Xinja is building the first, Australian, independent 100% digital bank designed entirely for mobile. We are building a bank with our customers and designed in their interests. Neobanking will disrupt the existing banking model and create a whole new generation of experiences.
Developing the first neobank in the country is an exciting and challenging task. Our ethos is based on a win-win with our customers; if they do well, so do we. We believe it’s time Australians had access to the kind of technology that just allows them to get a lot more out of their money, with less angst.
We extend that attitude to our people and our partners. We look after our staff, and trust them with significant responsibility, but support them well. This is a great opportunity to be part of building a great company, and a fabulous brand.
Our 10 golden rules
To be successful at Xinja you are going to need to be happy working with our 10 golden rules
- No dickheads… However good they may be. No dress code, but sometimes you need to look smart 🙂 . No power trips because of a hierarchy. Intellect, customer experience and implementation is all that matters.
- Everything is in the cloud.
- We use real time data to evaluate our business and we reward staff on a quarterly basis with an entirely discretionary profit share. No one gets a share of the profit if our investors aren’t making money and our customers aren’t happy.
- We are here to make money, that’s why we exist, and we don’t screw people over to do it. We don’t lie to our clients in person or in marketing. We don’t engage in immoral lending; if our grandmother would think it was wrong, then it is. We aim to make lots of money ethically and we are proud of it.
- No one is entitled to work at Xinja. It is a huge honour to represent people’s hopes of a new bank and we earn that honour every day.
- We look after our people bloody well. We stand by them if they are in genuine need.
- We are truthful and direct with each other. Everyone says what they think in a robust, challenging, edgy environment. That means we won’t be the right place for everyone to work, and that’s ok.
- We only hire people better than us. We never, ever settle because we need a body. We do psychometric testing to get the best people, every time.
- About half our team, executive and board will be female, if they aren’t we aren’t recruiting the best people. We actively seek all types of diversity combined with brilliance.
- If you discriminate against someone because of who they love/sleep with, you’re a dickhead… Please see rule 1.
The Security Designer plays a strategically critical role in defining and assessing Xinja’s security strategy, architecture and practices. The security designer will be required to effectively translate business objectives and risk management strategies.
The Information Security Designer will:
- Assist the security and architecture teams in developing and implementing security solutions and capabilities that are clearly aligned with business, technology and threat drivers.
- Develop and maintain security architecture and design artefacts (models, templates, standards and procedures) that can be used to leverage security capabilities in projects and operations.
- Track developments and changes in the digital business and threat environments to ensure that these are adequately addressed in security plans and architecture artefacts.
- Participate in technology projects to provide security planning advice.
- Determine baseline security configuration standards for operating systems (e.g., operating system hardening), network segmentation, and identity and access management (IAM).
- Develop standards and practices for data encryption and tokenisation within the organization based on the organization’s data classification criteria.
- Conduct threat modelling of services and applications that tie to the risk and data associated with the service or application.
- Conduct security assessments of internal systems, applications and IT infrastructure as part of the overall risk management practice of the organization.
- Provide guidance to the Security Operations team in conducting vulnerability assessments and other security reviews of systems, and prioritize remediation based on the risk profile of the asset and guidance from the CISO or other executive management.
- Coordinate with DevOps teams to advocate secure coding practices and escalate concerns related to poor coding practices to the CISO.
- Coordinate with the privacy officer to document data flows of sensitive information within the organization (e.g., PII or ePHI) and recommend controls to ensure this data is adequately secured (e.g., encryption, tokenization, etc.).
- Validate IT infrastructure and other reference architectures for security best practices, and recommend changes to enhance security and reduce risk where applicable.
- Validate security configurations and access to security infrastructure tools, including firewalls, intrusion prevention systems (IPSs), web application firewalls (WAFs), anti-malware/endpoint protection systems, DLP and AWS infrastructure components etc.
- Review network segmentation to ensure least privilege for network access.
- Liaise with the vendor management team to conduct security assessments of existing and prospective vendors, especially those with which the organization shares intellectual property, PII, ePHI, regulated or other protected data.
- Evaluate the statements of work from these providers to ensure that adequate security protections are in place. Assess the providers’ SSAE 16 SOC 1 and SOC 2 audit reports (or alternative sources) for security-related deficiencies and required “user controls,” and report any findings to the CISO and vendor management teams.
- Liaise with the internal audit (IA) team to review and evaluate the design and operational effectiveness of security-related controls.
- Support the testing and validation of internal security controls as directed by the CISO or IA team.
- Review security technologies, tools and services, and make recommendations to the broader security team for their use based on security, financial and operational metrics.
- Conduct incident response exercises with colleagues throughout the organization and incorporate lessons-learned into existing security architectures and practices.
- Liaise with the business continuity management team to validate security practices for both disaster recovery planning (DRP) and business continuity management (BCM) testing and operations when a failover occurs.
- Key relationships include; Application and information owners, CISO, CIO, Chief risk officer (CRO), Chief privacy officer (CPO), Information security manager (ISM), Enterprise architect and Project management office.
- Regularly report relevant cyber security metrics into the required stakeholder(s).
Requirements and Qualifications:
- 5+ years of experience in an information security role as an analyst or designer.
- Bachelor’s or master’s degree in computer science, information systems, cybersecurity or a related field.
- Professional security management certification is desirable, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM),
- Certified Information Systems Auditor (CISA) or other similar credentials.
- Significant understanding of enterprise security architecture principles, standards and techniques, and practical experience in how to apply these in an enterprise
- Significant working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services
- Significant knowledge of IT infrastructure (e.g., applications, databases, operating systems, Hypervisors, IP Networks, Storage Networks, Backup networks).
- Good knowledge designing IAM technologies and services (e.g., Okta, Amazon Web Services’ [AWS’] IAM, Azure AD)
- Good knowledge of IT service management (e.g., ITIL-related disciplines):
- Good knowledge designing the deployment of applications and infrastructure into public cloud services such as AWS and/or Azure.
- Direct, hands-on experience managing security infrastructure such as firewalls, IPSs,
- WAFs, endpoint protection, SIEM and log management technology
- Exposure to Static Application Security Testing (SAST) tools.
- Direct, hands-on experience using vulnerability management tools
- High degree of initiative, dependability and ability to work with little supervision while being resilient to change.
- Strategic planning skills — The security designer must interpret business, technology and threat drivers, and develop practical security roadmaps to deal with these drivers.
- Communication skills — Excellent written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate information security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels.
- Financial analysis —evaluate the financial costs of recommended technologies. Specifically, the security designer will need to quantify purchasing and licensing options, estimate labor costs for a given service or technology, and estimate the total cost of operation or the ROI, or payback period for services or technologies that are replacing existing capabilities.
Changing banking for good:
At Xinja, we believe in embedding the brand in every customer experience, and therefore marketing is core to what we do. Developing the best neobank in the country is an exciting and challenging task. Our ethos is based on a win-win with our customers; if they do well, so do we. We believe it’s time Australians had access to the kind of technology that just allows them to get a lot more out of their money, with less angst. We are for profit and for purpose.
We extend that attitude to our people and our partners. We have an inclusive and diverse culture where we look after our staff and trust them with significant responsibility but support them well. This is a great opportunity to be part of building a great company, and a fabulous brand, AND learn heaps along the way.
If you’re up for this:
Please email your CV to [email protected]
And check out the hiring process we go thru here
Download the full job description here