Skip to content

We're seeking expressions of interest from suitably qualified and experienced companies to augment our internal cyber security team.

Companies may wish to respond to one or both service scopes below.

Scope 1 – Cyber Security Managed Service

  • a. Cyber Security Policy Management: Proactively manage security policies across endpoints, email and cloud, including but not limited to secure configuration baselines, application control, email gateways and EDR.

  • b. Network & Cloud Security: Proactively manage network security policies including but not limited to network firewalls, web application firewalls, intrusion detection and prevention systems and edge devices.
  • c. Data Security: Discover, classify and secure structured and unstructured data from unauthorised access, theft and leakage using Western Power’s toolsets.

  • d. Identity & Access Management: Proactively manage the end-to-end lifecycle of digital identities across Western Power’s IT, OT & cloud environments including identity governance and administration, access management and privileged access management.

  • e. Threat Exposure & Vulnerability Management: Provide an enterprise-wide exposure management service to identity, prioritise and support remediation of cyber security exposure across Western Power’s attack surface.

  • f. Detection Engineering: Design, implement and tune custom rules to detect cyber security threats. Manage logging services and agent health and performance.

  • g. Threat Intelligence: Provide actionable insights into adversary tradecraft to manage our cyber security risk at a strategic, operational and tactical level.

Scope 2 - Managed Detection & Response

  • a. Threat Detection & Response: Perform 24/7 detection and response across IT & OT using Western Power’s toolsets.

  • b. Incident Response: Provide a level 3 incident response capability on retainer to assist in incident response activities, and to provide subject matter expert advice where necessary.

  • c. Threat Hunting: Develop hypotheses and perform investigations to identify indicators of successful or attempted compromise

In addition, supplier should be aware of the following strategic considerations:

  • Western Power is classified as part of Australia’s critical infrastructure and must comply with the Security of Critical Infrastructure (SOCI). Supplier must demonstrate their ability to operate within this framework.

  • Western Power is actively exploring the use of Artificial Intelligence and automation to enhance service delivery.

Registration requirements

Please note that registering for this opportunity does not guarantee that your organisation will be invited to participate in a market event or become a supplier to Western Power. Responses to this EOI will be a key factor in determining which suppliers are invited to present their services at the end of April.

Interested parties are invited to submit their response via the OneAdvanced Opportunity Hub

Closing date for registrations: 4PM (AWST), 10 April 2026.