SlideShare uma empresa Scribd logo
1 de 3
Key Accountabilities:
• Take a leading role in developing, deploying, and improve specific network element
technologies and their interaction with Telstra processes and systems to deliver products and
services to customer business units
• Manage the translation of business requirements to deliver network elements into realisable
products, services, or systems and/or networks infrastructure in a timely, high quality and cost
effective way to ensure the operational capability to deliver reliable customer service.
• Assess capability of vendor solutions and offerings to meet business requirements and
manage vendor technology delivery.
• Ensure technology solutions are integrated with Telstra’s activation, assurance and billing
processes and systems, and meet operational requirements.
• Assist with the development of technology guidelines and standards in the design and
deployment of technologies.
• Performing SME duties, representing Security Operations in key internal and customer
projects as required.
• Establish and maintain effective working relationships with key internal stakeholders, vendors
and industry partners and where applicable, maintain agreed external stakeholders relationships
relevant to the achievement of business objectives
• Manage applications as required ensuring SLA’s are being met.
• Be prepared to learn new skills as new tools are integrated into the team
• Able to work with minimal supervision and Direction.
• Customer Driven – Keep our promises. Be courteous and helpful.
• Winning Culture - Know our competition. Act with urgency.
• Learns quickly when facing new problems; a relentless and versatile learner; open to change;
analyses both successes and failures for clues to improvement; experiments and will try anything to
find solutions; enjoys the challenge of unfamiliar tasks; quickly grasps the essence and the underlying
structure of anything.
Some specific accountabilities of the role include:
• Troubleshooting of Complex issues across customer technologies and their interaction to
Telstra management infrastructure and core platform technologies
• Maintain the level of information security required for this position, working on a strict need to
know basis.
Technical Skills:
TCP/IP and associated technologies Strong knowledge of TCP/IP protocol and
associated technologies. Able to perform, and
understand, a network trace
McAfee Support and Management of McAfee Change
Management and Application White listing
Support and Management of McAfee
Vulnerability Manager
Support and management of McAfee Anti-virus
and Enterprise Policy Orchestrator
Tripwire Enterprise Detailed knowledge of the Tripwire Enterprise
product including creating and modifying
command output capture Rule using regular
expressions on servers and network devices.
Experience with creating and modifying raw
log normalising rules using regular expressions
and variable filters.
Tripwire Log Centre Detailed knowledge of the Tripwire Log Centre
product including creating and modifying
command output capture Rule using regular
expressions on servers and network devices.
Experience with creating and modifying raw
log normalising rules using regular expressions
and variable filters.
Network and application Vulnerabilities An understanding of the different types of
vulnerabilities and how attacks happen
Technical Security Expertise Proven experience and expertise in:
• Security Incident Response principles
• Network and Host Intrusion Detection /
Protection / Prevention Systems (IDS/IPS)
• LAN / WAN protocols, IP, TCP/IP, DNS,
VPN’s, Switching Technology
• Forms of Internet Abuse such as
Hacking, DoS attacks, Address Spoofing,
• Firewall, IDS and Security event
technologies
• Strong understanding of Information
Security and Risk Management principles.
• Proven knowledge and the ability to
manage the appropriate integration of the
following:-
o Anti Virus/Anti Spam/content filtering
etc. (gateway services)
o Vulnerability Management Technologies
o Distributed, multi vendor System and
Application platforms
o Event correlation technology
o Routing / Switches (internetworking
protocols and techniques)
o Windows server technologies
o Unix / Linux Operating Systems
o PKI / Key Management disciplines
o Information Security standards such as
ISO/IEC27001
o Governments/defence security
standards such as ACSI33 and ISM
Unix Strong Knowledge of Unix operating systems
Business Acumen • Experience in aligning business and
technical requirements, to ensure the successful
ongoing security management of new products
and solutions.
• High level of analytical / diagnostic,
problem solving and decision making skills
• High level of knowledge and experience
in the delivery of quality customer service.
• Demonstrated ability to drive issues
through to resolution
• An understanding of commercial
implications to business decisions.
• A well-developed organisational
understanding including inter and intra-team
dependencies.
• Demonstrated ability to work
independently while still being a contributing
member of a small team
QualificationExperiences:
 Degree Educated with at least 5 years experience in IT Security Management in a complex IT
Services environment.
 Deep technical expertise in IT security and IT Security Management process frameworks,
tools and standards such as ISO 27000, ISO 31000, ISO27011, ITILv3, ASCII 33 & ISM. PCI
DSS
 Strong working knowledge of global and local IT Security technologies with experience in the
implementation and management at an enterprise level.
 Strong communication skills, verbal and written
 High level of Microsoft skills (Excel & PowerPoint)
 Baseline Security Clearance
 Experience in level 3 application support
 Troubleshooting of Complex issues that require the engagement of other security cleared
personnel.

