Australia’s national science agency – the Commonwealth Scientific and Industrial Research Organisation (CSIRO) is seeking a chief information security officer to lead its new cyber defence function. The application window for CSIRO’s new CISO, who will report to CIO Brendan Dalton, closes next week. The agency, as Australia’s largest patent holder and owner of an ever-increasing wealth of intellectual property, is a key target for hackers whom successfully breached one of its key partner agencies – the Bureau of Meteorology – in 2015. The successful candidate will head CSIRO’s cyber operations and provides strategic direction for information security within the organisation. “The role will involve pragmatic thought leadership regarding cyber security and the assurance of CSIRO’s significant science data assets and platforms; setting the agencies cyber agenda and security strategy, ensuring compliance and managing risks,” an information document for the role noted. “The CISO leads a small team responsible for policy, education, training, cyber security incident response, risk assessment, contract review, incident prevention, detection and forensics. The role also works through partnerships across business units and functional groups and with CSIRO partners on security and related initiatives.” The CISO will sit on the executive of CSIRO’s Information Management and Technology, a function made up of 300 staff spread across twenty-seven CSIRO sites nationally. They will be required to “develop and execute an enterprise wide security strategy and roadmap that mitigates risk through the right balance of security measures and operational flexibility”. Applicants are expected to have at least 5 years’ experience in a senior enterprise-wide IT security role and “exceptional levels of integrity”. The incoming CISO will be required to obtain a Federal Government ‘top secret’ level security clearance and can work from Sydney, Canberra or Melbourne. Applications will be accepted until January 17. Related content opinion Website spoofing: risks, threats, and mitigation strategies for CIOs In this article, we take a look at how CIOs can tackle website spoofing attacks and the best ways to prevent them. By Yash Mehta Dec 01, 2023 5 mins CIO Cyberattacks Security brandpost Sponsored by Catchpoint Systems Inc. Gain full visibility across the Internet Stack with IPM (Internet Performance Monitoring) Today’s IT systems have more points of failure than ever before. Internet Performance Monitoring provides visibility over external networks and services to mitigate outages. By Neal Weinberg Dec 01, 2023 3 mins IT Operations brandpost Sponsored by Zscaler How customers can save money during periods of economic uncertainty Now is the time to overcome the challenges of perimeter-based architectures and reduce costs with zero trust. By Zscaler Dec 01, 2023 4 mins Security feature LexisNexis rises to the generative AI challenge With generative AI, the legal information services giant faces its most formidable disruptor yet. That’s why CTO Jeff Reihl is embracing and enhancing the technology swiftly to keep in front of the competition. By Paula Rooney Dec 01, 2023 6 mins Generative AI Digital Transformation Cloud Computing Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe