We use cookies to improve the user experience, analyze traffic and display relevant ads.
Details Accept
Enter position

Overview of salaries statistics of the profession "IT Security Risk Assessor in "

Receive statistics information by mail
Unfortunately, there are no statistics for this request. Try changing your position or region.

Recommended vacancies

Cyber Security Assessor
MACRO Recruitment, ACT
Assist Australian Cyber Security Centre in identifying more cyber threats, disrupting more cybercriminals offshore, building more partnerships with industry and government and protecting more Australians.Must be Australian citizen, and experienced in performing security reviews and identify security gaps in security architecture $150-$220 per hourAustralian Capital TerritoryWorking with critical infrastructure owners and operators to uplift their cyber security and working with Australian Government agencies to strengthen their cyber security and implement the ACSC’s Essential Eight mitigation strategies.Candidates will report to CESAR Project Managers. There is an expectation that successful candidates will work 5 days per week (estimated 40 hour week). On boarding is in Canberra, noting there may be a requirement for short term occasional travel within Australia.The Cyber Security Assessor conducts independent comprehensive assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT) system to determine the overall effectiveness of the controls.The Cyber Security Assessor’s major responsibilities include:• Develop security compliance processes and/or audits for external services• Assess the effectiveness of security controls• Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk management strategy• Verify that application software/network/ system security postures are implemented as stated, document deviations, and recommend required actions to correct those deviations• Participate in Risk Governance processes to provide security risk, mitigations and input on other technical rEssential criteriaDemonstrated understanding in current industry methods for evaluating, implementing and disseminating information technology (IT) security assessment, monitoring, detection, and remediation tools and procedures utilising standards-based concepts and capabilities.30%Experienced in the development of security compliance processes/ and or audits of external services.20%Experienced in performing security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk management strategy.20%Experienced in assessing the effectiveness of security controls.10%Demonstrated knowledge of cyber security and privacy principles used to manage risks related to the use, processing, storage and transmission of information or data.10%Demonstrated knowledge of cyber threats and vulnerabilities.10%