine design performance, safety, operational effectiveness and environmental issues; Contribute to the development and management of the Combat System reference architecture and the direction of solution architectures; Support the development of Cyber Security requirements within functional specifications; Develop or review Cyber Security system performance characteristics; Develop or review Cyber Security technical performance measures and metrics; and Contribute to the analysis of Combat System designs, system selections and general arrangement layouts with consideration of Whole of Boat aspects;
Produce, coordinate and provide advice, assistance, and policy on contemporary information and Cyber Security to the FSP Leadership and FSP Teams; Responsible for analysis, review, advice and reporting of Cyber Security assessments and compliance of Cyber Security capabilities as they relate to the Mission System and Support System; Understand the Defence Security Risk context and provide advice on emerging Cyber protective security matters as they relate to the Mission System and Support System; Apply contemporary knowledge of emerging technology issues including; (i) information and Cyber Security trends; Vulnerabilities and threats; and Associated threat identification and prevention techniques; Use experience to conduct proactive analytical and research tasks to meet the Cyber Security needs of stakeholders;
Work collaboratively with stakeholders to lead and conduct Cyber Security assessments; Communicate Cyber Security through discussions and technical reports tailored to internal and external audiences; Participate in the identification of Cyber Security vulnerabilities and the assessment of the Risk to stakeholders' systems; Recommend mitigating strategies through research, analysis and reporting; Take the initiative to identify and provide pragmatic, risk based solutions and seek advice and guidance on more complex Cyber Security issues; and Show initiative and be able to work with minimum supervision but not in isolation from the rest of the team.
The successful candidate will have:
Possess one or more of the following Certifications or equivalent: (i) Certified Industry System Security Professional (CISSP)/Certified Information Security Manager (CISM); Global Information Assurance Certification (GIAC); and Global Information Assurance Certification Forensic Analyst (GCFA);
Recent experience in certification and accreditation of Defence ICT systems;
Detailed understanding of the Protective Security Policy Framework (PSPF), Information Security Manual (ISM), Defence Security Manual (DSM), and other security policy documents; Experience in ICT Security Risk Management and methodologies; Experience in the development and management of requirements; and Experience in management of Cyber Security teams, and managing Project schedules and Cost Accounts;

Kinexus will need to submit suitable candidates by the 18th of February with candidate evaluations and interviews taking place in Q1 of 2018
The client has specified that applicants must hold a minimum of an NV1 Security Clearance

Kinexus, formally Kinetic Recruitment, are the No. 1 defence recognised supplier with a specialisation in the recruitment of mid to senior level professionals who hold Defence or Federal government clearances across the spectrum of technology platforms. Kinexus are recognised as a top 15 Defence SME in Australia and support various major defence projects.
To apply online, please click on the appropriate link below and attach your resume as a word document. Alternatively, please contact Elle Southgate on *****28 + click to reveal quoting the Job Title for this position.
Visit www.kinexus.com.au to view more jobs.
Zkgql4pjcyczuusmawfh
Working within the Professional Services Security Team you will have the following responsibilities:
Providing technical oversight to colleagues during design and implementation of security solutions Performing security architecture assessments for clients, providing recommendations and driving deliverables Performing reviews of client security configuration components, making recommendations and remediating Providing peer review of documentation and input for proposals Identifying and driving consulting opportunities Delivery of high complexity technical configuration activities to clients 
To be considered for this role you will have experience with:
Firewall Analysis, Design, Implementation and Support Network IDPS Design, Implementation and Support Load Balancing Design, Implementation and Support Web proxy/filtering Design, Implementation and Support Scanning/Vulnerability Assessment Technical documentation writing
and technical knowledge of:
Palo Alto Networks Firewalls Checkpoint Firewalls Cisco ASA/FTD Firewalls F5 Big-IP Splunk McAfee endpoint Suite Symantec endpoint suite and BlueCoat Vulnerability Scanning (Qualys, Nessus) Knowledge of PCI-DSS, ISO 27001, GRDP
For a confidential discussion about this opportunity or to discuss other opportunities within Information Security & Risk please contact specialist Infosec Talent Scout Marcus Lavalle-Smith on *****97 + click to reveal or email *****@humanisedgroup.com. + click to reveal Alternatively hit APPLY NOW.
Australian citizens or permanent residents only. No sponsorship.
Mifemwgifyjp5qczuszg
Contract or Permanent Brisbane CBD Cyber Security
Due to growth and an increase in workload across a number of clients/projects, the organisation requires a Technical Consultant who creates great client intimacy by their technical expertise and provides a chargeable service to clients in the development of technology specific solutions. As well as being viewed as a trusted technical advisor to the client, the Technology Consultant will also be involved in developing new products and services. 
Key Skills and Experience:
Mandatory
Security Architecture Framework/Design Security Risk and Maturity Assessment Security Solution Design (high-level and detailed) Firewall Analysis, Design, Implementation and Support Network IDPS Design, Implementation and Support Load Balancing Design, Implementation and Support Web proxy/filtering Design, Implementation and Support Scanning/Vulnerability Assessment Technical documentation writing
Technical Knowledge
F5 (LTM, GTM, ASM, APM) Palo Alto Networks Firewall Juniper SRX CheckPoint Firewalls Blue Coat ProxySG CISCO ASA/FTD Firewall  CISCO AMP CISCO IOS McAfee Network Security Platform McAfee Vulnerability Manager  McAfee Enterprise Security Manager (SIEM) MAfee ePolicy Orchestrator RSA SecurID/Authentication Manager UNIX – Redhat, Linux distributions EndPoint Protection Splunk
Desirable
McAfee endpoint Suite Symantec endpoint suite Symantec BlueCoat  Vulnerability Scanning (Qualys, Nessus) Knowledge of PCI-DSS, ISO 27001, GRDP
This position is being offered as a Contract or Permanent role.  If you can demonstrate the required skills and experience, apply immediately.  For further details contact Graham Eather on *****00. + click to reveal
 
