Average salary: $178,624 /yearly
More statsGet new jobs by email
Search Results: 114 vacancies
- ...typical day look like? This is a well-established operating environment that offers variety in tasks and projects across the spheres of security. This role will require you to: support the daily operation of multiple classified security zones, including granting and revoking...SuggestedWork at officeHybrid workFlexible hours3 days week
- Our federal government clients are looking for TSPV security professionals to support a range of critical security functions across the design, build, test, deployment, and operation of secure ICT systems. These roles contribute to the delivery of modern, secure mobility solutions...SuggestedContract workFor contractors
- Randstad is currently seeking several experienced Security officer APS5 to join a high-performing federal government team. Canberra, ACT | 6 months l Baseline Clearance Position description Evaluate the suitability of stakeholder personnel through comprehensive interviews...SuggestedTemporary workShift work
- ...collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Security Consultant About Us Digital Intelligence operates in multiple countries...SuggestedOverseas
- ...Work options: Security Clearance Required for this role: Must have a Current NV1 security clearance. Must be an Australian... ...will be required to comply with the US International Traffic in Arms Regulation (ITAR) as the candidate may need to handle export-...SuggestedWork at officeOnline
- ...Arrangement) #128338; Hours: Up to 37.5 hours per week #128272; Security Clearance: Must be able to obtain Baseline clearance #127462;... .... ~Advanced knowledge of IaC tools (e.g., Terraform, ARM/Bicep), Azure DevOps CI/CD pipelines. ~Excellent communication and...SuggestedHybrid work
- ...collect, connect and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in the most demanding environments. Site Security Controller The Site Security Controller is responsible in conjunction with...SuggestedFull timeFor contractorsWork at officeLocal areaOverseas
- ...environments and making a real impact? Join a small, agile cyber security team where your work directly contributes to protecting users, systems... .... Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this...SuggestedPermanent employmentOnlineLocal area
- ...and understand complex data, so that governments, nation states, armed forces and commercial businesses can unlock digital advantage in... ...supporting our customers mission, protecting themselves and others from security risks and implementing new capabilities across a variety of ICT...SuggestedFlexible hours
- ...Gateway Team We’re seeking a dynamic Technical Specialist – Security Operations to manage the Gateway Security team members and the... ...and requirements as a consequence of the International Traffic in Arms Regulations and the Export Administration Regulations. As a consequence...SuggestedFlexible hoursShift work
- ...option #128197; Start Date: Monday, 01 September 2025 #128272; Security Clearance: Baseline #128188; Working Arrangement: Hybrid... ...Kubernetes). ~Familiarity with DevOps and IaC tools (Terraform, ARM templates). ~Experience with automated testing frameworks (NUnit...SuggestedContract workHybrid work
- ...and health markets. Your New Role And Responsibilities The Security Architect Lead is a senior technical leader responsible for shaping... .... Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can...SuggestedPermanent employmentOnlineLocal area
- ...experience whilst completing your studies Support Federal Government security frameworks Excellent career development in a culture that... .... Applicants may also need to meet International Traffic in Arms Regulations (ITAR) requirements. In certain circumstances this can...SuggestedPermanent employmentInternshipLocal areaFlexible hours
- ...team and play a key role in delivering complex defence and national security projects that safeguard Australias future. Downer Professional... .... In some instances, compliance with International Traffic in Arms Regulations (ITAR)requirements may also be an inherent...SuggestedFull time
- ...our customers. Fujitsu Cyber: Shaping the Future of Digital Security FC delivers comprehensive cybersecurity solutions across Australia... ...requirements as a consequence of the International Traffic in Arms Regulations and the Export Administration Regulations. As a consequence...SuggestedOnlineHybrid workFlexible hours
- ...team and play a key role in delivering complex defence and national security projects that safeguard Australias future. Downer Professional... .... In some instances, compliance with International Traffic in Arms Regulations (ITAR) requirements may be an inherent requirement....Full time
- ...Security Clearance Required Negative Vetting 1 Location of Role Canberra, ACT; Brisbane, QLD; Perth, WA Job Details Established in 2012, Omni is a proudly Australian-owned company dedicated to supporting Australian Government, Defence, and Private Sector Clients. With...Permanent employmentFlexible hours
- ....****@*****.*** Location: ACT, NSW, NT, QLD, SA, TAS, VIC, WA Working Arrangements: Hybrid (up to 37.5 hours per week) Security Clearance: Must be able to obtain Baseline clearance Citizenship: Australian Citizens only Are you an experienced Program Analyst...Hybrid work
- ...wherever you want it to go. Join EY and help to build a better working world. First Nations Expression of Interest EY External Security Vetting Acknowledgement of Country EY acknowledges the Traditional Owners and Custodians of the lands on which EY offices...OnlineFlexible hours
$1,000 - $2,000 per day
...,000 clients on their talent needs. Responsibilities: ~ Identify targeted audiences and stakeholders ~ Design and deliver cyber security awareness campaigns, training programs and educational content tailored for diverse audiences ~ Coordinate and lead outreach activities...Full timeContract work