Welcome to ASIO’s Virtual Experience for Technologists
ASIO protects Australia and Australians from threats to their security. ASIO’s people are ordinary Australians who do extraordinary things. The roles in ASIO are as diverse as our people – we have more careers opportunities for technologists than you might expect.
Technology is at the heart of ASIO’s mission. We recruit technologists from a wide array of backgrounds and experience levels who want to make a difference.
As a Technologist Graduate, you will be assigned to a stream based on your academic background, skills and experience. The streams include Science & Engineering; Data & Analytics; Information & Cyber Security; Software Engineering & Development; and IT Platforms.
You will be part of a program that will train, develop and support you to have a career that makes a difference.
This Virtual Experience is self-paced and should take approximately 90 minutes to complete.
This Virtual Experience is free for all students.
After completing this Virtual Experience you will have rare insight about the work of Technologist Graduates in ASIO.
Module 1: Geospatial analysis; information exploitation, data profiling and open-source research skills.
Module 2: Telecommunications data analysis; digital profiling; Information Security; IT security.
Module 3: Software development
Module 1 - Find the ‘Dead Drop’ (30 minutes)
A ‘Dead Drop’ is an intelligence term for a secret location where spies can exchange information without ever meeting in person. ASIO suspects a spy (Ms Pink) and her handler (known to ASIO as ‘The Boss’) are using a ‘Dead Drop’ as part of their intelligence tradecraft. ASIO needs your help to identify the exact location using the information and clues provided.
Module 2 – Identify ‘The Boss’ (40 minutes)
Your next task is to discover the real name of ‘The Boss’ by analysing telecommunications data. You will work with a spreadsheet of call logs and a set of clues about ‘The Boss’ and an accomplice. Matching call times and durations will help you work out who ‘The Boss’ really is.
Module 3 - Reveal the Network (20 minutes)
In this final task, you will fix a broken piece of code to reveal the password ‘The Boss’ uses to access a covert network. Once you have discovered this password, ASIO will be able to intercept its covert communications and disrupt any potential threats to security.
Click Register to begin.
The opportunity is available to applicants in any of the following categories.
Australia
Australian Citizen