19 Security Consultant jobs in Australia

Security Consultant II

Akamai Technologies, Inc.

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

**Do you relish the prospect of providing end to end support across multiple product suits?**
**Would you like the opportunity to work in a high-impact role responsible for building customer loyalty?**
**Join our highly-skilled Security Consulting team**
Our Professional Services team is a group of Internet technologists and Security experts that support customers globally. We design, implement web, network and security solutions to make the Internet work fast, intelligent and secure. We utilize security expertise and deploy solutions to protect our customers' applications, data and infrastructure.
**Become a trusted advisor**
As a Security Consultant, you'll be the primary security contact, ensuring successful integration & support for customers. As a trusted consultant, you'll learn & implement creative solutions to help customers leverage Akamai's security products.
As a Security Consultant, you will be responsible for:
+ Advocating security best practice for the customers during product integration and maintenance
+ Being the central point of contact for customers & leading the integrated account team delivering customer success
+ Partnering with the business and cross-functional project teams to review and ensure integration efficiency, high quality service
+ Leveraging technical expertise & project management skills, along with periodic hands-on technical work to ensure customer satisfaction
+ Identifying service enhancements and potential problems to ensure continuous improvements to quality of customer service delivery
+ Communicating with customers, internal teams and partners to share information and deliverables
**Do what you love**
To be successful in this role you will:
+ Have 3-5years of relevant experience & a bachelor's degree in Computer Science, or its equivalent
+ Demonstrate experience in a customer-facing role within the information technology industry
+ Demonstrate expertise in Application Layer Security, API Security, SIEM, DevSecOps
+ Show understanding of working with network technologies, web security or media related technologies, methodologies and/or architectures
+ Have knowledge in router setup knowledge, CCNP, BGP knowledge
+ Have a natural ability to engage, influence and build trusted relationships with customers in difficult environments
+ Demonstrate experience in delivering technical projects with an ability to manage multiple priorities
+ Be a good team player, able to collaborate, prioritize, and solve problems in a fast changing environment
**Work in a way that works for you**
FlexBase, Akamai's Global Flexible Working Program, is based on the principles that are helping us create the best workplace in the world. When our colleagues said that flexible working was important to them, we listened. We also know flexible working is important to many of the incredible people considering joining Akamai. FlexBase, gives 95% of employees the choice to work from their home, their office, or both (in the country advertised). This permanent workplace flexibility program is consistent and fair globally, to help us find incredible talent, virtually anywhere. We are happy to discuss working options for this role and encourage you to speak with your recruiter in more detail when you apply.
Learn ( what makes Akamai a great place to work
Connect with us on social and see what life at Akamai is like!
**We power and protect life online, by solving the toughest challenges, together.**
At Akamai, we're curious, innovative, collaborative and tenacious. We celebrate diversity of thought and we hold an unwavering belief that we can make a meaningful difference. Our teams use their global perspectives to put customers at the forefront of everything they do, so if you are people-centric, you'll thrive here.
**Working for you**
At Akamai, we will provide you with opportunities to grow, flourish, and achieve great things. Our benefit options are designed to meet your individual needs for today and in the future. We provide benefits surrounding all aspects of your life:
+ Your health
+ Your finances
+ Your family
+ Your time at work
+ Your time pursuing other endeavours
Our benefit plan options are designed to meet your individual needs and budget, both today and in the future.
**About us**
Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences helping billions of people live, work, and play every day. With the world's most distributed compute platform from cloud to edge we make it easy for customers to develop and run applications, while we keep experiences closer to users and threats farther away.
**Join us**
Are you seeking an opportunity to make a real difference in a company with a global reach and exciting services and clients? Come join us and grow with a team of people who will energize and inspire you!
#LI-Remote
This advertiser has chosen not to accept applicants from your region.

