Join a team of experts, and be a part of our collaborativecultureWe value flexibility, and give our people choices to balance work-life commitmentsOur modern offices are centrally located, with an onsite gymWelcome to TAL.
As a leading life insurer, we've been protecting Australians for over 150 years.
Backed by Dai-ichi Life, we're driven by big ambitions and empowered to create better products and services.Together with our Partners, we're helping millions of Australians live a life filled with choices, options and freedoms.
See the direct impact you make delivering support and financial security with care and expertise.Grow beyond expectations with diverse roles, global connections and exclusive learning opportunities.
Work with passionate, bright and capable colleagues.
Feel inspired by supportive leaders.
Collaborate with heart, where flexibility, wellbeing and inclusivity is valued.
Together, we're reimagining insurance.So, bring a curious mind and an ambition to help us become the progressive, digitally-enabled leading insurer.Job DescriptionWe are committed to investing in the future of our organization, technology, and teams.
As part of our Cyber Security team at TAL, you will play a crucial role in overseeing end-to-end security.We are seeking an experienced and enthusiastic Cyber Security Engineering Manager to implement new security capabilities and manage existing configurations and policies across SASE, endpoint security, network security, email security solutions and related security platforms.
Endpoint and network security are vital components of our Zero Trust cybersecurity strategy,which continuously evolves to protect against emerging threats.
This role requires hands-on Cyber security expertise in SASE, private access and network security tools to ensure the security and integrity of our network infrastructure, facilitating safe and seamless connectivity across the organisation.The role is well-suited for someone with extensive hands-on experience in SASE, network security, stakeholdermanagement, project coordination, and a keen interest in learning new cybersecurity technologies.
Ideal candidates should have deep technical expertise in key technologies such as Zscaler, Palo Alto, F5 and Proofpoint, which are central to our security requirements.In this role you will:Lead Zscaler Management and Rollout: Spearhead the implementation of new Zscaler capabilities across the organization, aligning with the Cyber Security strategy and roadmap.
Oversee and optimize Zscaler Internet Access (ZIA) for secure web and internet traffic management, ensuring robust security and performance.
Ensure secure remote access to internal applications using Zscaler Private Access (ZPA), eliminating the need for traditional VPNs.Configure Zscaler Client Connector: Set up and maintain Client Connector profiles to ensure seamless user authentication and secure network connectivity.Manage Policy Tuning and Optimization: Conduct policy tuning and optimization to enhance performance while maintaining stringent security controls.Implement/Enhance Additional Zscaler Capabilities: Deploy other Zscaler features such as Source IP Anchoring (SIPA), Cloud Data Loss Prevention (DLP), advanced firewall, and DNS security.Protect Email: Provide oversight for the administration of email protection solutions to ensure secure email communication and compliance.
Monitor and respond to email security incidents using Proofpoint threat intelligence and analytics, collaborating with incident response teams for threat investigation and mitigation.Focus on Continuous Improvement: Lead initiatives to enhance network security frameworks and reduce risk exposure.Mitigate Risk and Assurance: Take ownership of risk mitigation activities and support assurance, audit, and compliance activities.Liaise with teams: Act as a bridge between technical and non-technical teams to ensure a clear understanding of security requirements and solutions.Guide Secure Configuration: Provide secure configuration guidance for commonly used technology tools.Build Collaborative Partnerships: Build collaborative partnerships with team members, colleagues, and external contacts as needed.Monitorand Report: Monitor, track, and report SLA breaches for related requests and implementing process improvements based on consultations with Cyber leads.Change Management: Raise relevant change requests through the Change Management process and track the closure of change records without breaching SLAs.Monthly Management Reporting: Provide input into monthly management reporting, monitor, track, and report on the status of project deliverables, and prepare status reports to support wider operational resilience reporting.Training and Development: Ensure timely completion of required training and development, staying updated with the latest industry trends in cybersecurity, including emerging technologies and controls that best fit specific solution requirements with an emphasis on security.QualificationsRelevant Tertiary Qualification: Preferably a Bachelor's degree in Computer Science, Information Technology, or a related field.Professional Experience: 5+ years in network security and cybersecurity, focusing on implementing Zero Trust architectures.Zscaler Expertise: Hands-on experience with Zscaler solutions, including ZIA, ZPA, and Zscaler Client Connector for secure cloud and internal application access.Security Policy Development: Proven experience in defining and implementing security policies for web traffic management, URL filtering, application control, SSL inspection, DLP, and advanced troubleshooting within Zscaler environments.Proofpoint Technical Expertise: Strong technical expertise with Proofpoint, including Proofpoint Email Protection for advanced threat protection, anti-phishing, anti-spam, and SPF/DKIM/DMARC configurations.Zero Trust Strategy Development: Experience in developing security strategies aligned with Zero Trust principles, including network segmentation and identity-centric security policies.Network Security Technologies: Comprehensive understanding of network security technologies such as firewalls, VPNs, IDS/IPS, and SIEM toolsCloud Security Knowledge: Experience in cloud security and related conceptsRegulatory Compliance: Knowledge of regulatory and industry standards, including APRA CPS230/234, ASD8, CIS 20, and NIST Cybersecurity Framework (CSF).Consultation and Solution Development: Ability to consult with the business on security requirements and develop innovative solutions.Analytical and Communication Skills: Strong analytical and problem-solving skills, with the ability to communicate complex security concepts to non-technical stakeholders.Interpersonal and Collaborative Skills: Excellent written and verbal communication skills, interpersonal and collaborative skills, and attention to detail.Adaptability and Independence: Ability to deal with ambiguity and work independently with limited direction in a fast-paced environment.Professional Development: Passionate about security, with an intention to always excel and self-driven to develop technical and professional skills.Additional InformationTAL is one of Australia's leading life insurers, committed to inclusion, and supporting the career growth of our diverse workforce.
We're proud to be:An Inclusive Employer – Recognised as Employer of Choice for Gender Equality by the Workplace Gender Equality Agency and Bronze Tier Status within the Australian Workplace Equality IndexDiversity Champions – Member of Diversity Council Australia, Australian Disability Network, Pride in Diversity and Champions of ChangeWe welcome applications from people with diverse experiences, perspectives and backgrounds including Aboriginal and Torres Strait Islander people, caregivers, individuals living with disabilities, people from culturally diverse backgrounds and the LGBTIQ+ community.Need adjustments during the recruitment process?
Let our team know by getting in touch with ushere.
—we're here to support you.Everyone at TAL has a responsibility to do the right thing and is accountable for the way they conduct themselves.
Our expectations are that you follow the principles set out in our Code of Conduct when you come to work every day.
Risk management is everyone's responsibility.If you are already a TAL employee please apply via the SmartRecruiters button in Workday and navigate to the Employee Portal.
This is important to ensure that your application is recorded accurately.
#J-18808-Ljbffr