
Cyber Security Architect - PAM
- Brisbane, QLD
- Permanent
- Full-time
- PAM (Privileged Access Management)
- MFA (Multi Factor Authentication)
- Backup (Recovery backups and Disaster Recovery) deployments
- Essential 8 uplift initiatives
- NIST CSF 2.0 maturity
- Technical Project Leadership: Lead the planning and initiation of cybersecurity projects by developing technical charters, defining objectives, scope, deliverables, and stakeholder engagement strategies. Identify technical requirements, constraints, and risks across Corporate and Control (Operational Technology) environments.
- Solution Delivery and Oversight: Oversee the execution of cybersecurity initiatives, including PAM (Privileged Access Management) , MFA (Multi Factor Authentication), Backup (Recovery backups and Disaster Recovery), Essential 8 and NIST CSF 2.0, by coordinating cross-functional teams, managing technical resources, and ensuring alignment with project timelines, budgets, and quality standards.
- Technical Documentation and Reporting: Develop and maintain comprehensive technical documentation, including architecture designs, implementation plans, and risk assessments. Provide regular updates and insights to stakeholders and executive leadership.
- Stakeholder and Vendor Engagement: Collaborate with internal stakeholders, external vendors, and delivery partners to ensure technical alignment, clear communication, and successful integration of cybersecurity solutions across enterprise and industrial systems.
- Cyber Risk and Threat Management: Identify, assess, and manage cybersecurity risks throughout the project lifecycle. Implement mitigation strategies and ensure alignment with organisational risk frameworks and compliance obligations.
- Security and Quality Assurance: Define and enforce cybersecurity quality standards. Conduct technical reviews, audits, and assessments to ensure solutions meet security, performance, and compliance requirements.
- Azure & Identity Security
- Designing and managing Conditional Access Policies and Authentication Policies
- Privileged Access Management (PAM)
- Experience with enterprise PAM solutions such as CyberArk, BeyondTrust, Thycotic/Delinea
- Windows Server & Active Directory
- Understanding of Layer 2 and Layer 3 network principles (switching, routing)
- Security Analysis & Governance
- Performing gap analysis against governance frameworks and security standards