SlideShare a Scribd company logo
Key Accountabilities:
• Take a leading role in developing, deploying, and improve specific network element
technologies and their interaction with Telstra processes and systems to deliver products and
services to customer business units
• Manage the translation of business requirements to deliver network elements into realisable
products, services, or systems and/or networks infrastructure in a timely, high quality and cost
effective way to ensure the operational capability to deliver reliable customer service.
• Assess capability of vendor solutions and offerings to meet business requirements and
manage vendor technology delivery.
• Ensure technology solutions are integrated with Telstra’s activation, assurance and billing
processes and systems, and meet operational requirements.
• Assist with the development of technology guidelines and standards in the design and
deployment of technologies.
• Performing SME duties, representing Security Operations in key internal and customer
projects as required.
• Establish and maintain effective working relationships with key internal stakeholders, vendors
and industry partners and where applicable, maintain agreed external stakeholders relationships
relevant to the achievement of business objectives
• Manage applications as required ensuring SLA’s are being met.
• Be prepared to learn new skills as new tools are integrated into the team
• Able to work with minimal supervision and Direction.
• Customer Driven – Keep our promises. Be courteous and helpful.
• Winning Culture - Know our competition. Act with urgency.
• Learns quickly when facing new problems; a relentless and versatile learner; open to change;
analyses both successes and failures for clues to improvement; experiments and will try anything to
find solutions; enjoys the challenge of unfamiliar tasks; quickly grasps the essence and the underlying
structure of anything.
Some specific accountabilities of the role include:
• Troubleshooting of Complex issues across customer technologies and their interaction to
Telstra management infrastructure and core platform technologies
• Maintain the level of information security required for this position, working on a strict need to
know basis.
Technical Skills:
TCP/IP and associated technologies Strong knowledge of TCP/IP protocol and
associated technologies. Able to perform, and
understand, a network trace
McAfee Support and Management of McAfee Change
Management and Application White listing
Support and Management of McAfee
Vulnerability Manager
Support and management of McAfee Anti-virus
and Enterprise Policy Orchestrator
Tripwire Enterprise Detailed knowledge of the Tripwire Enterprise
product including creating and modifying
command output capture Rule using regular
expressions on servers and network devices.
Experience with creating and modifying raw
log normalising rules using regular expressions
and variable filters.
Tripwire Log Centre Detailed knowledge of the Tripwire Log Centre
product including creating and modifying
command output capture Rule using regular
expressions on servers and network devices.
Experience with creating and modifying raw
log normalising rules using regular expressions
and variable filters.
Network and application Vulnerabilities An understanding of the different types of
vulnerabilities and how attacks happen
Technical Security Expertise Proven experience and expertise in:
• Security Incident Response principles
• Network and Host Intrusion Detection /
Protection / Prevention Systems (IDS/IPS)
• LAN / WAN protocols, IP, TCP/IP, DNS,
VPN’s, Switching Technology
• Forms of Internet Abuse such as
Hacking, DoS attacks, Address Spoofing,
• Firewall, IDS and Security event
technologies
• Strong understanding of Information
Security and Risk Management principles.
• Proven knowledge and the ability to
manage the appropriate integration of the
following:-
o Anti Virus/Anti Spam/content filtering
etc. (gateway services)
o Vulnerability Management Technologies
o Distributed, multi vendor System and
Application platforms
o Event correlation technology
o Routing / Switches (internetworking
protocols and techniques)
o Windows server technologies
o Unix / Linux Operating Systems
o PKI / Key Management disciplines
o Information Security standards such as
ISO/IEC27001
o Governments/defence security
standards such as ACSI33 and ISM
Unix Strong Knowledge of Unix operating systems
Business Acumen • Experience in aligning business and
technical requirements, to ensure the successful
ongoing security management of new products
and solutions.
• High level of analytical / diagnostic,
problem solving and decision making skills
• High level of knowledge and experience
in the delivery of quality customer service.
• Demonstrated ability to drive issues
through to resolution
• An understanding of commercial
implications to business decisions.
• A well-developed organisational
understanding including inter and intra-team
dependencies.
• Demonstrated ability to work
independently while still being a contributing
member of a small team
QualificationExperiences:
 Degree Educated with at least 5 years experience in IT Security Management in a complex IT
Services environment.
 Deep technical expertise in IT security and IT Security Management process frameworks,
tools and standards such as ISO 27000, ISO 31000, ISO27011, ITILv3, ASCII 33 & ISM. PCI
DSS
 Strong working knowledge of global and local IT Security technologies with experience in the
implementation and management at an enterprise level.
 Strong communication skills, verbal and written
 High level of Microsoft skills (Excel & PowerPoint)
 Baseline Security Clearance
 Experience in level 3 application support
 Troubleshooting of Complex issues that require the engagement of other security cleared
personnel.

