Sorry, the offer is not available,
but you can perform a new search or explore similar offers:

Service Desk Specialist

The Opportunity: The Fisher Investments Australasia Pty Ltd IT Service Desk Specialist provides in-depth desktop support to the Company and its employees. Yo...


From Fisher Investments Europe - New South Wales

Published 9 days ago

Principal Software Engineer

We are Rokt, a hyper-growth ecommerce leader. We enable companies to unlock value by making each transaction relevant at the moment that matters most, when c...


From Rokt Group - New South Wales

Published 9 days ago

Data Administrator

The Future Generation Joint Venture brings together the combined engineering experience and expertise of WeBuild, Clough, and Lane and has been selected to d...


From Workforce Australia For Individuals - New South Wales

Published 9 days ago

Data Governance Analyst

Database Development & Administration (Information & Communication Technology) Angle Auto Finance is an independent financier in Australia, bringing a modern...


From Angle Auto Finance - New South Wales

Published 9 days ago

Ict Security Administrator

Ict Security Administrator
Company:

Turnkey Consulting


Details of the offer

What Type 1 or more characters for results.
Where Type 1 or more characters for results.
Turnkey Consulting is the leading provider ofIntegrated Risk Management (IRM), Identity Access Management (IAM), and Cyberand Application Security. We help leading organisations around the worldsafeguard their critical business applications and minimize associated risks.Our culture is built upon quality, satisfaction, knowledge sharing, and a focuson meeting our clients' needs. With offices in the UK, France, Germany,Malaysia, Singapore, Australia, and the US, we are a global organizationcommitted to helping companies act with integrity and embrace best practicesfor Risk Management, Identity Management, and Application & Cybersecurity.
Objectives of the role: Help our clients to safeguard all companydata, particularly sensitive information, from both internal and externalthreats by designing broad defences against would-be intrudersEstablish day-to-day monitoring forunusual activities, implement defensive protocols, and report incidentsCollaborate with other members of thecybersecurity team to develop new protocols, layers of protection, andother proactive and defensive systems for remaining ahead ofcybercriminalsDevelop and maintain security guidelines, policies,procedures, standards, and controlsMaintain knowledge of current cybercrimetacticsResponsibilities: Collect data on current security posture,and write status reports regularlyMonitor controls and governance processesConduct testing to identifyvulnerabilities, and collaborate with cybersecurity teamConfigure cybersecurity, especiallyidentity and access management systems, with a security-first mindsetAssess validity of credentials assigned toauthorised users, monitor access-related activities, and check forunregistered information changesTroubleshooting and root cause analysis ofsecurity issuesDocumenting and maintaining securityprocesses and standard operating proceduresWe are looking ideally for someone with the following attributes: 5+ years of professional work experience as a securityadministrator, with a proven track record of delivering projects and businessas usual operationsWorking both as part of a team, or individually, and familiarwith the relevant non-technical project activities (i.e., projectplanning, stakeholder management, change management, schedule management,quality assurance, budget management etc)Detailed understanding of securitybusiness processes and how they contribute to enterprise identity controlsAble to work on positioning business problems and innovative waysto solve themBachelor's degree in business, IT, IT security or related fieldAbility to effectively manage own time and prioritiesThe following attributes, while not mandatory, will be advantageous: Professional certifications such as CISSP, CISM, ITIL, etc.SIX Sigma Yellow Belt CertificationProduct certifications from Sailpoint, CyberArk, SAP or otherIAM product vendorsExperience of working in professional services consulting,ideally experience with the 'Big-4' or similarImplementation and project methodologies (e.g., PRINCE2/AGILE) Company Description Turnkey Consulting is the leading provider ofIntegrated Risk Management (IRM), Identity Access Management (IAM), and Cyberand Application Security. We help leading organisations around the worldsafeguard their critical business applications and minimize associated risks.Our culture is built upon quality, satisfaction, knowledge sharing, and a focuson meeting our clients' needs. With offices in the UK, France, Germany,Malaysia, Singapore, Australia, and the US, we are a global organizationcommitted to helping companies act with integrity and embrace best practicesfor Risk Management, Identity Management, and Application & Cybersecurity.
Objectives of the role: Help our clients to safeguard all companydata, particularly sensitive information, from both internal and externalthreats by designing broad defences against would-be intrudersEstablish day-to-day monitoring forunusual activities, implement defensive protocols, and report incidentsCollaborate with other members of thecybersecurity team to develop new protocols, layers of protection, andother proactive and defensive systems for remaining ahead ofcybercriminalsDevelop and maintain security guidelines, policies,procedures, standards, and controlsMaintain knowledge of current cybercrimetacticsResponsibilities: Collect data on current security posture,and write status reports regularlyMonitor controls and governance processesConduct testing to identifyvulnerabilities, and collaborate with cybersecurity teamConfigure cybersecurity, especiallyidentity and access management systems, with a security-first mindsetAssess validity of credentials assigned toauthorised users, monitor access-related activities, and check forunregistered information changesTroubleshooting and root cause analysis ofsecurity issuesDocumenting and maintaining securityprocesses and standard operating proceduresWe are looking ideally for someone with the following attributes: 5+ years of professional work experience as a securityadministrator, with a proven track record of delivering projects and businessas usual operationsWorking both as part of a team, or individually, and familiarwith the relevant non-technical project activities (i.e., projectplanning, stakeholder management, change management, schedule management,quality assurance, budget management etc)Detailed understanding of securitybusiness processes and how they contribute to enterprise identity controlsAble to work on positioning business problems and innovative waysto solve themBachelor's degree in business, IT, IT security or related fieldAbility to effectively manage own time and prioritiesThe following attributes, while not mandatory, will be advantageous: Professional certifications such as CISSP, CISM, ITIL, etc.SIX Sigma Yellow Belt CertificationProduct certifications from Sailpoint, CyberArk, SAP or otherIAM product vendorsExperience of working in professional services consulting,ideally experience with the 'Big-4' or similarImplementation and project methodologies (e.g., PRINCE2/AGILE) Summary of role requirements:Flexible hours availableMore than 4 years of relevant work experience required for this roleWorking rights required for this roleExpected start date for role: 01 August 2024Expected salary: $100,000 - $120,000 per year Be careful - Don't provide your bank or credit card details when applying for jobs. Don't transfer any money or complete suspicious online surveys. If you see something suspicious, report this job ad . Sign in to start saving jobs in your profile.Don't have a Jora account? Register with:Do you want to receive recommendations for similar jobs?
#J-18808-Ljbffr


Source: Talent_Dynamic-Ppc

Requirements

Ict Security Administrator
Company:

Turnkey Consulting


Built at: 2024-10-06T03:58:50.783Z