Cyber Security GRC Consultant

Melbourne, Victoria Leidos

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

**Description**
+ We're a 'Family Friendly' certified workplace - we understand the often many and varied roles our team members need to play within their own unique family setting and actively support them.
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
Within the Central Processing (CP) Security team, the Cyber Security GRC Specialist plays a key leadership role in shaping and supporting our governance, risk, and compliance efforts across the CP Environment.
This senior position blends technical expertise, strategic insight, and collaborative engagement to ensure our cybersecurity program meets regulatory obligations and aligns with best practices. You'll work closely with cross-functional teams and stakeholders to uplift the organisation's security posture and foster a culture of informed risk management.
**Responsibilities**
+ Governance, Policy & Compliance: Collaboratively develop, review, and maintain cybersecurity policies and processes aligned with key frameworks (e.g. NIST CSF, ISO 27001, DSPF, ISM); contribute to system authorisation activities and lead compliance initiatives, including POAM remediation.
+ Risk Management: Facilitate enterprise risk assessments across systems, vendors, and business units; guide business impact analyses and threat modelling; support informed decision-making through clear tracking and communication of mitigation efforts.
+ Third-Party Risk & Due Diligence: Partner with internal stakeholders to lead vendor security reviews and due diligence processes; support risk-informed vendor decisions and foster trusted third-party relationships.
+ Awareness, Training & Reporting: Lead the design and delivery of inclusive, enterprise-wide security awareness initiatives; tailor training to diverse teams; prepare reports, dashboards, and insights for leadership and governance forums.
+ Leadership, Strategy & Innovation: Act as a trusted advisor across the business; mentor and support junior colleagues; identify opportunities to enhance processes through automation; contribute to the ongoing evolution of the GRC function through strategic planning and collaboration.
**About You**
You're a collaborative, solutions-oriented professional who brings both technical expertise and a people-first mindset to your work. You value working in inclusive teams, building strong relationships, and delivering meaningful outcomes.
+ A degree in Information Security, Computer Science, Risk Management or a related field - or equivalent industry certifications.
+ Experience in information security, including specialism in GRC.
+ A solid understanding of security standards and frameworks, particularly in regulated environments such as Defence, and experience with the Cyber Security Assessment and Authorisation Framework.
+ Strong communication skills - written and verbal - with experience presenting to senior leadership and translating complex ideas into clear, actionable insights.
+ Industry-recognised certifications such as CISSP, CISA, CISM, CRISC, CGEIT, ISO 27001 Lead Implementer/Auditor, or IRAP.
+ A strengths-based mindset, with capabilities in strategic thinking, risk-based decision making, regulatory understanding, and technical knowledge of cyber controls.
+ A self-starter attitude with the ability to work both independently and as a supportive member of high-performing teams.
_This role does require the successful applicant to be an Australian Citizen and hold a NV-1 level security clearance and uplift to an NV-2_
**Diverse Team Members, Shared Values and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values. It's about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network,Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - virtual / face to face interview & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please contact our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R- -OTHLOC-LOCATION-2D3-2D19002
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
This advertiser has chosen not to accept applicants from your region.