Sg7ei0qxlxb5m6dsolfg
Contract or Permanent Brisbane CBD Cyber Security
Due to growth and an increase in workload across a number of clients/projects, the organisation requires a Technical Consultant who creates great client intimacy by their technical expertise and provides a chargeable service to clients in the development of technology specific solutions. As well as being viewed as a trusted technical advisor to the client, the Technology Consultant will also be involved in developing new products and services. 
Key Skills and Experience:
Mandatory
Security Architecture Framework/Design Security Risk and Maturity Assessment Security Solution Design (high-level and detailed) Firewall Analysis, Design, Implementation and Support Network IDPS Design, Implementation and Support Load Balancing Design, Implementation and Support Web proxy/filtering Design, Implementation and Support Scanning/Vulnerability Assessment Technical documentation writing
Technical Knowledge
F5 (LTM, GTM, ASM, APM) Palo Alto Networks Firewall Juniper SRX CheckPoint Firewalls Blue Coat ProxySG CISCO ASA/FTD Firewall  CISCO AMP CISCO IOS McAfee Network Security Platform McAfee Vulnerability Manager  McAfee Enterprise Security Manager (SIEM) MAfee ePolicy Orchestrator RSA SecurID/Authentication Manager UNIX – Redhat, Linux distributions EndPoint Protection Splunk
Desirable
McAfee endpoint Suite Symantec endpoint suite Symantec BlueCoat  Vulnerability Scanning (Qualys, Nessus) Knowledge of PCI-DSS, ISO 27001, GRDP
This position is being offered as a Contract or Permanent role.  If you can demonstrate the required skills and experience, apply immediately.  For further details contact Graham Eather on *****00. + click to reveal
 
Fizm7majavuzhinzc8wy
Information Security Analyst
This financial services client is seeking an Information Security Analyst to join its Sydney team. The Information Security Analyst is responsible for ensuring that the companies networks and systems are compliant with all information security, compliance and audit regulations. With your knowledge and experience within information security you will be tasked with establishing best practices within the company.
Responsibilities
Implementation and improvement of the companies ISO27001. Strong working knowledge of governance, risk and compliance. Give guidance to different teams within business regarding both internal and external the information security risks.
Ability to communicate with a range of different stakeholders of different technical backgrounds. Demonstrated experience working in a team of information security professionals in a large and complex organisation.
Desired Skills and experience
At least one of the following qualifications is highly desirable, CISSP, CISA, CISM and CEH. Bachelor Degree. Knowledge with industry standard frameworks (ISO, NIST, PCI). 5 + years of Information Security experience.
If you're interested in this role, click 'apply now' or for more information and a confidential discussion on this role or any others within Information Security contact Adam Woolhouse at Hudson on *****52 + click to reveal or email *****@hudson.com. + click to reveal
Y49ed9uvwij3hpwc7lzx
Our Client is a well respected brand with a global presence. They have an immediate, and likely extendable, 6 month contract opportunity for Senior Security Consultant to assist the team in Sydney.
  
In the role you will assist in the application of Information Security thought leadership principals to help solve business problems and deliver solutions in a clear, concise and timely fashion.
  
To be successful you will have a wide range of experiences across Security which may include some or all of the following:
Extensive experience in Risk Management principals and frameworks
Understanding of security architecture frameworks
Experience with standards and guidelines (27001, PCI, ITIL etc)
Exposure to cloud security and so on
  
You will be passionate about Security and your engagement style will be friendly and approachable.
To apply please send your resume to *****@j5group.com.au + click to reveal or call John McCarthy on *****52 + click to reveal for a conversation in confidence.
Thank you.
Vd8htqvjtrhsduv09b8o
Our Client is a respected, high profile organisation, with one of the largest in-house security teams in the country and conveniently located offices in Sydney's CBD (with roles also available in Melbourne and Perth CBD's).
  
They have new openings for Senior Security Consultants to assist with the Penetration Testing requirements across the organisation's technology environment.  
  
To be successful in this role you will have a strong understanding of IT security principles, and excellent capability across Penetration Testing methodologies. 
  
You will have a minimum 3-4 years experience either as a consultant or as an in-house employee in a related security field and your experience will include Security Testing, Vulnerability Identification or Code Review.
Ideally you will have experience across some combination of the following: Web App Testing, Infra Testing, Mobile Testing and Social Engineering etc.
(Any security testing qualifications are viewed favourably but they are not essential.)
To summarise: This very successful Australian Brand is looking for experienced Pen Testers who want to continue to learn and who want to be part of a collaborative, high performing team.  
  
If this sounds like you please send your resume to John McCarthy at *****@j5group.com.au + click to reveal or call John McCarthy on *****52 + click to reveal for further information.
  
Thank you.