Information security architect | melbourne, au
MelbourneRSM
...identity, segmentation, encryption, key management, secrets, logging, telemetry, and secure data flows. • Lead Zero Trust architecture across users, devices, network, data, workloads, and trust boundaries. • Define cloud and hybrid architecture patterns aligned with AWS/Azure Well-Architected - Security and ACSC guidance. [...]
Category Engineering & Architecture