1. Key Accountabilities:
• Take a leading role in developing, deploying, and improve specific network element
technologies and their interaction with Telstra processes and systems to deliver products and
services to customer business units
• Manage the translation of business requirements to deliver network elements into realisable
products, services, or systems and/or networks infrastructure in a timely, high quality and cost
effective way to ensure the operational capability to deliver reliable customer service.
• Assess capability of vendor solutions and offerings to meet business requirements and
manage vendor technology delivery.
• Ensure technology solutions are integrated with Telstra’s activation, assurance and billing
processes and systems, and meet operational requirements.
• Assist with the development of technology guidelines and standards in the design and
deployment of technologies.
• Performing SME duties, representing Security Operations in key internal and customer
projects as required.
• Establish and maintain effective working relationships with key internal stakeholders, vendors
and industry partners and where applicable, maintain agreed external stakeholders relationships
relevant to the achievement of business objectives
• Manage applications as required ensuring SLA’s are being met.
• Be prepared to learn new skills as new tools are integrated into the team
• Able to work with minimal supervision and Direction.
• Customer Driven – Keep our promises. Be courteous and helpful.
• Winning Culture - Know our competition. Act with urgency.
• Learns quickly when facing new problems; a relentless and versatile learner; open to change;
analyses both successes and failures for clues to improvement; experiments and will try anything to
find solutions; enjoys the challenge of unfamiliar tasks; quickly grasps the essence and the underlying
structure of anything.
Some specific accountabilities of the role include:
• Troubleshooting of Complex issues across customer technologies and their interaction to
Telstra management infrastructure and core platform technologies
• Maintain the level of information security required for this position, working on a strict need to
know basis.
Technical Skills:
TCP/IP and associated technologies Strong knowledge of TCP/IP protocol and
associated technologies. Able to perform, and
understand, a network trace
McAfee Support and Management of McAfee Change
Management and Application White listing
Support and Management of McAfee
Vulnerability Manager
Support and management of McAfee Anti-virus
and Enterprise Policy Orchestrator
2. Tripwire Enterprise Detailed knowledge of the Tripwire Enterprise
product including creating and modifying
command output capture Rule using regular
expressions on servers and network devices.
Experience with creating and modifying raw
log normalising rules using regular expressions
and variable filters.
Tripwire Log Centre Detailed knowledge of the Tripwire Log Centre
product including creating and modifying
command output capture Rule using regular
expressions on servers and network devices.
Experience with creating and modifying raw
log normalising rules using regular expressions
and variable filters.
Network and application Vulnerabilities An understanding of the different types of
vulnerabilities and how attacks happen
Technical Security Expertise Proven experience and expertise in:
• Security Incident Response principles
• Network and Host Intrusion Detection /
Protection / Prevention Systems (IDS/IPS)
• LAN / WAN protocols, IP, TCP/IP, DNS,
VPN’s, Switching Technology
• Forms of Internet Abuse such as
Hacking, DoS attacks, Address Spoofing,
• Firewall, IDS and Security event
technologies
• Strong understanding of Information
Security and Risk Management principles.
• Proven knowledge and the ability to
manage the appropriate integration of the
following:-
o Anti Virus/Anti Spam/content filtering
etc. (gateway services)
o Vulnerability Management Technologies
o Distributed, multi vendor System and
Application platforms
o Event correlation technology
o Routing / Switches (internetworking
protocols and techniques)
o Windows server technologies
o Unix / Linux Operating Systems
o PKI / Key Management disciplines
o Information Security standards such as
ISO/IEC27001
o Governments/defence security
standards such as ACSI33 and ISM
Unix Strong Knowledge of Unix operating systems
Business Acumen • Experience in aligning business and
technical requirements, to ensure the successful
ongoing security management of new products
and solutions.
• High level of analytical / diagnostic,
problem solving and decision making skills
3. • High level of knowledge and experience
in the delivery of quality customer service.
• Demonstrated ability to drive issues
through to resolution
• An understanding of commercial
implications to business decisions.
• A well-developed organisational
understanding including inter and intra-team
dependencies.
• Demonstrated ability to work
independently while still being a contributing
member of a small team
QualificationExperiences:
Degree Educated with at least 5 years experience in IT Security Management in a complex IT
Services environment.
Deep technical expertise in IT security and IT Security Management process frameworks,
tools and standards such as ISO 27000, ISO 31000, ISO27011, ITILv3, ASCII 33 & ISM. PCI
DSS
Strong working knowledge of global and local IT Security technologies with experience in the
implementation and management at an enterprise level.
Strong communication skills, verbal and written
High level of Microsoft skills (Excel & PowerPoint)
Baseline Security Clearance
Experience in level 3 application support
Troubleshooting of Complex issues that require the engagement of other security cleared
personnel.