Average salary: $142,347 /yearly
More statsGet new jobs by email
$120,000 - $130,000
...As a Data Governance Officer, you will play a pivotal role in implementing and administering... ...contributing to a major information management program.What You Will Do: Support the... ...regulatory requirements related to data privacy and risk, including CPG235 and Australian...SuggestedFull timeFor contractors- ...Drive regional privacy leadership - shaping ethical, compliant use of data and emerging technologies Your new company At Hays, we build long term partnerships... ...current and aligned. Oversee regional risk management, including DPIAs, LIAs, IDTAs, breach response, and...SuggestedPermanent employmentFull timeWork at office
$171,261 - $173,174
...Policy Manager– talent pool Policy, Reform and Legislation Law Reform and Legal Services Apply now and join Australia’s top public sector employer where we will support you and provide an exciting and flexible working environment! Talent Pool Recruitment for ongoing...SuggestedTemporary workFlexible hoursSunday$121,185
...career? WaterNSW is seeking an experienced Data Governance & Quality Officer (full-time,... ...relevant discipline such as Information Management, Data Science, Computer Science,... ...regulatory frameworks related to data sharing, privacy and public access, including GIPA and relevant...SuggestedPermanent employmentFull timeHybrid workWork at officeRemote jobFlexible hours- ...and incidents, reporting as necessary to management Ensures the integrity and protection of... ...develops security policies or plans for data, software applications, hardware, telecommunications... ...Ensure compliance with regulations and privacy laws WHAT YOU’LL NEED TO SUCCEED...SuggestedOnline
- ...Location - North Sydney, NSW About us Data Zoo provides identity verification data... ...support and uplift our data governance, privacy, and technology compliance capabilities within... ...in strengthening our governance maturity, managing regulatory risk, and reinforcing trust in...SuggestedPermanent employmentFull timeWorldwide
- ...tools (FortiSIEM and MS Sentinel) to ensure swift identification and resolution of potential threats. ~ Utilise vulnerability management tools such as Tenable and MS Defender to report on vulnerabilities within customer environments and propose appropriate remediation...SuggestedFull time
- ...monitoring, threat hunting and analysis, security configuration and secure design of systems. Some of your key duties will be to: Management and continuous improvement of online security platforms Review and respond to information security alerts and performing security...SuggestedFull timeContract workHybrid workWork at officeOnlineFlexible hours
- ...experience providing L2 SOC Analyst Incident Response. ~ Proven experience co-ordinating incident investigation and response activities, managing escalated cases end-to-end. ~ Exposure to proactive threat hunting and advanced attacker techniques (e.g., APTs, ransomware, BEC)....SuggestedPermanent employmentFull timeWork from homeSunday
$165,000 - $180,000
...systems on the Program to ensure risks to the confidentiality, integrity or availability of those ICT systems and their information are managed as per Defence Security requirements. ~ Identifying threats and vulnerabilities arising from the design of ICT systems in the...SuggestedPermanent employmentFull time- ...become part of a global team of over 50,000 planners, designers, engineers, scientists, digital innovators, program and construction managers and other professionals delivering projects that create a positive and tangible impact around the world. We're one global team driven...SuggestedFull timePart timeFor contractorsHybrid workWork at officeLocal areaRemote jobWorldwideHoliday workFlexible hours
- ...foundation or ISC2 CC are also acceptable An understanding of core cyber security principles (CIA triad, defence-in-depth), basic risk management concepts and control-based security frameworks Exposure to cyber security assessments, IT audits, Governance, risk and compliance...SuggestedPermanent employmentFull timeOnlineFlexible hours
- ...to reduce "noise" and improve response times. Vulnerability Management: Review assessment reports, validate security flaws, and monitor... ...Analytical Rigor: Ability to dissect complex logs and telemetry data to make informed decisions under pressure. Standards Proficiency...Suggested
- ...experience and skills to support our clients on their cyber risk management journey. With Investment From AXA Group, This Exciting Growth... ...them Ability to identify developing patterns and trends in data Strong verbal and written communication skills Desirable...SuggestedLocal areaFlexible hours
