SAP Cyber Security Specialist at Fujitsu Technology Solutions GmbH
Canberra, , Australia -
Full Time


Start Date

Immediate

Expiry Date

06 Apr, 26

Salary

0.0

Posted On

06 Jan, 26

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

SAP Cyber Security, Cloud Identity Services, Identity Provisioning, Authentication Frameworks, SAP IDM, SAP Access Control, SAML 2.0, OIDC, OAuth 2.0, Multi-Factor Authentication, SAP UI Logging, SAP UI Masking, Incident Response, Threat Monitoring, Compliance Standards, ERP Implementations

Industry

IT Services and IT Consulting

Description
We use technology to make happier lives. We are a global leader in technology and business solutions that transform organisations and the world around us. We have a long heritage of bringing innovation and expertise, continuously working to contribute to the growth of society and our customers. RFQ Opportunity 12 months Canberra based On-site Minimum Baseline Clearance About the role We are seeking a highly experienced SAP cyber security Specialist with a strong background in securing SAP systems in hybrid environments. The ideal candidate will have deep expertise in Cloud Identity Services, identity provisioning, authentication frameworks, SAP IDM and SAP Access Control. You will be responsible for protecting mission-critical SAP systems, managing identity integrations, and ensuring compliance through proactive monitoring and root cause analysis. This role requires a proven ability to configure secure authentication paths, integrate with external Identity and Access Management platforms such as Microsoft Identity Manager, and manage SAP security components in ECC and S/4HANA environments. Key duties and responsibilities Administration and troubleshooting of Identity Management systems including SAP, Azure AD, Microsoft Identity Manager, and other systems. Management of secure identity provisioning and de-provisioning across SAP landscapes. Implementation of authentication protocols (SAML 2.0, OIDC, OAuth 2.0) and secure authentication in hybrid environments. Implementation of SAP Access Control components. Designing and enforcing risk-based authentication policies and configuration of policy-based authorizations for SAP applications. Integration of multi-factor authentication platforms with SAP. Monitoring and mitigation of threats across multiple surfaces, including RFC connections and dormant or orphaned accounts. Configuration and maintenance of SAP UI masking and UI logging for sensitive data protection, including log extraction and analysis. Leading identification and response to potential security events, including root cause analysis for incidents and documentation of remediation steps. Ensuring ongoing system security compliance with Whole-of-Government and internal standards, including supporting Authority to Operate processes, penetration testing, and IRAP assessments of SDO systems. Operational support for major incidents. Collaboration with cross-functional teams for technology initiatives, system integrations, disaster recovery planning, and end-user support. Knowledge sharing, team mentoring, and uplift of technical capability (including documentation of processes, design etc.), and fostering a collaborative and high-performing culture. Desired Qualifications The ideal candidate will have the following skills and capabilities: Tertiary education in Information Security, Computer Science, or a related field Subject matter expertise (equivalent to 10+ years of experience) in SAP cybersecurity-focused roles. Expertise in SAP Cloud solutions, including SAP BTP and Cloud Identity Services. Proven experience with and/or strong understanding of: SAML 2.0, OIDC, OAuth 2.0, SCIM. SAP IDM. SAP Enterprise Threat Detection. SAP Access Control, including HR trigger and UAR customizations. SU25, role migration from ECC to S/4HANA. SAP UI Logging, UI Masking. BTP and SAP Cloud systems Security. SIEM tools and incident response procedures. managing security in hybrid SAP environments. Australian government compliance and security standards (ISM, PSPF, IRAP, ANAO etc.). Previous experience in with the technical delivery aspects of ERP implementations, including system configuration, integration, and data migration will be highly regarded. Why Fujitsu? We are an organization with a strong set of values and a history of respecting fairness and equality, whilst promoting diversity, equity, and inclusion. We constantly push ourselves to do better and strive to bring together a diverse mix of perspectives and talents in an inclusive environment, where we encourage our people to bring their full selves to work. We call this Be Completely You. We put people first. We believe in the power of diversity to drive innovation and our AWEI (Australian Workplace Equality Index) Gold Employer status, and Rainbow Tick certification for LGBTI+ inclusion show that we value an inclusive culture. We offer tailored career paths across our global organization to support your professional and personal growth. Our customers trust us. We have an excellent reputation across the region and globally. Best in-class reward and recognition programs flexible work, volunteering leave, and more. We live our values of aspiration, trust, and empathy, all day, every day. Commitment to Diversity, Equity and Inclusion As an inclusive employer, Fujitsu aims to recruit a diverse range of talents to help us achieve our purpose. In line with our diversity, equity, and inclusion strategy, we highly welcome applications from women and gender-diverse people; Aboriginal and Torres Strait Islander people; Māori and Pacific people; LGBTI+ people; people with a disability; culturally and linguistically diverse people; veterans, Australian Defence Force (ADF) and emergency responders. Transgender and gender-diverse applicants can request a copy of our Frequently Asked Questions to assist with the recruitment journey. If you don't tick every box in this job description, please don't rule yourself out. Research suggests that underrepresented groups tend to only apply if they meet every requirement. We focus on hiring people who value inclusion, collaboration, adaptability, courage, and integrity, rather than ticking boxes so if this resonates with you, then please apply. For more information, please email careersapac@fujitsu.com. Search Firm Representatives PLEASE READ: Fujitsu does not accept unsolicited assistance from search firms for employment opportunities. All CVs or resumes submitted by search firms to any employee at our company without a valid written agreement in place for this position will be considered the sole property of our company. No fee will be paid if a candidate is hired by Fujitsu due to an agency referral where no existing agreement is in place with the Fujitsu Talent Acquisition Team. Where agency agreements are in place, introductions must be through engagement by the Fujitsu Talent Acquisition Team. For Security Cleared Roles PLEASE NOTE: Due to the inherent requirements of the role, candidates must be Australian Citizens and hold an Australian Federal Government Security Clearance. The role will or will likely involve access to controlled technology and must satisfy additional restrictions and requirements as a consequence of the International Traffic in Arms Regulations and the Export Administration Regulations. As a consequence of these restrictions and requirements, applicants may be adversely impacted if they are not Australian citizens, are dual nationals, hold citizenship from proscribed countries, or are not of Australian national origin. Please refer to Discrimination (Fujitsu Australia Limited) Exemption 2017 (No 1) Notifiable instrument NI2020-672 (ACT).

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities
The SAP Cyber Security Specialist will be responsible for protecting mission-critical SAP systems, managing identity integrations, and ensuring compliance through proactive monitoring and root cause analysis. Key duties include administration of identity management systems, implementation of authentication protocols, and leading responses to potential security events.
Loading...