We are Fujitsu
We use technology to make happier lives. We are a global leader in technology and business solutions that transform organisations and the world around us. We have a long heritage of bringing innovation and expertise, continuously working to contribute to the growth of society and our customers.
About the role
* RFQ Opportunity
* 1 year contract (possible extension or convert to permanent position)
* Adelaide based
* On-site
We are seeking a skilled Cyber Security Analyst to help protect our organization's digital assets and sensitive information. The ideal candidate will have a strong understanding of cybersecurity principles, practices, and technologies to identify vulnerabilities, implement security measures, and respond to security incidents.
Key Responsibilities
Identity Current State Assessment – The Supplier must assess and document the current identity and access landscape, including architecture, directories, providers, authentication methods, privileged access, lifecycle processes, audit and logging capabilities, integration patterns, and third‐party access arrangements. The supplier must clearly identify system and architectural challenges with current state, that improvement opportunities and proposed strategy will seek to address.
Improvement Opportunities – The Supplier must identify and prioritise short to medium‐term actions (1–2 years) to improve user experience, reduce identity‐related risk, and enable delivery of KSC outcomes, ensuring recommendations do not introduce unnecessary technical debt.
Identity and Access Strategy – The Supplier must develop and deliver an Identity and Access Strategy that defines a clear target state for identity and access management capabilities required to support DCP outcomes, with the KSC Program as the primary and prioritised delivery vehicle. The strategy must align with enterprise architecture principles, future considerations and relevant government standards.
Roadmap and Transition Plan – The Supplier must deliver a prioritised roadmap outlining sequencing, dependencies, interim‐state capabilities, and transition steps to the target state, enabling early risk reduction and measurable improvements prior to full target‐state implementation.
Outcomes and Measures – The Supplier must define measurable outcomes and success indicators for each roadmap stage to support progress tracking, risk reduction, and benefits realisation.
Identity and Access Principles – The Supplier must define a set of identity principles to guide decisionmaking, design, and implementation of identity capabilities across DCP's digital environment and KSC.
Operating Model and Governance – The Supplier must define an identity and access sustainable operating model including governance structures, roles and responsibilities, policies, and decision rights to support sustainable and compliant identity management.
Identity and Access Risk Assessment – The Supplier must deliver a risk assessment aligned to relevant cyber security frameworks and privacy‐by‐design principles, including identification of threat scenarios, future challenges (e.g. quantum) and mitigation strategies.
Controls and Monitoring – The Supplier must define identity and access‐related security controls, including authentication strength (e.g. MFA), privileged access management, logging, monitoring, and incident response considerations appropriate for sensitive child protection information.
Legislative and Policy Compliance – The Supplier must demonstrate experience delivering identity and access management solutions compliant with relevant legislation, government cyber security standards, privacy obligations, and child safety requirements.
Downstream Procurement Support – The Supplier must support the development of procurement‐ready documentation for identity platforms and capabilities, including functional and non‐functional requirements, evaluation criteria, and scoring guidance.
Open Standards and Interoperability – The Supplier must ensure identity designs and requirements support open standards and interoperability with existing and future SA Government and DCP systems, cloud services, and external partners.
Early Implementation Support – Where required, the Supplier must support early roadmap implementation activities such as uplift of authentication controls, privileged access management, and quick‐win integrations, including delivery of funded or partially funded Proofs of Concept.
Knowledge Transfer and Capability Uplift – The Supplier must support knowledge transfer to DCP staff through documentation, training, and operational artefacts to enable sustainable operation and continuous improvement of identity and access management capability beyond the life of the engagement.
AI Readiness – The Supplier should demonstrate experience in delivering AI ready solutions with responsible AI and governance controls suitable for sensitive information.
Change and Adoption Support – The Supplier should demonstrate any experience that they have regarding change management and adoption support including stakeholder engagement and readiness activities.
Mandatory Requirements
* Have or be able to acquire a NSW Working with Children Check (WWCC) in accordance with the Child Safety (Prohibited Persons) Act 2016, before commencement of services.
* 3 years minimum experience as a Cybersecurity Architect or similar Cybersecurity role.
* Specific experience with IAM (Identity & Access Management).
Commitment to Diversity, Equity and Inclusion
As an inclusive employer, Fujitsu aims to recruit a diverse range of talents to help us achieve our purpose. In line with our diversity, equity, and inclusion strategy, we highly welcome applications from women and gender‐diverse people; Aboriginal and Torres Strait Islander people; Māori and Pacific people; LGBTI+ people; people with a disability; culturally and linguistically diverse people; veterans, Australian Defence Force (ADF) and emergency responders. Transgender and gender‐diverse applicants can request a copy of our Frequently Asked Questions to assist with the recruitment journey.
#J-18808-Ljbffr