Cyber Security GRC Consultant

Canberra, Australian Capital Territory Leidos

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

**Description**
+ We're a 'Family Friendly' certified workplace - we understand the often many and varied roles our team members need to play within their own unique family setting and actively support them.
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
Within the Central Processing (CP) Security team, the Cyber Security GRC Specialist plays a key leadership role in shaping and supporting our governance, risk, and compliance efforts across the CP Environment.
This senior position blends technical expertise, strategic insight, and collaborative engagement to ensure our cybersecurity program meets regulatory obligations and aligns with best practices. You'll work closely with cross-functional teams and stakeholders to uplift the organisation's security posture and foster a culture of informed risk management.
**Responsibilities**
+ Governance, Policy & Compliance: Collaboratively develop, review, and maintain cybersecurity policies and processes aligned with key frameworks (e.g. NIST CSF, ISO 27001, DSPF, ISM); contribute to system authorisation activities and lead compliance initiatives, including POAM remediation.
+ Risk Management: Facilitate enterprise risk assessments across systems, vendors, and business units; guide business impact analyses and threat modelling; support informed decision-making through clear tracking and communication of mitigation efforts.
+ Third-Party Risk & Due Diligence: Partner with internal stakeholders to lead vendor security reviews and due diligence processes; support risk-informed vendor decisions and foster trusted third-party relationships.
+ Awareness, Training & Reporting: Lead the design and delivery of inclusive, enterprise-wide security awareness initiatives; tailor training to diverse teams; prepare reports, dashboards, and insights for leadership and governance forums.
+ Leadership, Strategy & Innovation: Act as a trusted advisor across the business; mentor and support junior colleagues; identify opportunities to enhance processes through automation; contribute to the ongoing evolution of the GRC function through strategic planning and collaboration.
**About You**
You're a collaborative, solutions-oriented professional who brings both technical expertise and a people-first mindset to your work. You value working in inclusive teams, building strong relationships, and delivering meaningful outcomes.
+ A degree in Information Security, Computer Science, Risk Management or a related field - or equivalent industry certifications.
+ Experience in information security, including specialism in GRC.
+ A solid understanding of security standards and frameworks, particularly in regulated environments such as Defence, and experience with the Cyber Security Assessment and Authorisation Framework.
+ Strong communication skills - written and verbal - with experience presenting to senior leadership and translating complex ideas into clear, actionable insights.
+ Industry-recognised certifications such as CISSP, CISA, CISM, CRISC, CGEIT, ISO 27001 Lead Implementer/Auditor, or IRAP.
+ A strengths-based mindset, with capabilities in strategic thinking, risk-based decision making, regulatory understanding, and technical knowledge of cyber controls.
+ A self-starter attitude with the ability to work both independently and as a supportive member of high-performing teams.
_This role does require the successful applicant to be an Australian Citizen and hold a NV-1 level security clearance and uplift to an NV-2_
**Diverse Team Members, Shared Values and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values. It's about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network,Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - virtual / face to face interview & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please contact our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R-
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
This advertiser has chosen not to accept applicants from your region.

