Infrastructure & Cyber Security Architect27th March, 202412 monthsExtension term: 12 monthsNumber of extensions: 2Location of work: NSWWorking arrangements: Department operates on a hybrid model i.e.2 days in the office and 3 days remotely subject to operational requirements.Security clearance: Must be able to obtain Negative Vetting Level 1.The Department requires an Infrastructure and Cyber Security Architect to analyse, design, document and lead the delivery of a technical roadmap to respond to the changing environment.Details of the Services The Department wishes to engage an Infrastructure and Cyber Security Architect to provide technical leadership for new work, ensuring that the Department's IT systems/networks are secure, resilient, and scalable.Primary responsibilities will include:Designing and overseeing the implementation of secure and scalable solutions that are fit for purpose.Evaluating existing infrastructure and making recommendations for improvements to enhance security posture and performance.Collaborating with architects, engineers and administrators to deploy solutions in accordance with best practices and industry standards.Serving as a technical subject matter expert and providing guidance and mentorship to the broader team.Key requirements of the role are: Bachelor's degree in computer science, Information Technology, or relevant work experience.Proven experience analysing, designing, documenting and overseeing the implementation of complex infrastructure solutions with a focus on cyber security.Broad knowledge across core IT services, including networking, firewalling, virtualization, storage, backup, logging, email, domain name resolution, web proxying and security.Hands-on experience with on-premise environments, cloud platforms and infrastructure as code.Practical understanding of cyber security frameworks, such as NIST Cybersecurity Framework, CIS Controls, OWASP Top 10 and the Information Security Manual (ISM).Excellent analytical and problem-solving skills, with the ability to assess risks, identify mitigations and prioritize tasks effectively. #J-18808-Ljbffr