TPAM Technical Specialist
Location: Macquarie Park, Australia
Job Title: TPAM Technical Specialist
Location: Macquarie Park
A Technical Specialist is core of the Optus Security Operations Center (OSOC). In addition to possessing expert technical knowledge, a technical Specialist interacts extensively with internal/external customers and partners as the lead security evangelist within the OSOC organisation.
Qualifications and Experience
- Performs all aspects of the Optus Security Operations Centre (OSOC)
- Performs Threat monitoring and Incident response on PIAM/TPAM alerts and platforms
- Ensures TPAM management is performing to KPI/SLA’s
- Improves appropriate usage of privilege access management thus reducing insider threats
- Security evangelist for TPAM and other cyber security controls
- Uses advanced networking, security and systems skills to perform detailed analysis for security threats.
- Analyses and respond to escalated security events from incidents received from various sources and vendors within documented SLA.
- Baseline threat detection devices for unique environments and customized telecommunications applications
- Tests and innovates new threat signatures, sensors and other detection methods.
- Optus owner of TPAM performance and capacity
- Work with stakeholders to facilitate new features and threat indicators
- Perform solution design and on-boarding development for new systems and network elements to be added to OSOC function
- Performs system Life cycle activities for solutions and systems supported by the OSOC
- Collects and reports big data analytics trending across multiple security domains
- Act as security thought leader for all stakeholders and provides guidance on new security developments
- Communicates the security threat landscape, concerns and motivations to stakeholders
- Will be required to provide security posture reports to risk, audit teams
- Collaborates with management on process improvement, documentation and definition for threat analysis and classification.
- Provides input into Business Continuity plans (BCP) for security risks
- Bachelor's degree in a Computing or telecommunications discipline
- Understanding of the components that comprise a successful information security program
- Familiarity with secure engineering principles, risk management, technical information security testing, and classified environments
- Understanding of security controls for common platforms and devices, including Windows, Unix, Linux, and network equipment
- Technical background in incident response, computer forensics, malware analysis, development, or systems administration
- Technical experience and understanding privilege access management systems such as PIAM and TPAM