Government I ACT, NSW, QLD, SA, VIC I Closes 4 November 2024 Must have Negative Vetting Level 1 Security clearance. Primary Technologies • F5 AWAF, Web Proxies, Linux Administration Key duties may include, but are not limited to: • Plan and manage infrastructure requirements to meet future infrastructure demand ensure the provision of infrastructure related operational support for hardware, software and other assets. • Define effective procedures for prioritisation and escalation of infrastructure issues to ensure timely resolution communicate end-to-end implications of configuration changes. • Analyse the quality of requests for change management provide detailed, specialist technical advice, including strategic advice to the Executive where appropriate. • Proactively share knowledge and expertise as the subject matter expert and provide assistance and mentorship to less experienced colleagues. • Develop and implement standards, strategies, operational policy and procedures and change initiatives. • Develop staff capability through coaching, mentoring and succession planning. • Oversee, review and advise on a range of technical documentation including design documentation, implementation plans, test plans, and support procedures. • Negotiate, engage and manage relationships with multiple stakeholders to build service delivery capability drive innovation, continuous improvement and manage and lead change exercise delegation in accordance with legislation and guidelines. Mandatory Criteria • A minimum of five (5) years demonstrated experience in the design, build, deployment, troubleshooting and management of F5 AWAF and web proxies in large secure gateway environments. Desirable Criteria • Demonstrated F5 expert in deploying, configuring, and deep understanding of F5 AWAF Solutions. • Knowledge and understanding of F5 products LTM, GTM, ASM, ALM, APM. • Deep understanding of web application architecture, protocols and security technologies including but not limited to TCP/IP, HTTP, SSL/TLS, IPSec, VPN and DDoS protection. • Demonstrated working knowledge of common web application vulnerabilities such as SQL injection, Cross-Site Scripting (XSS), Cross-Site Request Forgery (CSRF), cookie poisoning etc. • Proficient scripting and programming skills to configure advanced policies and rules in F5 AWAF. • Proficient knowledge on NGFW preferred Palo Alto and IPS concepts and feature