Cyber Security GRC Consultant

Brisbane, Queensland Leidos

Posted 10 days ago

Job Viewed

Tap Again To Close

Job Description

**Description**
+ We're a 'Family Friendly' certified workplace - we understand the often many and varied roles our team members need to play within their own unique family setting and actively support them.
Our team feel Leidos is a great place to work. Learn more about our culture and benefits by visiting us here Work That Matters**
Leidos Australia delivers IT and airborne solutions that protect and advance the Australian way of life. Our 2000 local experts, backed by our global experience and network of partners, are working to solve the world's toughest challenges in government, intelligence, defence, aviation, border protection and health markets.
**Your New Role and Responsibilities**
Within the Central Processing (CP) Security team, the Cyber Security GRC Specialist plays a key leadership role in shaping and supporting our governance, risk, and compliance efforts across the CP Environment.
This senior position blends technical expertise, strategic insight, and collaborative engagement to ensure our cybersecurity program meets regulatory obligations and aligns with best practices. You'll work closely with cross-functional teams and stakeholders to uplift the organisation's security posture and foster a culture of informed risk management.
**Responsibilities**
+ Governance, Policy & Compliance: Collaboratively develop, review, and maintain cybersecurity policies and processes aligned with key frameworks (e.g. NIST CSF, ISO 27001, DSPF, ISM); contribute to system authorisation activities and lead compliance initiatives, including POAM remediation.
+ Risk Management: Facilitate enterprise risk assessments across systems, vendors, and business units; guide business impact analyses and threat modelling; support informed decision-making through clear tracking and communication of mitigation efforts.
+ Third-Party Risk & Due Diligence: Partner with internal stakeholders to lead vendor security reviews and due diligence processes; support risk-informed vendor decisions and foster trusted third-party relationships.
+ Awareness, Training & Reporting: Lead the design and delivery of inclusive, enterprise-wide security awareness initiatives; tailor training to diverse teams; prepare reports, dashboards, and insights for leadership and governance forums.
+ Leadership, Strategy & Innovation: Act as a trusted advisor across the business; mentor and support junior colleagues; identify opportunities to enhance processes through automation; contribute to the ongoing evolution of the GRC function through strategic planning and collaboration.
**About You**
You're a collaborative, solutions-oriented professional who brings both technical expertise and a people-first mindset to your work. You value working in inclusive teams, building strong relationships, and delivering meaningful outcomes.
+ A degree in Information Security, Computer Science, Risk Management or a related field - or equivalent industry certifications.
+ Experience in information security, including specialism in GRC.
+ A solid understanding of security standards and frameworks, particularly in regulated environments such as Defence, and experience with the Cyber Security Assessment and Authorisation Framework.
+ Strong communication skills - written and verbal - with experience presenting to senior leadership and translating complex ideas into clear, actionable insights.
+ Industry-recognised certifications such as CISSP, CISA, CISM, CRISC, CGEIT, ISO 27001 Lead Implementer/Auditor, or IRAP.
+ A strengths-based mindset, with capabilities in strategic thinking, risk-based decision making, regulatory understanding, and technical knowledge of cyber controls.
+ A self-starter attitude with the ability to work both independently and as a supportive member of high-performing teams.
_This role does require the successful applicant to be an Australian Citizen and hold a NV-1 level security clearance and uplift to an NV-2_
**Diverse Team Members, Shared Values and a Common Purpose**
_Providing our customers with smarter solutions takes an incredible team with diversity of thought, experience and perspectives driving innovation. Inclusion is at the heart of our culture and is one of our core values. It's about creating a workplace where everyone can do important work, feels welcome, valued, and respected, and has equal access to opportunities to thrive. Paul Chase - Chief Executive, Leidos Australia._
Leidos Australia is an equal opportunities organisation and is committed to creating a truly inclusive workplace. We welcome and encourage applications from Aboriginal and Torres Strait Islanders, culturally and linguistically diverse people, people with disabilities, veterans, neurodiverse people, and people of all genders, sexualities, and age groups.
Our five Advocacy Groups (Women and Allies Network,Young Professionals, Defence & Emergency Services, Action for Accessibility and Abilities and Pride+) provide an opportunity for team members to connect and collaborate on shared interests, and work to support and celebrate our diverse community.
**Next Steps**
+ To apply for this role, follow the links or apply via our Careers page.
+ Recruitment process - virtual / face to face interview & background checks.
+ Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can place limitations on persons who hold dual nationality, permanent residency or are former nationals of certain countries as per ITAR 126.1.
+ We are committed to making our recruitment process accessible to all candidates. Please contact our Careers team if you'd like to discuss any additional support during your application or throughout the recruitment process.
If you're looking for comfort, keep scrolling. At Leidos, we outthink, outbuild, and outpace the status quo - because the mission demands it. We're not hiring followers. We're recruiting the ones who disrupt, provoke, and refuse to fail. Step 10 is ancient history. We're already at step 30 - and moving faster than anyone else dares.
**Original Posting:**
For U.S. Positions: While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
**Pay Range:**
The Leidos pay range for this job level is a general guideline onlyand not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
REQNUMBER: R- -OTHLOC-PL-2D3331
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status. Leidos will consider qualified applicants with criminal histories for employment in accordance with relevant Laws. Leidos is an equal opportunity employer/disability/vet.
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Consultant