- Urgent requirement of Palo Alto Certified Cyber Security Consultant - Contract - Brisbane Requirements Palo Alto Networks certifications : Cyber Security Professional Next-Generation Firewalls Ability to pass Queensland Police vetting Ability to provide...SuggestedFull timeContract workImmediate start
- ...antivirus solution, identifying potential threats and conducting risk assessments as to their likely impact. Support the Cyber Security Manager in implementing HAMBS Cyber Security Strategy. Ensure cyber security threats are actively monitored and managed. Liaise with...Full timeContract workOnlineRemote jobFlexible hours
- ...Design, deploy and sustain ICT security capabilities across complex environments ~Implement and maintain SIEM, SOAR and vulnerability management platforms ~Support and maintain Windows and Linux infrastructure, including servers and storage ~Troubleshoot operational...Contract workHybrid workFlexible hours
- ~Exciting opportunity within a Federal Government agency! ~12-month contract with up to 2 x 12-month extensions! ~Location: Canberra, ACT – Hybrid work model - Remote candidates may be considered on a case-by-case basis! A leading Federal Government Department ...Hourly payContract workHybrid workRemote job
- ...attacker techniques (APTs, ransomware, BEC). Proficient with SIEM (Splunk), EDR (CrowdStrike), Purview and ServiceNow. Experience managing incidents in SaaS/IaaS cloud environments. Skilled in Python, PowerShell and Bash for automation and IR, with experience in...Permanent employmentFull timeWork from homeHoliday work
$99,734 - $116,343
...responsibilities will include: Monitoring security alerts and analysing data to identify threats or unusual activity Investigating and... ...Supporting security awareness initiatives across the agency Managing and configuring security tools such as EDR, SIEM and...Permanent employmentFull timeHybrid workFlexible hours- ...remediation activities with ICT, Infrastructure, Data/DevOps and external SOC/MDR partners.... ...and operate within ITIL-aligned service management processes. Contribute to threat... ...non-technical staff. Understanding of privacy, confidentiality and child safety expectations...Full timeHybrid workOnlineFlexible hours
- ...security operations work involving the Security Information and Event Management tool, network intrusion systems and Host based Intrusion... ...skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law....Full timeOnlineLocal areaFlexible hours
- ...and regulatory awareness to mature the security posture and risk management capabilities of a complex strategic environment. What You’ll... ...and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law....Permanent employmentHybrid workOnlineLocal areaImmediate startFlexible hours
- ...Familiarity with similar critical infrastructure operator security frameworks will be regarded. ~ Exposure to SESA activities including managing hazard logs and requirements traceability and verification. ~ Strong active and passive ICT design experience and skills, being...Permanent employmentFlexible hours
- You’ve seen the headlines. You’ve heard the hype. The Reject Shop is now part of global retail giant Dollarama, and we’re building something big. 2026 is shaping up to be a defining year. Our store network is expanding, our customer experience is evolving, and we’re growing...Full time
$119,423
...leads the protection of Council’s systems, data, and digital assets by driving... ...provide expert guidance on enterprise risk. Manage core security tools and monitor, investigate... ...the end of your application. To Protect Privacy And Prevent Fraud, Do Not Upload Or Email...Permanent employmentFull timeOnlineFlexible hours- ...Series program. The program consists of AIR6500-1 Joint Battle Management System, AIR6502-1 Medium Range Ground Based Air Defence Capability... ..., education, experience, skills, internal equity, market data, applicable collective bargaining agreements, and relevant laws....Hourly payContract workLocal area
- ...identified as a Key Governance Role in the Information System Security Management Plan under the GEO SPACES contract. Your New Role And... ...working with systems used to manage large volumes of non-standard data formats and the IT security challenges these conditions...Contract workLocal areaImmediate start
$90,000 - $120,000
...environments and implementing best-in-class solutions. This role will play a key part in building, maturing, and running the vulnerability management programme, working closely with internal engineering teams and external partners. Ready to take the lead in securing complex...Hybrid workShift work- ...following: ~Cyber Threat Intelligence, Security Operations or Cyber Security Advisory roles ~Analysing complex cyber security data and producing intelligence or risk reporting ~Stakeholder engagement in complex enterprise or government environments ~Working with...Contract work