Jason Fraser
Head of Cyber Security at FlourishDx- Claim this Profile
Click to upgrade to our gold package
for the full feature experience.
Topline Score
Bio
Tom Zorde
Working with Jason you will quickly recognise that he has a unique sense of awareness of the organisational readiness to take on appropriate information risk management and security architecture practices. Jason is an easy going yet astute professional who can communicate the practical application of current-day commercial applicability of technical challenges to non-technical audience. I would be delighted to work with Jason again.
Adrian Moore-Crouch
Jason is not only an expert in IT Security, but also a consultant who understands how to communicate with the business leaders but also how to deliver the required outcome. Jason worked so well with my team because he was able to relate both technically and personally. I would recommend Jason to any organisation.
Tom Zorde
Working with Jason you will quickly recognise that he has a unique sense of awareness of the organisational readiness to take on appropriate information risk management and security architecture practices. Jason is an easy going yet astute professional who can communicate the practical application of current-day commercial applicability of technical challenges to non-technical audience. I would be delighted to work with Jason again.
Adrian Moore-Crouch
Jason is not only an expert in IT Security, but also a consultant who understands how to communicate with the business leaders but also how to deliver the required outcome. Jason worked so well with my team because he was able to relate both technically and personally. I would recommend Jason to any organisation.
Tom Zorde
Working with Jason you will quickly recognise that he has a unique sense of awareness of the organisational readiness to take on appropriate information risk management and security architecture practices. Jason is an easy going yet astute professional who can communicate the practical application of current-day commercial applicability of technical challenges to non-technical audience. I would be delighted to work with Jason again.
Adrian Moore-Crouch
Jason is not only an expert in IT Security, but also a consultant who understands how to communicate with the business leaders but also how to deliver the required outcome. Jason worked so well with my team because he was able to relate both technically and personally. I would recommend Jason to any organisation.
Tom Zorde
Working with Jason you will quickly recognise that he has a unique sense of awareness of the organisational readiness to take on appropriate information risk management and security architecture practices. Jason is an easy going yet astute professional who can communicate the practical application of current-day commercial applicability of technical challenges to non-technical audience. I would be delighted to work with Jason again.
Adrian Moore-Crouch
Jason is not only an expert in IT Security, but also a consultant who understands how to communicate with the business leaders but also how to deliver the required outcome. Jason worked so well with my team because he was able to relate both technically and personally. I would recommend Jason to any organisation.
0
/5.0 / Based on 0 ratingsFilter reviews by:
Credentials
-
TOGAF 9 Certified
The Open GroupSep, 2015- Sep, 2024 -
Certified Information Security Manager (CISM)
ISACAApr, 2015- Sep, 2024 -
PRINCE2 Foundation
APMG InternationalDec, 2013- Sep, 2024 -
Certified Information Systems Security Professional (CISSP)
(ISC)²Dec, 2012- Sep, 2024 -
SABSA Chartered Security Architect - Foundation Certificate
The SABSA InstituteSep, 2012- Sep, 2024 -
ITIL V3 Foundation
APMG-InternationalFeb, 2011- Sep, 2024
Experience
-
FlourishDx
-
Australia
-
Business Consulting and Services
-
1 - 100 Employee
-
Head of Cyber Security
-
Jan 2023 - Present
-
-
-
CBH Group
-
Australia
-
Transportation, Logistics, Supply Chain and Storage
-
700 & Above Employee
-
Information Security Architect
-
Sep 2018 - Jan 2023
Responsible for: - Cyber Security leadership and strategy - Evaluation of security products for effectiveness and suitability for CBH - Development of visualisation method for assessment of control effectiveness against industry frameworks, which I then used to obtain security strategy support and funding. - Delivery of network segmentation project from business case through to implementation, including architecture and design. - Design and implementation of B2B and B2C identity and authentication solutions. - Design and implementation of Conditional Access framework including MFA and behavioural monitoring. - Security Operations including identification, investigation, and remediation of cyber threats (using EDR, SIEM, CASB, Endpoint Protection, etc...) - Development of cyber security automation and workbooks. - Evaluation of cloud and on-prem software solutions to ensure compliance with CBH security standards. - Developed security governance framework (policies, standards, etc...) aligned to industry good practice frameworks. - Managed technical cyber security audits/compliance and testing. - Provision of enterprise and solution architecture to IT projects. - Provision of cyber security guidance to contracts management, including review and guidance on contract statements, organisational risks and obligations, and suitability of contracts relevant to CBH's legislative landscape.
-
-
-
RAC WA
-
Australia
-
Consumer Services
-
700 & Above Employee
-
Information Security Manager
-
Sep 2014 - Sep 2018
- Provision of Information Security Assurance for projects- Develop and maintain Information Security Strategy- Develop and maintain Information Security Policies and Standards- Provide Information Security Leadership- Contribute to Governance and Risk Boards and Committees
-
-
Innovator in Founders Institute Program
-
Aug 2016 - Nov 2016
Graduated from the Perth chapter of Founders Institute. I was working on new ideas for the RAC and learning how to build a startup.My project was building a location aware augmented reality app for tourists to use when visiting tourism sites in Western Australia. The app delivers targeted multimedia content to provide a more engaging/immersive experience than the existing solutions.
-
-
-
WA Police
-
Australia
-
Law Enforcement
-
700 & Above Employee
-
Solutions Architect / Security Architect
-
Sep 2013 - Sep 2014
Responsible for:- Strategic Planning;- Program Management;- Solution Architecture;- Security Architecture;- Architecture Governance.
-
-
Executive Manager Information Security
-
Nov 2012 - Sep 2013
Responsible for:- Operational mangement of Information Security Operations Group with 11 reports;- Strategic and tactical planning for all aspects of Information Security;- Financial management of information security expenditure;- Professional development and training of security operations staff;- Information Security Incident Response and Management;- Management of contracts and contractors.
-
-
-
-
Senior Security Consultant
-
Feb 2012 - Nov 2012
-
-
-
L7 Solutions
-
United States
-
Computer and Network Security
-
1 - 100 Employee
-
Business Security Advisor
-
Nov 2010 - Feb 2012
-
-
-
-
Information Security Analyst
-
Mar 2009 - Nov 2010
-
-