Canberra, Australian Capital Territory Kyndryl

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

**Who We Are**
At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward - always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities.
**The Role**
As a Senior Security Operations Consultant you will help Australian clients strengthen their security operations by designing, implementing, and improving their SOC capabilities. You will be responsible for leveraging industry-leading **SIEM solutions** such as **Splunk** , **Sentinel** , **Cortex** , or other security monitoring tools. Your key focus will be on enabling **advanced threat detection** , improving incident response workflows, and ensuring that SOC teams are properly trained and supported.
You will be responsible for guiding clients on meeting compliance and regulatory requirements on security detection and response capabilities. This role requires deep expertise in Australian industry-specific requirements for **government agencies, financial institutions** , and critical infrastructure sectors.
Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses.
You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework.
The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions.
In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense.
Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception.
Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships.
Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions - so, if you're a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology.
Your Future at Kyndryl
As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts - presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth
**Who You Are**
You're good at what you do and possess the required experience to prove it. However, equally as important - you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally, you're open and borderless - naturally inclusive in how you work with others.
**Required Skills:**
· Expertise in **SIEM** tools such as **Splunk** , **Sentinel** , **Cortex** , or other security monitoring tools.
· Strong knowledge of **Australian cybersecurity regulations** such as **Essential Eight** , **ASD's Strategies to Mitigate Cyber Security Incidents** , and **ACSC Cyber Threat Reports** .
· Experience in designing and implementing **SOC** processes, including incident detection, response, and recovery.
· Familiarity with **Australian Data Breach Notification (NDB)** scheme and **incident response protocols** .
· Strong understanding of **advanced threat detection** techniques such as **behavioral analytics** , **AI/ML-driven threat hunting** , and **threat intelligence feeds** .
· Experience in leading and mentoring SOC teams, ensuring continuous improvement in detection and response capabilities.
**Required Experience:**
· 8-10 years of experience in security operations, with a focus on **SOC** management and **incident response** .
· Proven experience working in **Australian market** with specific knowledge of **ACSC** guidelines and **Australian regulatory requirements** .
· Experience working in highly regulated industries (e.g., **banking, critical infrastructure, government** ).
· Certifications such as **CISSP** , **SANS GIAC** , and **SOC certifications** (e.g., CSIRT, GSEC) are highly desirable.
+ Australian Citizen with the ability to obtain AGSVA security clearance.
**Being You**
Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you - and everyone next to you - the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way.
**What You Can Expect**
With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter - wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed.
**Get Referred!**
If you know someone that works at Kyndryl, when asked 'How Did You Hear About Us' during the application process, select 'Employee Referral' and enter your contact's Kyndryl email address.
Kyndryl is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. Kyndryl is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Consultant

Melbourne, Victoria Kyndryl

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

**Who We Are**
At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward - always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities.
**The Role**
As a Senior Security Operations Consultant you will help Australian clients strengthen their security operations by designing, implementing, and improving their SOC capabilities. You will be responsible for leveraging industry-leading **SIEM solutions** such as **Splunk** , **Sentinel** , **Cortex** , or other security monitoring tools. Your key focus will be on enabling **advanced threat detection** , improving incident response workflows, and ensuring that SOC teams are properly trained and supported.
You will be responsible for guiding clients on meeting compliance and regulatory requirements on security detection and response capabilities. This role requires deep expertise in Australian industry-specific requirements for **government agencies, financial institutions** , and critical infrastructure sectors.
Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses.
You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework.
The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions.
In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense.
Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception.
Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships.
Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions - so, if you're a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology.
Your Future at Kyndryl
As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts - presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth
**Who You Are**
You're good at what you do and possess the required experience to prove it. However, equally as important - you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally, you're open and borderless - naturally inclusive in how you work with others.
**Required Skills:**
· Expertise in **SIEM** tools such as **Splunk** , **Sentinel** , **Cortex** , or other security monitoring tools.
· Strong knowledge of **Australian cybersecurity regulations** such as **Essential Eight** , **ASD's Strategies to Mitigate Cyber Security Incidents** , and **ACSC Cyber Threat Reports** .
· Experience in designing and implementing **SOC** processes, including incident detection, response, and recovery.
· Familiarity with **Australian Data Breach Notification (NDB)** scheme and **incident response protocols** .
· Strong understanding of **advanced threat detection** techniques such as **behavioral analytics** , **AI/ML-driven threat hunting** , and **threat intelligence feeds** .
· Experience in leading and mentoring SOC teams, ensuring continuous improvement in detection and response capabilities.
**Required Experience:**
· 8-10 years of experience in security operations, with a focus on **SOC** management and **incident response** .
· Proven experience working in **Australian market** with specific knowledge of **ACSC** guidelines and **Australian regulatory requirements** .
· Experience working in highly regulated industries (e.g., **banking, critical infrastructure, government** ).
· Certifications such as **CISSP** , **SANS GIAC** , and **SOC certifications** (e.g., CSIRT, GSEC) are highly desirable.
+ Australian Citizen with the ability to obtain AGSVA security clearance.
**Being You**
Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you - and everyone next to you - the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way.
**What You Can Expect**
With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter - wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed.
**Get Referred!**
If you know someone that works at Kyndryl, when asked 'How Did You Hear About Us' during the application process, select 'Employee Referral' and enter your contact's Kyndryl email address.
Kyndryl is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. Kyndryl is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
This advertiser has chosen not to accept applicants from your region.

