top of page

Who We Are

We’re an Australian-born startup founded by a team of senior consultants and engineers who had one thing in common - we were tired of watching cyber security done poorly. We are passionate about improving security and infrastructure needs and we're here to make a real impact.

At Steltek, we don't just talk cyber we live it. We don’t believe in half measures - every Steltek consultant is deeply technical, hands-on, and driven by a shared mission: to raise the bar for cyber security consulting in Australia.

The Team

AK-4-BW_edited.jpg

Chief Executive Officer (CEO)

Aaron Kelder

Aaron has worked in the IT industry for over 20 years. Aaron brings his leadership skills  having lead large organisations at board and enterprise level.

  • LinkedIn
Damien-D-1_edited.jpg

Cyber Security Architect

Damien Derby

Damian is worked in the IT Security & Networking industry for over 20 years. With extensive experience and a history of successful project delivery, Damian is a key driver of quality and results.

  • LinkedIn
Daniel-K-BW_edited.jpg

Software Architect

Daniel Kelder

Daniel Brings over 20 years of experience as an Software Developer/Architect/Designer. Daniel has worked extensively in startups including significant experience working in cyber security startups.

  • LinkedIn
Dave-W-BW_edited.jpg

Security Architect

David Watt

Dave has worked in the IT Security & Networking industry for over 20 years. Dave combines his interpersonal, investigative, technical and business acumen to deliver high quality outcomes.

  • LinkedIn

Our Story

Steltek was founded by a team of senior consultants and engineers who had one thing in common - we were tired of watching cyber security done poorly.

​

Our core team first crossed paths delivering high-stakes work at other Cyber Security Consultancies and working on the client side at large critical infrastructure companies, where we saw firsthand how fragmented consulting, box-ticking audits, and inconsistent security practices were putting organisations at unnecessary risk. We knew there had to be a better way - so we built it.

 

With strong alignment on values, technical depth, and vision, the founding team secured external investment to launch Steltek - giving us the runway to build a company that prioritises impact over volume and quality over shortcuts.

Partnerships​

Our Technology partnerships empower us to deliver innovative solutions by combining our expertise with industry-leading technologies, ensuring unparalleled value and performance for our clients.​

Zero Trust

Zero Trust​​Zero Trust operates on the principle of not automatically trusting anything inside or outside the network perimeter, requiring verification of all users and devices attempting to access resources.

OT/IT Convergence​

Secure OT/IT convergence refers to the integration of operational technology (OT) and information technology (IT) systems in a manner that ensures robust security measures are in place to protect critical infrastructure.​

SASE

SASE, or Secure Access Service Edge, is a network architecture that combines security and networking functions into a single cloud-based service, providing secure access to applications and data from any location.

Network Segmentation​

Network segmentation is the practice of dividing a computer network into smaller, isolated segments or subnetworks to enhance security and control traffic flow within an organization's infrastructure.​

Technology Partners

We partner with vendors who have products that we can advise on, deploy, integrate an operate in areas including.

EDR

Endpoint detection and response (EDR) is a cybersecurity solution that continuously monitors and analyses endpoint activities to detect and respond to advanced threats and malicious activities in real-time.​

Allowlisting​

Application allow listing is a security approach that permits only approved applications to run on a system or network, enhancing protection against unauthorized software and potential security breaches.​

Managed XDR

Managed Extended Detection and Response (XDR) is a cybersecurity service that combines advanced threat detection, investigation, and response capabilities across multiple security layers.​

PAM

Privileged access management (PAM) is a security strategy that controls and monitors access to privileged accounts, reducing the risk of unauthorized access and potential security breaches..

Copyright by Steltek Pty Ltd

bottom of page