Mais conteúdo relacionado

Mais procurados (20)

zaheer_farooq -e-
zaheer_farooq -e-zaheer_farooq -e-
zaheer_farooq -e-
 
Lessson 2 - Application Layer
Lessson 2 - Application LayerLessson 2 - Application Layer
Lessson 2 - Application Layer
 
Abhishek Kumar
Abhishek Kumar Abhishek Kumar
Abhishek Kumar
 
Eyer
EyerEyer
Eyer
 
Jon Shende It Director2
Jon Shende It Director2Jon Shende It Director2
Jon Shende It Director2
 
Lesson 1- Intrusion Detection
Lesson 1- Intrusion DetectionLesson 1- Intrusion Detection
Lesson 1- Intrusion Detection
 
Abdul Haseeb.M
Abdul Haseeb.MAbdul Haseeb.M
Abdul Haseeb.M
 
Kendrick Lott resume
Kendrick Lott resumeKendrick Lott resume
Kendrick Lott resume
 
Resume sven flecha
Resume sven flechaResume sven flecha
Resume sven flecha
 
Kiera J Baldwin IT Resume editing
Kiera J Baldwin IT Resume editingKiera J Baldwin IT Resume editing
Kiera J Baldwin IT Resume editing
 
Lesson 1- Risk Managment
Lesson 1- Risk ManagmentLesson 1- Risk Managment
Lesson 1- Risk Managment
 
Levine, Howard resume May 2015
Levine, Howard resume May 2015Levine, Howard resume May 2015
Levine, Howard resume May 2015
 
Metkel Habte Resume
Metkel Habte ResumeMetkel Habte Resume
Metkel Habte Resume
 
Resume_Vincent Ryan T. Lao
Resume_Vincent Ryan T. LaoResume_Vincent Ryan T. Lao
Resume_Vincent Ryan T. Lao
 
Is Department Roles
Is Department RolesIs Department Roles
Is Department Roles
 
Charles J Warzynski
Charles J WarzynskiCharles J Warzynski
Charles J Warzynski
 
CarolAragonResume
CarolAragonResumeCarolAragonResume
CarolAragonResume
 
How sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defensesHow sophisticated penetration testers get through the defenses
How sophisticated penetration testers get through the defenses
 
Elbert stonom it lead -resume 2016
Elbert stonom   it lead -resume 2016Elbert stonom   it lead -resume 2016
Elbert stonom it lead -resume 2016
 
SteveNuccioResume2
SteveNuccioResume2SteveNuccioResume2
SteveNuccioResume2
 

Destaque

CopyRight & Creative Commons
CopyRight & Creative CommonsCopyRight & Creative Commons
CopyRight & Creative CommonsIvan Sangiorgi
 
Creative Toolbox Photography
Creative Toolbox PhotographyCreative Toolbox Photography
Creative Toolbox PhotographyCreativeToolbox
 
Tourism swia consultations ppt final (english version) for upload
Tourism swia consultations ppt final (english version) for uploadTourism swia consultations ppt final (english version) for upload
Tourism swia consultations ppt final (english version) for uploadEthical Sector
 
Dallas Wedding Venue - Seven for Parties
Dallas Wedding Venue - Seven for PartiesDallas Wedding Venue - Seven for Parties
Dallas Wedding Venue - Seven for PartiesSeven for Parties
 
Monitor LED AOC - e2461Fwh
Monitor LED AOC - e2461FwhMonitor LED AOC - e2461Fwh
Monitor LED AOC - e2461FwhAOC vision
 
Tin hoc là mot nghanh khoa ho
Tin hoc là mot nghanh khoa hoTin hoc là mot nghanh khoa ho
Tin hoc là mot nghanh khoa hoLã Văn Hải
 
Extractive Sector Community Agreements - Formalising and dignifying relations...
Extractive Sector Community Agreements - Formalising and dignifying relations...Extractive Sector Community Agreements - Formalising and dignifying relations...
Extractive Sector Community Agreements - Formalising and dignifying relations...Ethical Sector
 
Technology in 2024 COMM 303 Krista Vowels
Technology in 2024 COMM 303 Krista VowelsTechnology in 2024 COMM 303 Krista Vowels
Technology in 2024 COMM 303 Krista Vowelskvowels0003
 
How I made my magazine advert
How I made my magazine advertHow I made my magazine advert
How I made my magazine advertjoewilson1997
 
Nagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein SannNagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein SannEthical Sector
 

Destaque (20)

CopyRight & Creative Commons
CopyRight & Creative CommonsCopyRight & Creative Commons
CopyRight & Creative Commons
 
Creative Toolbox Photography
Creative Toolbox PhotographyCreative Toolbox Photography
Creative Toolbox Photography
 
Welcome to MLM
Welcome to MLMWelcome to MLM
Welcome to MLM
 
Теории мотиваци
Теории мотивациТеории мотиваци
Теории мотиваци
 
WMU EPDC Brochure
WMU EPDC BrochureWMU EPDC Brochure
WMU EPDC Brochure
 
Boxnews 2015
Boxnews 2015Boxnews 2015
Boxnews 2015
 
Chu de2 nhom2
Chu de2 nhom2Chu de2 nhom2
Chu de2 nhom2
 
Tourism swia consultations ppt final (english version) for upload
Tourism swia consultations ppt final (english version) for uploadTourism swia consultations ppt final (english version) for upload
Tourism swia consultations ppt final (english version) for upload
 
Sandpaperletters
SandpaperlettersSandpaperletters
Sandpaperletters
 
Dallas Wedding Venue - Seven for Parties
Dallas Wedding Venue - Seven for PartiesDallas Wedding Venue - Seven for Parties
Dallas Wedding Venue - Seven for Parties
 
Internet in news
Internet in newsInternet in news
Internet in news
 
Monitor LED AOC - e2461Fwh
Monitor LED AOC - e2461FwhMonitor LED AOC - e2461Fwh
Monitor LED AOC - e2461Fwh
 
Tin hoc là mot nghanh khoa ho
Tin hoc là mot nghanh khoa hoTin hoc là mot nghanh khoa ho
Tin hoc là mot nghanh khoa ho
 
Extractive Sector Community Agreements - Formalising and dignifying relations...
Extractive Sector Community Agreements - Formalising and dignifying relations...Extractive Sector Community Agreements - Formalising and dignifying relations...
Extractive Sector Community Agreements - Formalising and dignifying relations...
 
Technology in 2024 COMM 303 Krista Vowels
Technology in 2024 COMM 303 Krista VowelsTechnology in 2024 COMM 303 Krista Vowels
Technology in 2024 COMM 303 Krista Vowels
 
Badminton
BadmintonBadminton
Badminton
 
How I made my magazine advert
How I made my magazine advertHow I made my magazine advert
How I made my magazine advert
 
Seven for parties
Seven for partiesSeven for parties
Seven for parties
 
АДВ Nehoroshev test
АДВ Nehoroshev testАДВ Nehoroshev test
АДВ Nehoroshev test
 
Nagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein SannNagata, Company Profile - Thein Sann
Nagata, Company Profile - Thein Sann
 

Semelhante a Additional Skills (20)

RESUME16
RESUME16RESUME16
RESUME16
 
saravanan KRISHNAN Resume
saravanan KRISHNAN Resumesaravanan KRISHNAN Resume
saravanan KRISHNAN Resume
 
Mash f43
Mash f43Mash f43
Mash f43
 
Profile-Dharmesh Prajapati
Profile-Dharmesh PrajapatiProfile-Dharmesh Prajapati
Profile-Dharmesh Prajapati
 
GraceCV
GraceCVGraceCV
GraceCV
 
John Hornsby CV (1)
John Hornsby CV (1)John Hornsby CV (1)
John Hornsby CV (1)
 
Engineer, Senior Systems IT
Engineer, Senior Systems ITEngineer, Senior Systems IT
Engineer, Senior Systems IT
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Resume
ResumeResume
Resume
 
Ahamed Khaleel K.P
Ahamed Khaleel K.PAhamed Khaleel K.P
Ahamed Khaleel K.P
 
Grace cv2
Grace cv2Grace cv2
Grace cv2
 
GraceCV2
GraceCV2GraceCV2
GraceCV2
 
Emery Rahrs Resume
Emery Rahrs ResumeEmery Rahrs Resume
Emery Rahrs Resume
 
Alton_MinorResume_TS
Alton_MinorResume_TSAlton_MinorResume_TS
Alton_MinorResume_TS
 
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
KIM CORREA NEW RESUME FOR ALL COMPANIES JUNE 2016
 
Resume | Vijay Navgire
Resume | Vijay Navgire Resume | Vijay Navgire
Resume | Vijay Navgire
 
Luc resume
Luc resumeLuc resume
Luc resume
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
 