Senior Security Operations Consultant

Sydney, New South Wales Kyndryl

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

**Who We Are**
At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward - always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities.
**The Role**
As a Senior Security Operations Consultant you will help Australian clients strengthen their security operations by designing, implementing, and improving their SOC capabilities. You will be responsible for leveraging industry-leading **SIEM solutions** such as **Splunk** , **Sentinel** , **Cortex** , or other security monitoring tools. Your key focus will be on enabling **advanced threat detection** , improving incident response workflows, and ensuring that SOC teams are properly trained and supported.
You will be responsible for guiding clients on meeting compliance and regulatory requirements on security detection and response capabilities. This role requires deep expertise in Australian industry-specific requirements for **government agencies, financial institutions** , and critical infrastructure sectors.
Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses.
You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework.
The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions.
In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense.
Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception.
Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships.
Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions - so, if you're a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology.
Your Future at Kyndryl
As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts - presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth
**Who You Are**
You're good at what you do and possess the required experience to prove it. However, equally as important - you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused - someone who prioritizes customer success in their work. And finally, you're open and borderless - naturally inclusive in how you work with others.
**Required Skills:**
· Expertise in **SIEM** tools such as **Splunk** , **Sentinel** , **Cortex** , or other security monitoring tools.
· Strong knowledge of **Australian cybersecurity regulations** such as **Essential Eight** , **ASD's Strategies to Mitigate Cyber Security Incidents** , and **ACSC Cyber Threat Reports** .
· Experience in designing and implementing **SOC** processes, including incident detection, response, and recovery.
· Familiarity with **Australian Data Breach Notification (NDB)** scheme and **incident response protocols** .
· Strong understanding of **advanced threat detection** techniques such as **behavioral analytics** , **AI/ML-driven threat hunting** , and **threat intelligence feeds** .
· Experience in leading and mentoring SOC teams, ensuring continuous improvement in detection and response capabilities.
**Required Experience:**
· 8-10 years of experience in security operations, with a focus on **SOC** management and **incident response** .
· Proven experience working in **Australian market** with specific knowledge of **ACSC** guidelines and **Australian regulatory requirements** .
· Experience working in highly regulated industries (e.g., **banking, critical infrastructure, government** ).
· Certifications such as **CISSP** , **SANS GIAC** , and **SOC certifications** (e.g., CSIRT, GSEC) are highly desirable.
+ Australian Citizen with the ability to obtain AGSVA security clearance.
**Being You**
Diversity is a whole lot more than what we look like or where we come from, it's how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we're not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you - and everyone next to you - the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That's the Kyndryl Way.
**What You Can Expect**
With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter - wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed.
**Get Referred!**
If you know someone that works at Kyndryl, when asked 'How Did You Hear About Us' during the application process, select 'Employee Referral' and enter your contact's Kyndryl email address.
Kyndryl is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. Kyndryl is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security consultant Jobs in Australia !

