Ict Security Administrator

Ict Security Administrator
Company:

Turnkey Consulting


Details of the offer

What Type 1 or more characters for results.
Where Type 1 or more characters for results.
Turnkey Consulting is the leading provider ofIntegrated Risk Management (IRM), Identity Access Management (IAM), and Cyberand Application Security. We help leading organisations around the worldsafeguard their critical business applications and minimize associated risks.Our culture is built upon quality, satisfaction, knowledge sharing, and a focuson meeting our clients' needs. With offices in the UK, France, Germany,Malaysia, Singapore, Australia, and the US, we are a global organizationcommitted to helping companies act with integrity and embrace best practicesfor Risk Management, Identity Management, and Application & Cybersecurity.
Objectives of the role: Help our clients to safeguard all companydata, particularly sensitive information, from both internal and externalthreats by designing broad defences against would-be intrudersEstablish day-to-day monitoring forunusual activities, implement defensive protocols, and report incidentsCollaborate with other members of thecybersecurity team to develop new protocols, layers of protection, andother proactive and defensive systems for remaining ahead ofcybercriminalsDevelop and maintain security guidelines, policies,procedures, standards, and controlsMaintain knowledge of current cybercrimetacticsResponsibilities: Collect data on current security posture,and write status reports regularlyMonitor controls and governance processesConduct testing to identifyvulnerabilities, and collaborate with cybersecurity teamConfigure cybersecurity, especiallyidentity and access management systems, with a security-first mindsetAssess validity of credentials assigned toauthorised users, monitor access-related activities, and check forunregistered information changesTroubleshooting and root cause analysis ofsecurity issuesDocumenting and maintaining securityprocesses and standard operating proceduresWe are looking ideally for someone with the following attributes: 5+ years of professional work experience as a securityadministrator, with a proven track record of delivering projects and businessas usual operationsWorking both as part of a team, or individually, and familiarwith the relevant non-technical project activities (i.e., projectplanning, stakeholder management, change management, schedule management,quality assurance, budget management etc)Detailed understanding of securitybusiness processes and how they contribute to enterprise identity controlsAble to work on positioning business problems and innovative waysto solve themBachelor's degree in business, IT, IT security or related fieldAbility to effectively manage own time and prioritiesThe following attributes, while not mandatory, will be advantageous: Professional certifications such as CISSP, CISM, ITIL, etc.SIX Sigma Yellow Belt CertificationProduct certifications from Sailpoint, CyberArk, SAP or otherIAM product vendorsExperience of working in professional services consulting,ideally experience with the 'Big-4' or similarImplementation and project methodologies (e.g., PRINCE2/AGILE) Company Description Turnkey Consulting is the leading provider ofIntegrated Risk Management (IRM), Identity Access Management (IAM), and Cyberand Application Security. We help leading organisations around the worldsafeguard their critical business applications and minimize associated risks.Our culture is built upon quality, satisfaction, knowledge sharing, and a focuson meeting our clients' needs. With offices in the UK, France, Germany,Malaysia, Singapore, Australia, and the US, we are a global organizationcommitted to helping companies act with integrity and embrace best practicesfor Risk Management, Identity Management, and Application & Cybersecurity.
Objectives of the role: Help our clients to safeguard all companydata, particularly sensitive information, from both internal and externalthreats by designing broad defences against would-be intrudersEstablish day-to-day monitoring forunusual activities, implement defensive protocols, and report incidentsCollaborate with other members of thecybersecurity team to develop new protocols, layers of protection, andother proactive and defensive systems for remaining ahead ofcybercriminalsDevelop and maintain security guidelines, policies,procedures, standards, and controlsMaintain knowledge of current cybercrimetacticsResponsibilities: Collect data on current security posture,and write status reports regularlyMonitor controls and governance processesConduct testing to identifyvulnerabilities, and collaborate with cybersecurity teamConfigure cybersecurity, especiallyidentity and access management systems, with a security-first mindsetAssess validity of credentials assigned toauthorised users, monitor access-related activities, and check forunregistered information changesTroubleshooting and root cause analysis ofsecurity issuesDocumenting and maintaining securityprocesses and standard operating proceduresWe are looking ideally for someone with the following attributes: 5+ years of professional work experience as a securityadministrator, with a proven track record of delivering projects and businessas usual operationsWorking both as part of a team, or individually, and familiarwith the relevant non-technical project activities (i.e., projectplanning, stakeholder management, change management, schedule management,quality assurance, budget management etc)Detailed understanding of securitybusiness processes and how they contribute to enterprise identity controlsAble to work on positioning business problems and innovative waysto solve themBachelor's degree in business, IT, IT security or related fieldAbility to effectively manage own time and prioritiesThe following attributes, while not mandatory, will be advantageous: Professional certifications such as CISSP, CISM, ITIL, etc.SIX Sigma Yellow Belt CertificationProduct certifications from Sailpoint, CyberArk, SAP or otherIAM product vendorsExperience of working in professional services consulting,ideally experience with the 'Big-4' or similarImplementation and project methodologies (e.g., PRINCE2/AGILE) Summary of role requirements:Flexible hours availableMore than 4 years of relevant work experience required for this roleWorking rights required for this roleExpected start date for role: 01 August 2024Expected salary: $100,000 - $120,000 per year Be careful - Don't provide your bank or credit card details when applying for jobs. Don't transfer any money or complete suspicious online surveys. If you see something suspicious, report this job ad . Sign in to start saving jobs in your profile.Don't have a Jora account? Register with:Do you want to receive recommendations for similar jobs?
#J-18808-Ljbffr


Source: Talent_Dynamic-Ppc

Requirements

Ict Security Administrator
Company:

Turnkey Consulting


Sysadmin / Data Base Administrator / 4Gl Developer

We are seeking a tertiary qualified professional who can work in a team environment, with the ability to take ownership of projects as well as the capacity t...


From De Bortoli Wines - New South Wales

Published 22 days ago

Canobolas Rural Technology High School - Canteen Manager

Canobolas Rural Technology High School - Canteen Manager 35 hours per week 7.30-3pm School term only Cook/Chef Barista experience essential Manage a small te...


From Canobolas Rural Technology High School - New South Wales

Published 22 days ago

Director Of Information Technology

The Australian Human Rights Commission has an ongoing role for an EL2 Director of Information Technology.Working closely with the COO, this role provides vis...


From Clearcompany - New South Wales

Published 22 days ago

Director Cyber Security Operations

About the Agency The Australian Digital Health Agency (the Agency) is responsible for national digital health services and systems, with a focus on engagemen...


From Australian Digital Health Agency - New South Wales

Published 22 days ago

Built at: 2024-07-08T13:14:18.977Z