Specialist - Mercer Information Security
... of experience in a technical Information Technology (IT) or Information Security role, with experience in IT ...
... of experience in a technical Information Technology (IT) or Information Security role, with experience in IT ...
... , the role of the information security auditor is to work closely ... performance by assessing their Information Security Management Systems and processes against Information security techniques – Information security management systems requirements ISO IEC ...
... years of experience in the Information Security or Information Technology space? Then we may have the perfect opportunity for you What can you expect? Mercer Information Security is looking for an Information Security Specialist with experience or interest ...
... of experience in a technical Information Technology (IT) or Information Security role, with experience in IT ...
... accept their responsibilities Undertake an Information Security Classification process for each asset. ... , Integrity, and Availability (CIA) and Information Security Classification of Information Assets. Good communication skills with ...
... certifications such as CISSP (Certified Information Systems Security Professional), CCIE (Cisco Certified Internetwork Expert), and CISM (Certified Information Security Manager). Have a minimum of ...
... in accordance with the Commonwealth Information Security Manual (ISM), Protective Security Policy Framework (PSPF) and Defence Security Principles Framework (DSPF). This role ... Guidance from the BDA Chief Information Security Officer (CISO) and MQ-28 ...
... accept their responsibilities • Undertake an Information Security Classification process for each asset. • ... , Integrity, and Availability (CIA) and Information Security Classification of Information Assets. • Good communication skills with ...
... outcome. Expert knowledge of cyber security best practices and Australian Government security standards, such as, the Information Security Manual (ISM) and Protective Security Policy Framework (PSPF). Well-developed ...
... . Professional certifications such as CISSP, information security, information technology, risk management or equivalent discipline is highly desirable. Cloud Security Certifications such as AWS Certified Security Speciality is desirable. If this ...