Cyber Security Manager
Management opportunity in prestigious consultancy Melbourne CBD location Career growth and progression guaranteed This prestigious consultancy requires a Cyber Security Manager to join their team based in Melbourne CBD. You will deliver a range of services that protect enterprise systems, applications, and data by establishing policies, practices and tools that prevent unauthorized access, use, disclosure, modification or disruption. Required Qualifications Minimum 10 years of experience in Information Security roles, preferably with involvement in a combination of assurance & risk management, systems design, security operations and auditing.
Tertiary level or vendor aligned qualifications covering both general IT usage and support, as well as Information Security specific qualifications Mandatory Spunk Certification and 3 years' experience (minimum) Working knowledge of scripting Certifications in at least three of the following: GCIH, GCFA, CISSP, ITIL Foundation certificate, (or relevant SANS certification) Successful profile: Min 8-10 years' experience in Information Security, with a strong understanding of security operations 3-5 years of experience managing teams 2 years of experience working on Information Security Projects Some experience in Information Security Strategy Min 5 years' experience in working in information technology operational roles Min 5 years' experience successfully delivering services within a service level agreement defined environment Understanding of cloud security operations in environments such as AWS, Azure, Google, etc. SIEM (Security Incident and Monitoring) threat hunting, vulnerability management, security monitoring, triaging incidents, creation of security incident reports, ability to build dashboards, running cyber exercises Min 5 years' experience providing technical security operations working knowledge of network security, anti-malware solutions, proxy, encryption, operating system patching, password access management systems, automated policy compliance, IAM (identity and access management), privilege user management systems Be responsible for the Security Operational Strategy Drive upliftment and innovation in the area of Information Security Operations Contribute to security architecture and design.