Privileged Access Security (PAM) Consultant

Sydney, New South Wales IBM

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

**Introduction**
A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe. You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat. Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.
**Your role and responsibilities**
As a Security Consultant, you will be a key advisor for IBM's clients, analysing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organisation with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.
Responsibilities & Duties:
*
Engage with clients to understand their business needs and objectives related to identity, access, and privileged access management.
*
Assess clients' existing systems, processes, and infrastructure to identify gaps and opportunities for Digital Identity and PAM integration.
*
Design and architect Privileged Access Management (PAM) solutions tailored to meet clients' requirements.
*
Collaborate with technical teams to ensure successful implementation, configuration, and customization of PAM products.
*
Conduct workshops and training sessions for client stakeholders to educate them on PAM functionalities, governance, and best practices.
*
Provide guidance and support to clients throughout the project lifecycle, including troubleshooting, issue resolution, and ongoing operational support.
*
Document project requirements, technical specifications, configurations, and deliverables.
*
Coordinate, collate, and validate artefacts related to audit queries; provide remediation plans for identified gaps.
*
Support the operations team in managing the PAM environment, including but not limited to:
*
Incident Management
*
Problem Management
*
Minor security patches
*
Defect fixes for recurring incidents
*
Vendor coordination for PAM tools
*
Application onboarding for privileged access
*
Operations Management and reporting
*
Coach and mentor junior security consultants, developing team skills in selected vendor PAM products (e.g., CyberArk, BeyondTrust, Delinea, etc.).
*
Thrive in a fast-paced environment, take initiative, and collaborate effectively across teams.
**Required technical and professional expertise**
Required Professional and Technical Expertise:
*
Degree in Information Technology, Computer Science, Network/Telecommunications Engineering, or equivalent (B.Tech, B.E, MCA, M.Sc. IT)
*
12+ years of experience in PAM architecture design, consulting, identity governance, and privileged access management.
*
Specialized expertise in IAM and PAM technologies, including IBM PAM products, SailPoint, Saviynt, Okta, Entra ID, CyberArk, and BeyondTrust.
*
Proven experience as an PAM security professional in client-facing roles, preferably with a focus on privileged access management.
*
In-depth knowledge of related technologies such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and identity federation.
*
Strong understanding of PAM frameworks, protocols, and standards (e.g., OAuth, OpenID Connect, SAML).
*
Demonstrated proficiency in designing and implementing PAM solutions in complex enterprise environments.
*
Hands-on experience managing operations and supporting large-scale PAM implementations.
*
Strong problem-solving and analytical skills, with the ability to diagnose and resolve complex technical issues.
*
Excellent communication and stakeholder management skills.
.
IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
This advertiser has chosen not to accept applicants from your region.

Privileged Access Security (PAM) Consultant

Melbourne, Victoria IBM

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

**Introduction**
A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe. You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat. Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.
**Your role and responsibilities**
As a Security Consultant, you will be a key advisor for IBM's clients, analysing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organisation with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world.
Responsibilities & Duties:
*
Engage with clients to understand their business needs and objectives related to identity, access, and privileged access management.
*
Assess clients' existing systems, processes, and infrastructure to identify gaps and opportunities for Digital Identity and PAM integration.
*
Design and architect Privileged Access Management (PAM) solutions tailored to meet clients' requirements.
*
Collaborate with technical teams to ensure successful implementation, configuration, and customization of PAM products.
*
Conduct workshops and training sessions for client stakeholders to educate them on PAM functionalities, governance, and best practices.
*
Provide guidance and support to clients throughout the project lifecycle, including troubleshooting, issue resolution, and ongoing operational support.
*
Document project requirements, technical specifications, configurations, and deliverables.
*
Coordinate, collate, and validate artefacts related to audit queries; provide remediation plans for identified gaps.
*
Support the operations team in managing the PAM environment, including but not limited to:
*
Incident Management
*
Problem Management
*
Minor security patches
*
Defect fixes for recurring incidents
*
Vendor coordination for PAM tools
*
Application onboarding for privileged access
*
Operations Management and reporting
*
Coach and mentor junior security consultants, developing team skills in selected vendor PAM products (e.g., CyberArk, BeyondTrust, Delinea, etc.).
*
Thrive in a fast-paced environment, take initiative, and collaborate effectively across teams.
**Required technical and professional expertise**
Required Professional and Technical Expertise:
*
Degree in Information Technology, Computer Science, Network/Telecommunications Engineering, or equivalent (B.Tech, B.E, MCA, M.Sc. IT)
*
12+ years of experience in PAM architecture design, consulting, identity governance, and privileged access management.
*
Specialized expertise in IAM and PAM technologies, including IBM PAM products, SailPoint, Saviynt, Okta, Entra ID, CyberArk, and BeyondTrust.
*
Proven experience as an PAM security professional in client-facing roles, preferably with a focus on privileged access management.
*
In-depth knowledge of related technologies such as Single Sign-On (SSO), Multi-Factor Authentication (MFA), and identity federation.
*
Strong understanding of PAM frameworks, protocols, and standards (e.g., OAuth, OpenID Connect, SAML).
*
Demonstrated proficiency in designing and implementing PAM solutions in complex enterprise environments.
*
Hands-on experience managing operations and supporting large-scale PAM implementations.
*
Strong problem-solving and analytical skills, with the ability to diagnose and resolve complex technical issues.
*
Excellent communication and stakeholder management skills.
.
IBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
This advertiser has chosen not to accept applicants from your region.

