Australian Citizens With NV1 Clearance residing in Australia only respond
* Contract start ASAP to 6 months, 2 x 12 months extensions.
* Australian Citizen, NV2 Clearance, Canberra role.
Send your responses to jobs@softtestpays.com
Required Skills and Experience:
Over 5 years experience in designing, implementing and supporting large
scale, geographically distributed end user computing environments
Experience in designing, implementing and supporting SOE baselines for
VDI and thick-client endpoints
Developing and maintaining configuration baselines for endpoint devices
using tools such as Ansible, Jenkins, Gitlab, Powershell, etc
Experience in designing, implementing and facilitating software packaging
and virtualized application delivery solutions
Strong cyber security focus in the design and implementation of endpoint
protection technologies such as antivirus, application whitelisting, device
control, patch management, etc.
Good understanding of Active Directory, PKI certificates, Group Policy, etc.
Ability to take requirements, standards, and frameworks and apply them in a
practical application to future proposed solution designs and systems.
Ability to adapt quickly to changing requirements in a fast-paced
environment to meet changing deadlines and shifting priorities.
Ability to work under broad direction with a high level of autonomy
Experience in developing highly available/fault tolerant systems, networks,
and infrastructure in a connected, partially connected, degraded, or often
disconnected state.
Experience effectively leading small teams of technical personnel (i.e. 5
people).
Desirable Skills and Experience
Knowledge and skills in DevSecOps technologies and principles, specifically
infrastructure-as-code, Git, PowerShell, Python, or other similar languages.
Ability to rapidly build, automate, and deliver proof of concept systems to
support analysis, testing, accreditation and development activities, preferably
within a DevSecOps process.
Solid understanding of the concepts and fundamentals of one or more of the
following technology/methodologies:
o Privilege Access Management
o Least Privilege Access
o Network Segmentation
o Containerised applications.