More Related Content

PDF
Specialist Security Engineer
PDF
Specialist security enigneer
DOCX
Southern Cross Computer System
PPTX
7 benefits of noc services
DOCX
Executive Technical Support Specialist Role
DOC
Jonathan Morris Resume-3
PDF
Karim hassan gallal 2 cv 2017 last update
PPTX
Major roles of noc services
Specialist Security Engineer
Specialist security enigneer
Southern Cross Computer System
7 benefits of noc services
Executive Technical Support Specialist Role
Jonathan Morris Resume-3
Karim hassan gallal 2 cv 2017 last update
Major roles of noc services

What's hot (19)

PDF
zaheer_farooq -e-
PPT
Lessson 2 - Application Layer
DOCX
Abhishek Kumar
PPT
Lesson 1- Intrusion Detection
DOCX
Abdul Haseeb.M
DOCX
Kendrick Lott resume
DOCX
Resume sven flecha
DOCX
Kiera J Baldwin IT Resume editing
PPT
Lesson 1- Risk Managment
DOC
Levine, Howard resume May 2015
DOC
Metkel Habte Resume
DOC
Resume_Vincent Ryan T. Lao
PPTX
Is Department Roles
DOC
Charles J Warzynski
RTF
CarolAragonResume
PPT
How sophisticated penetration testers get through the defenses
DOC
SteveNuccioResume2
zaheer_farooq -e-
Lessson 2 - Application Layer
Abhishek Kumar
Lesson 1- Intrusion Detection
Abdul Haseeb.M
Kendrick Lott resume
Resume sven flecha
Kiera J Baldwin IT Resume editing
Lesson 1- Risk Managment
Levine, Howard resume May 2015
Metkel Habte Resume
Resume_Vincent Ryan T. Lao
Is Department Roles
Charles J Warzynski
CarolAragonResume
How sophisticated penetration testers get through the defenses
SteveNuccioResume2
Ad

Viewers also liked (20)

PPTX
CopyRight & Creative Commons
PDF
Creative Toolbox Photography
PDF
Welcome to MLM
PDF
Теории мотиваци
PDF
WMU EPDC Brochure
PPTX
Boxnews 2015
DOCX
Chu de2 nhom2
PPTX
Tourism swia consultations ppt final (english version) for upload
PPTX
Sandpaperletters
PPTX
Dallas Wedding Venue - Seven for Parties
PPTX
Internet in news
PDF
Monitor LED AOC - e2461Fwh
PPT
Tin hoc là mot nghanh khoa ho
PPTX
Extractive Sector Community Agreements - Formalising and dignifying relations...
PPTX
Technology in 2024 COMM 303 Krista Vowels
PPTX
Badminton
PPTX
How I made my magazine advert
PPTX
Seven for parties
PPTX
АДВ Nehoroshev test
PDF
Nagata, Company Profile - Thein Sann
CopyRight & Creative Commons
Creative Toolbox Photography
Welcome to MLM
Теории мотиваци
WMU EPDC Brochure
Boxnews 2015
Chu de2 nhom2
Tourism swia consultations ppt final (english version) for upload
Sandpaperletters
Dallas Wedding Venue - Seven for Parties
Internet in news
Monitor LED AOC - e2461Fwh
Tin hoc là mot nghanh khoa ho
Extractive Sector Community Agreements - Formalising and dignifying relations...
Technology in 2024 COMM 303 Krista Vowels
Badminton
How I made my magazine advert
Seven for parties
АДВ Nehoroshev test
Nagata, Company Profile - Thein Sann
Ad

Similar to Additional Skills (20)

PDF
Irfan Ur Rehman
PDF
Engineer, Senior Systems IT
PDF
Muhammed Umer Danish PatelCVfinal.jpg
PDF
8 years experience in IT Project Management
DOC
DOC
Raj Penukonda
DOCX
Network Security Expert and Risk Analyst
PDF
Syed Jaffer Ali(New)
DOCX
DOC
Mohamed_Omar_Cv
DOC
DOCX
Dipu_Kumar_Ray-CV
PDF
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
DOC
Wagner Desrosiers RESUME2
DOC
It operation 1
DOC
Pramod Yadav_Security Operations Center Manager
DOC
vignesh resume
DOCX
Resume_ejaz dt. 2.2.15
PDF
PROFESSIONAL.2015(Engr.Sajib) _new update
Irfan Ur Rehman
Engineer, Senior Systems IT
Muhammed Umer Danish PatelCVfinal.jpg
8 years experience in IT Project Management
Raj Penukonda
Network Security Expert and Risk Analyst
Syed Jaffer Ali(New)
Mohamed_Omar_Cv
Dipu_Kumar_Ray-CV
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Wagner Desrosiers RESUME2
It operation 1
Pramod Yadav_Security Operations Center Manager
vignesh resume
Resume_ejaz dt. 2.2.15
PROFESSIONAL.2015(Engr.Sajib) _new update