IT support
IT supportIT support
IT support
 
Irfan Ur Rehman
Irfan Ur RehmanIrfan Ur Rehman
Irfan Ur Rehman
 

Additional Skills

  • 1. Key Accountabilities: • Take a leading role in developing, deploying, and improve specific network element technologies and their interaction with Telstra processes and systems to deliver products and services to customer business units • Manage the translation of business requirements to deliver network elements into realisable products, services, or systems and/or networks infrastructure in a timely, high quality and cost effective way to ensure the operational capability to deliver reliable customer service. • Assess capability of vendor solutions and offerings to meet business requirements and manage vendor technology delivery. • Ensure technology solutions are integrated with Telstra’s activation, assurance and billing processes and systems, and meet operational requirements. • Assist with the development of technology guidelines and standards in the design and deployment of technologies. • Performing SME duties, representing Security Operations in key internal and customer projects as required. • Establish and maintain effective working relationships with key internal stakeholders, vendors and industry partners and where applicable, maintain agreed external stakeholders relationships relevant to the achievement of business objectives • Manage applications as required ensuring SLA’s are being met. • Be prepared to learn new skills as new tools are integrated into the team • Able to work with minimal supervision and Direction. • Customer Driven – Keep our promises. Be courteous and helpful. • Winning Culture - Know our competition. Act with urgency. • Learns quickly when facing new problems; a relentless and versatile learner; open to change; analyses both successes and failures for clues to improvement; experiments and will try anything to find solutions; enjoys the challenge of unfamiliar tasks; quickly grasps the essence and the underlying structure of anything. Some specific accountabilities of the role include: • Troubleshooting of Complex issues across customer technologies and their interaction to Telstra management infrastructure and core platform technologies • Maintain the level of information security required for this position, working on a strict need to know basis. Technical Skills: TCP/IP and associated technologies Strong knowledge of TCP/IP protocol and associated technologies. Able to perform, and understand, a network trace McAfee Support and Management of McAfee Change Management and Application White listing Support and Management of McAfee Vulnerability Manager Support and management of McAfee Anti-virus and Enterprise Policy Orchestrator
  • 2. Tripwire Enterprise Detailed knowledge of the Tripwire Enterprise product including creating and modifying command output capture Rule using regular expressions on servers and network devices. Experience with creating and modifying raw log normalising rules using regular expressions and variable filters. Tripwire Log Centre Detailed knowledge of the Tripwire Log Centre product including creating and modifying command output capture Rule using regular expressions on servers and network devices. Experience with creating and modifying raw log normalising rules using regular expressions and variable filters. Network and application Vulnerabilities An understanding of the different types of vulnerabilities and how attacks happen Technical Security Expertise Proven experience and expertise in: • Security Incident Response principles • Network and Host Intrusion Detection / Protection / Prevention Systems (IDS/IPS) • LAN / WAN protocols, IP, TCP/IP, DNS, VPN’s, Switching Technology • Forms of Internet Abuse such as Hacking, DoS attacks, Address Spoofing, • Firewall, IDS and Security event technologies • Strong understanding of Information Security and Risk Management principles. • Proven knowledge and the ability to manage the appropriate integration of the following:- o Anti Virus/Anti Spam/content filtering etc. (gateway services) o Vulnerability Management Technologies o Distributed, multi vendor System and Application platforms o Event correlation technology o Routing / Switches (internetworking protocols and techniques) o Windows server technologies o Unix / Linux Operating Systems o PKI / Key Management disciplines o Information Security standards such as ISO/IEC27001 o Governments/defence security standards such as ACSI33 and ISM Unix Strong Knowledge of Unix operating systems Business Acumen • Experience in aligning business and technical requirements, to ensure the successful ongoing security management of new products and solutions. • High level of analytical / diagnostic, problem solving and decision making skills
  • 3. • High level of knowledge and experience in the delivery of quality customer service. • Demonstrated ability to drive issues through to resolution • An understanding of commercial implications to business decisions. • A well-developed organisational understanding including inter and intra-team dependencies. • Demonstrated ability to work independently while still being a contributing member of a small team QualificationExperiences:  Degree Educated with at least 5 years experience in IT Security Management in a complex IT Services environment.  Deep technical expertise in IT security and IT Security Management process frameworks, tools and standards such as ISO 27000, ISO 31000, ISO27011, ITILv3, ASCII 33 & ISM. PCI DSS  Strong working knowledge of global and local IT Security technologies with experience in the implementation and management at an enterprise level.  Strong communication skills, verbal and written  High level of Microsoft skills (Excel & PowerPoint)  Baseline Security Clearance  Experience in level 3 application support  Troubleshooting of Complex issues that require the engagement of other security cleared personnel.