Job Openings CyberSecurity Architect

About the job CyberSecurity Architect

We are Fujitsu

We use technology to make happier lives. We are a global leader in technology and business solutions that transform organisations and the world around us. We have a long heritage of bringing innovation and expertise, continuously working to contribute to the growth of society and our customers.

About the role:

  • RFQ Opportunity
  • 1 year contract (possible extension or convert to permanent position) 
  • Adelaide based
  • On-site

We are seeking a skilled Cyber Security Analyst to help protect our organization's digital assets and sensitive information. The ideal candidate will have a strong understanding of cybersecurity principles, practices, and technologies to identify vulnerabilities, implement security measures, and respond to security incidents.

Key responsibilities

Identity Current State Assessment – The Supplier must assess and document the current identity and access landscape, including architecture, directories, providers, authentication methods, privileged access, lifecycle processes, audit and logging capabilities, integration patterns, and third-party access arrangements. The supplier must clearly identify system and architectural challenges with current state, that improvement opportunities and proposed strategy will seek to address.

Improvement Opportunities – The Supplier must identify and prioritise short to medium-term actions (1–2 years) to improve user experience, reduce identity-related risk, and enable delivery of KSC outcomes, ensuring recommendations do not introduce unnecessary technical debt.

Identity and Access Strategy – The Supplier must develop and deliver an Identity and Access Strategy that defines a clear target state for identity and access management capabilities required to support DCP outcomes, with the KSC Program as the primary and prioritised delivery vehicle. The strategy must align with enterprise architecture principles, future considerations and relevant government standards

Roadmap and Transition Plan – The Supplier must deliver a prioritised roadmap outlining sequencing, dependencies, interim-state capabilities, and transition steps to the target state, enabling early risk reduction and measurable improvements prior to full target-state implementation.

Outcomes and Measures – The Supplier must define measurable outcomes and success indicators for each roadmap stage to support progress tracking, risk reduction, and benefits realisation.

Identity and Access Principles – The Supplier must define a set of identity principles to guide decision[1]making, design, and implementation of identity capabilities across DCP's digital environment and KSC.

Operating Model and Governance – The Supplier must define an identity and access sustainable operating model including governance structures, roles and responsibilities, policies, and decision rights to support sustainable and compliant identity management.

Identity and Access Risk Assessment – The Supplier must deliver a risk assessment aligned to relevant cyber security frameworks and privacy-by-design principles, including identification of threat scenarios, future challenges (e.g. quantum) and mitigation strategies.

Controls and Monitoring – The Supplier must define identity and access-related security controls, including authentication strength (e.g. MFA), privileged access management, logging, monitoring, and incident response considerations appropriate for sensitive child protection information.

Legislative and Policy Compliance – The Supplier must demonstrate experience delivering identity and access management solutions compliant with relevant legislation, government cyber security standards, privacy obligations, and child safety requirements.

Downstream Procurement Support – The Supplier must support the development of procurement[1]ready documentation for identity platforms and capabilities, including functional and non-functional requirements, evaluation criteria, and scoring guidance.

Open Standards and Interoperability – The Supplier must ensure identity designs and requirements support open standards and interoperability with existing and future SA Government and DCP systems, cloud services, and external partners.

Early Implementation Support – Where required, the Supplier must support early roadmap implementation activities such as uplift of authentication controls, privileged access management, and quick-win integrations, including delivery of funded or partially funded Proofs of Concept.

Knowledge Transfer and Capability Uplift – The Supplier must support knowledge transfer to DCP staff through documentation, training, and operational artefacts to enable sustainable operation and continuous improvement of identity and access management capability beyond the life of the engagement.

AI Readiness – The Supplier should demonstrate experience in delivering AI ready solutions with responsible AI and governance controls suitable for sensitive information.

Change and Adoption Support - The Supplier should demonstrate any experience that they have regarding change management and adoption support including stakeholder engagement and readiness activities.

Mandatory Requirements

  • Have or able to acquire a DHS Working with Children Check (WWCC)in accordance withtheChild Safety (Prohibited Persons) Act 2016, before commencement of services.
  • 3 years minimum experience as a Cybersecurity Architect or similar Cybersecurity role.
  • Specific experience with IAM (Identity & Access Management)

Why Fujitsu?

We are an organization with a strong set of values and a history of respecting fairness and equality, whilst promoting diversity, equity, and inclusion. We constantly push ourselves to do better and strive to bring together a diverse mix of perspectives and talents in an inclusive environment, where we encourage our people to bring their full selves to work. We call this Be Completely You.

  • We put people first. We believe in the power of diversity to drive innovation and our AWEI (Australian Workplace Equality Index) Gold Employer status, and Rainbow Tick certification for LGBTI+ inclusion show that we value an inclusive culture.
  • We offer tailored career paths across our global organization to support your professional and personal growth.
  • Our customers trust us. We have an excellent reputation across the region and globally.
  • Best in-class reward and recognition programs flexible work, volunteering leave, and more.
  • We live our values of aspiration, trust, and empathy, all day, every day.

Commitment to Diversity, Equity and Inclusion

As an inclusive employer, Fujitsu aims to recruit a diverse range of talents to help us achieve our purpose. In line with our diversity, equity, and inclusion strategy, we highly welcome applications from women and gender-diverse people; Aboriginal and Torres Strait Islander people; Māori and Pacific people; LGBTI+ people; people with a disability; culturally and linguistically diverse people; veterans, Australian Defence Force (ADF) and emergency responders. Transgender and gender-diverse applicants can request a copy of our Frequently Asked Questions to assist with the recruitment journey.

If you don't tick every box in this job description, please don't rule yourself out. Research suggests that underrepresented groups tend to only apply if they meet every requirement. We focus on hiring people who value inclusion, collaboration, adaptability, courage, and integrity, rather than ticking boxes so if this resonates with you, then please apply. For more information, please email careersapac@fujitsu.com.

Search Firm Representatives PLEASE READ:

Fujitsu does not accept unsolicited assistance from search firms for employment opportunities. All CVs or resumes submitted by search firms to any employee at our company without a valid written agreement in place for this position will be considered the sole property of our company. No fee will be paid if a candidate is hired by Fujitsu due to an agency referral where no existing agreement is in place with the Fujitsu Talent Acquisition Team. Where agency agreements are in place, introductions must be through engagement by the Fujitsu Talent Acquisition Team.