Delivery Consultant - Security

Sydney, New South Wales Amazon

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Description
Are you a security focused professional who loves working with others on helping them understand, assess and uplift their security capabilities? Are you excited about assisting others implement security for their cloud journeys? If so, we are looking for you!
At AWS, we're hiring an experienced Security Consulting professional to help our customers and partners develop technical expertise and capacity, and to work with our partners on key customer engagements. Our consultants will manage key customer relationships, deliver security advice and architecture guidance, lead proof-of-concept projects, and deliver customer engagements. AWS consultants will collaborate with customers to address security risk and achieve security outcomes, and implementing and migrating customer solutions and workloads onto cloud. AWS consultants will also have a drive to continue to learn and improve, including coaching/mentoring others.
This role will specialise in all aspects of information/cyber security management, as well as business and regulatory compliance using cloud web services in large scale computing environments.
Must hold or be able to attain an Australian Government Security Vetting Agency clearance (see job responsibilities
- Deliver IT/cyber security, security or compliance and security risk management, including privacy, controls, etc.
- Provide advice and support to customers regarding cloud computing concepts, technologies and/or workload transition.
- Guide customers on architectures and practices meeting industry standards/frameworks, such as PSPF, ISM, ISO 27k, SOC, PCI-DSS, NIST CSF, etc.
- Manage availability concepts and archive, backup/recovery and business continuity processes.
- Deliver consulting and/or implementation with enterprise security solutions such as identity management, federation systems, WAF, IPS, Anti-DDOS, and SIEM.
- Provide technical expertise in security architecture, automation, integration, and deployment (DevOps).
- Build enterprise security strategy, including for cloud adoption or driving the evolution to meet new requirements.
A day in the life
AWS Sales, Marketing, and Global Services (SMGS) is responsible for driving revenue, adoption, and growth from the largest and fastest growing small- and mid-market accounts to enterprise-level customers including public sector.
Diverse Experiences: AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job below, we encourage candidates to apply. If your career is just starting, hasn't followed a traditional path, or includes alternative experiences, don't let it stop you from applying.
Why AWS? Amazon Web Services (AWS) is the world's most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating - that's why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
Inclusive Team Culture - Here at AWS, it's in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon conferences, inspire us to never stop embracing our uniqueness.
Mentorship & Career Growth - We're continuously raising our performance bar as we strive to become Earth's Best Employer. That's why you'll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
Work/Life Balance - We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve in the cloud.
Basic Qualifications
- 5+ years of technical specialist, design and architecture experience
- 5+ years of security, compliance and risk management experience
- 5+ years of cloud based solution (AWS or equivalent), system, network and operating system experience
- 5+ years of external or internal customer facing, complex and large scale project management experience
Preferred Qualifications
- Industry security qualifications (e.g., CISA, CISM, IRAP assessor, etc.)
Acknowledgement of country:
In the spirit of reconciliation Amazon acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.
IDE statement:
Amazon is an equal opportunity employer and does not discriminate on the basis of protected veteran status, disability, or other legally protected status.
Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country/region you're applying in isn't listed, please contact your Recruiting Partner.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Consultant Jobs