Knowledge of network concept (LAN, WAN, TCP/IP),web server and database. You will be part of the Government Infrastructure Group which supports Whole-Of-Government services for Agencies/ public officers, and hosting infrastructure services for Agency applications on-premises and in commercial cloud providers. You will engineer cyber security into the design, build and operate phases in central services, and be exposed to a wide array of cyber security technology and practices. These real world experiences will challenge and hone the cyber security skills and capabilities of individuals willing to step up to the challenge. Being able to contribute meaningfully within projects requires good foundation and understanding in the technology deployed. As modern IT approaches are introduced, newer cyber security technology and practices would be adopted. As an Infrastructure Security Architect, you will be expected to learn continually and adapt to a dynamic IT environment. What to Expect: To support the newly implemented Government Private Cloud (GPC) infrastructure and the upcoming Government Commercial Cloud (GCC) infrastructure. Work closely with multiple vendors on the evaluation of security technologies including lab setup and proof of concepts (PoC). To provide rapid assessment of security vulnerabilities/attacks and associated control measures. To create consolidated executive dashboards and presentations on various security assessments and updates. To create demos and presentations on Attack and Defence scenarios. To work closely with other team members and Contractors to get the desired deliverables. How to Succeed: Bachelor Degree in Computer Science, Information Technology or related discipline, Strong expertise and understanding of security products and functionalities with at least two Cloud Service Provider Knowledge of operating systems and platform Knowledge of network concept (LAN, WAN, TCP/IP),web server and database Knowledge of security technologies, products and security threats, Knowledge of adversary tools and techniques (e.g., buffer overflows, browser attacks, phishing, DNS poisoning) Certifications such as CEH, CISSP AWS or any cloud service security specialty is an added advantage.