4 minute read

TALENT BOARD

Sweta Bhattarai

WHAT POSITIONS ARE YOU LOOKING FOR?

Security Operations Centre Analyst/ Cyber Security Analyst

PREFERRED STATE: Western Australia, Australia

WHAT KIND OF ROLE: Entry level

WHAT’S YOUR EXPERTISE:

My expertise is in the I.T Security field. After acquiring my Master Degree I have spent a year working at Capgemini, providing first and second level support to internal employees and contractors, this spands across, First level troubleshooting, priority incident resolution, vulnerability management and windows server patching.

WHAT’S YOUR IDEAL WORK ENVIRONMENT OR BENEFITS REQUIRED?

Ideally I would like to work in a corporate environment amongst other like minded individuals in my field. I am flexible with my work place and able to accommodate working from home or working in the office.

DM ON LINKED IN Inna Sobol

WHAT POSITIONS ARE YOU LOOKING FOR?

Security Awareness, Information Security or Helpdesk roles

PREFERRED STATE: Queensland, Australia

WHAT KIND OF ROLE: A team role

WHAT’S YOUR EXPERTISE: Have completed Cert IV in Cyber Security, Cisco routing, switches, documentation, AWS cloud (currently completing certifications)

WHAT’S YOUR IDEAL WORK ENVIRONMENT OR BENEFITS REQUIRED? Hybrid/office/flexible hours

Fatima Khan

WHAT POSITIONS ARE YOU LOOKING FOR?

I’m interested in Cyber Threat Intelligence, Governance Risk and Compliance and Cyber Security Analyst related roles.

PREFERRED STATE:

I’m primarily seeking a hybrid position in Sydney, Australia.

WHAT KIND OF ROLE:

Individual and team based contributor – for nearly any kind of organisation.

WHAT’S YOUR EXPERTISE:

• Watchful professional offering comprehensive, hands-on experience identifying, investigating, and responding to information security alerts. Expertise in searching through data-sets to detect threats and anomalies and administering metrics to maintain security processes and controls. Focused on helping businesses safeguard sensitive data from hackers and cyber-criminals.

• Expertise in developing, implementing, and documenting security programs and policies while monitoring compliance across departments. Applying leading theories and concepts which contribute to the development, maintenance and implementation of information security standards, procedures, and guidelines.

• Developing plans to safeguard computer files against modification, destruction or disclosure while also maintaining the integrity of sensitive data.

• Performing risk analysis to identify appropriate security countermeasures.

WHAT’S YOUR IDEAL WORK ENVIRONMENT OR BENEFITS REQUIRED?

Hybrid position in Sydney Metro area. Learning and development opportunities. Flexible work practices DM

Tithirat Siripattanalert

Tithirat Siripattanalert is chief security officer and chief data officer at Thai telco, True Corporation. She has 23 years of leadership experience in the technical and operational aspects of cybersecurity, enterprise data management and risk management, and more than half a dozen industry certifications.

And what does she see as the most important quality for an aspiring cybersecurity professional? Passion. For people transitioning into cybersecurity from other roles, she says: “My only requirement is passion for cybersecurity, no matter which background they are from. I regularly arrange training, such as penetration testing, forensics investigation, purple team or security tool knowledge for all staff in any team who have passion for this knowledge.

“I support staff based on their personal goals and career development plans. I support job rotation and training across various cybersecurity domains for all staff. They are welcome to take on different roles in order to fulfill their career goals. I regularly have one-on-one meetings on career development plans with all staff to support them to be successful in the career goals.”

Similarly, when it comes to hiring staff, “We are looking for candidates with passion for cybersecurity. We have upskill training prepared for all new staff in various domains (pen testing, blue team, advisory, DevSecOps, cloud security, security tools implementation, etc). We support professional certificate training, on-the-job training and in-depth technical training. I would like to use coaching skill to groom my team members to meet the career goals.”

She adds: “In addition, soft skills such as change enablement, communication and influencing are important to being successful in a cybersecurity career, because we need to point out the importance of cybersecurity, change human behaviour and drive security improvement programs.”

A Career Goal Long Sought

For Siripattanalert her current role is the fulfilment of long held ambitions. “I envisioned being a chief information security officer, managing all aspects of cybersecurity and using my skill and knowledge to help enterprises be protected from cyber attack,” she says.

“I was promoted to be chief data officer, fraud management and data protection officer. It has always been my great pleasure to have expanded responsibilities.”

She says the most challenging aspect of her role is “optimising investment to get the most effective cybersecurity solution. This requires asset classification, cyber risk assessment, threat modelling analysis, project prioritisation and keeping up with the state of art in cybersecurity technology.

“The objective is to get the greatest benefits for the organisation from the minimum security investment sufficient to protect critical assets against cyber attack, to detect any suspicious activities and stop breaches before there is any adverse impact to the organisation.”

In addition to the developments most see as having the biggest impact on cybersecurity in coming years — artificial intelligence, machine learning and quantum computing — Siripattanalert flags cybersecurity mesh as an important new technology for the protection of sensitive data. “It offers enhanced, more flexible and scalable protection beyond the existing physical boundaries,” she says. “It will be integrated and interoperable with various security tools in a holistic approach and provide a seamlessly integrated dashboard for the benefits of clients.”

CYBERSECURITY MESH: AN EMERGING TECHNOLOGY

According to Gartner, “Cybersecurity mesh, or cybersecurity mesh architecture (CSMA), is a collaborative ecosystem of tools and controls to secure a modern, distributed enterprise. It builds on a strategy of integrating composable, distributed security tools by centralising the data and control planes to achieve more effective collaboration between tools. Outcomes include enhanced capabilities for detection, more efficient responses, consistent policy, posture and playbook management, and more adaptive and granular access control — all of which lead to better security.”

However, rather than cybersecurity mesh, Siripattanalert says her personal priority is to focus on AI. “At this stage, I would like to learn more on how to bring artificial intelligence into automated and accurate cyber detection.”

Siripattanalert cites two leading cybersecurity individuals as having been particularly significant in her career, FireEye founder Sahar Aziz and Vectra AI founder Hitesh Sheth.

“I met Ashar 10 years ago at an Financial Services Industry event in Singapore. His vision for cybersecurity is impressive. He is articulate and influential in the industry. And lately I met Vectra founder Hitesh Sheth. . He is humble and puts a lot of effort into improving service capability and quality. He told me to treat him as ‘the first line support engineer’. That has been a critical influence to help me focus on customer satisfaction.” www.linkedin.com/in/tithirat-siripattanalert-cisspgcih-cism-pcip-39ab2538

This article is from: