IT

Cyber security architect

ITbility

7 months ago

Expired On23 Jul 2025

Melbourne, Australia

Job description & requirements

  • Cyber Security Architect
  • Melbourne
  • Contract



My client in Melbourne is looking for Cyber Security Architect. Kindly go through the below PD and let me know if the role suits and interests you, your friends or colleagues. You can send me your resumes/referrals at Supriya.thorat@itbility.com.au


Required Skills:Core Skills & Capabilities required:

Deep technical capability (plan, build and run) across a broad range of Infrastructure and Security technologies.

  • Firewalls (Checkpoint, F5 and Cloud native AWS and Azure FWs)
  • Management and upkeep of Akamai WAF policies.
  • Networking. Comms and Protocols, Address translations and NLB’s at an Enterprise level.
  • Cloud based native Firewall products and principles, and associated technologies (AWS/Azure, Google Cloud)
  • Experience with managing and supporting AlgoSec, or similar industry recognised Firewall policy specific tooling, will be highly regarded
  • Able to identify and deliver opportunities to automate where possible to improve delivery times and to drive always on improvements;
  • Strong understanding of Enterprise level problem, change and incident management concepts
  • Good understanding of all aspects of the systems/software development lifecycle;
  • Technical knowledge of programming, system design, IT infrastructure and database concepts; and
  • Understanding of key IT security concepts.

Qualifications:

  1. Tertiary qualification in an IT discipline or related field
  2. IT Security related certification (Eg: CISM, CISSP etc..)
  3. Cloud experience and certifications. Examples include:
  4. AWS Certified Solutions Architect (Associate)
  5. AWS Certified SysOps Administrator (Associate)
  6. AWS Certified Developer (Associate)
  7. Industry qualifications or relevant IT Security specific experience

͏

Do

1. Design and develop enterprise cyber security strategy and architecture

a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses

b. Identify risks associated with business processes, operations,

information security programs and technology projects

c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge

d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements

e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations

f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc.

g. Provide support during technical deployment, configuration, integration and administration of security technologies

h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc.

i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity

j. Provide solution of RFP’s received from clients and ensure overall design assurance

͏

i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives

ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture

iii. Depending on the client’s need with particular standards and technology stacks create complete RFPs

iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology

v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions

vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps

vii. Evaluate and recommend solutions to integrate with overall technology ecosystem

viii. Tracks industry and application trends and relates these to planning current and future IT needs

͏

2. Stakeholder coordination & audit assistance

a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations

b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security

c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements

d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers

e. Provide training to employees on issues such as spam and unwanted or malicious emails


Only shortlisted candidates will be contacted for this role.


To apply, please submit your resume ASAP for immediate consideration or email Supriya.thorat@itbility.com.au

Job Domain/Function :

Job Type :

Educational Qualifications :

Location :

Melbourne, Victoria, Australia

Create alert for similar jobs

IT

ITbility

Cyber security architect-ITbility-Melbourne, Australia