Additional Skills

  • 1. Key Accountabilities: • Take a leading role in developing, deploying, and improve specific network element technologies and their interaction with Telstra processes and systems to deliver products and services to customer business units • Manage the translation of business requirements to deliver network elements into realisable products, services, or systems and/or networks infrastructure in a timely, high quality and cost effective way to ensure the operational capability to deliver reliable customer service. • Assess capability of vendor solutions and offerings to meet business requirements and manage vendor technology delivery. • Ensure technology solutions are integrated with Telstra’s activation, assurance and billing processes and systems, and meet operational requirements. • Assist with the development of technology guidelines and standards in the design and deployment of technologies. • Performing SME duties, representing Security Operations in key internal and customer projects as required. • Establish and maintain effective working relationships with key internal stakeholders, vendors and industry partners and where applicable, maintain agreed external stakeholders relationships relevant to the achievement of business objectives • Manage applications as required ensuring SLA’s are being met. • Be prepared to learn new skills as new tools are integrated into the team • Able to work with minimal supervision and Direction. • Customer Driven – Keep our promises. Be courteous and helpful. • Winning Culture - Know our competition. Act with urgency. • Learns quickly when facing new problems; a relentless and versatile learner; open to change; analyses both successes and failures for clues to improvement; experiments and will try anything to find solutions; enjoys the challenge of unfamiliar tasks; quickly grasps the essence and the underlying structure of anything. Some specific accountabilities of the role include: • Troubleshooting of Complex issues across customer technologies and their interaction to Telstra management infrastructure and core platform technologies • Maintain the level of information security required for this position, working on a strict need to know basis. Technical Skills: TCP/IP and associated technologies Strong knowledge of TCP/IP protocol and associated technologies. Able to perform, and understand, a network trace McAfee Support and Management of McAfee Change Management and Application White listing Support and Management of McAfee Vulnerability Manager Support and management of McAfee Anti-virus and Enterprise Policy Orchestrator
  • 2. Tripwire Enterprise Detailed knowledge of the Tripwire Enterprise product including creating and modifying command output capture Rule using regular expressions on servers and network devices. Experience with creating and modifying raw log normalising rules using regular expressions and variable filters. Tripwire Log Centre Detailed knowledge of the Tripwire Log Centre product including creating and modifying command output capture Rule using regular expressions on servers and network devices. Experience with creating and modifying raw log normalising rules using regular expressions and variable filters. Network and application Vulnerabilities An understanding of the different types of vulnerabilities and how attacks happen Technical Security Expertise Proven experience and expertise in: • Security Incident Response principles • Network and Host Intrusion Detection / Protection / Prevention Systems (IDS/IPS) • LAN / WAN protocols, IP, TCP/IP, DNS, VPN’s, Switching Technology • Forms of Internet Abuse such as Hacking, DoS attacks, Address Spoofing, • Firewall, IDS and Security event technologies • Strong understanding of Information Security and Risk Management principles. • Proven knowledge and the ability to manage the appropriate integration of the following:- o Anti Virus/Anti Spam/content filtering etc. (gateway services) o Vulnerability Management Technologies o Distributed, multi vendor System and Application platforms o Event correlation technology o Routing / Switches (internetworking protocols and techniques) o Windows server technologies o Unix / Linux Operating Systems o PKI / Key Management disciplines o Information Security standards such as ISO/IEC27001 o Governments/defence security standards such as ACSI33 and ISM Unix Strong Knowledge of Unix operating systems Business Acumen • Experience in aligning business and technical requirements, to ensure the successful ongoing security management of new products and solutions. • High level of analytical / diagnostic, problem solving and decision making skills
  • 3. • High level of knowledge and experience in the delivery of quality customer service. • Demonstrated ability to drive issues through to resolution • An understanding of commercial implications to business decisions. • A well-developed organisational understanding including inter and intra-team dependencies. • Demonstrated ability to work independently while still being a contributing member of a small team QualificationExperiences:  Degree Educated with at least 5 years experience in IT Security Management in a complex IT Services environment.  Deep technical expertise in IT security and IT Security Management process frameworks, tools and standards such as ISO 27000, ISO 31000, ISO27011, ITILv3, ASCII 33 & ISM. PCI DSS  Strong working knowledge of global and local IT Security technologies with experience in the implementation and management at an enterprise level.  Strong communication skills, verbal and written  High level of Microsoft skills (Excel & PowerPoint)  Baseline Security Clearance  Experience in level 3 application support  Troubleshooting of Complex issues that require the engagement of other security cleared personnel.