Commbank seeks three security hires

Powered by SC Magazine
 

Manager, coder and engineer.

The Commonwealth Bank is seeking to fill three information security roles in its Sydney offices.

It has advertised for a security architecture manager, a secure coder and an engineer to help it lock down networks and devices.

The managerial position will head a team of security architects, create infosec solutions and services for staff and customers, perform and review security risk assessments and embed security into the bank's project and solutions lifecycles.

The developer will work with .net and Java. The successful applicant will have knowledge of penetration testing techniques and IT risk governance and regulations.

The engineer role sits within the Security Design Asset Protection team and works to lock down network boundaries, data exchange and devices. It requires strong technical understanding of Checkpoint firewalls, intrusion detection and prevention systems like MDMS, VSX, VE, IPS Blade, Identity Blade and SmartEvent. 

The bank is also seeking a risk assurance consultant  for its IT infrastructure and operations division. The role demands the ability to manage high risk audit items, run risk assurance programs for the division and build reporting dashboards to analyse risk assurance issues.

Copyright © SC Magazine, Australia


Commbank seeks three security hires
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Who'd have picked a BlackBerry for the Internet of Things?
[Blog] BlackBerry has a more secure future in the physical world.
 
Will Nutanix be outflanked before reaching IPO?
VMware muscles in on storage startup in hyper-converged infrastructure.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  70%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  10%
TOTAL VOTES: 655

Vote