Average salary: $142,897 /yearly
More statsGet new jobs by email
- ...and incidents, reporting as necessary to management Ensures the integrity and protection of... ...develops security policies or plans for data, software applications, hardware, telecommunications... ...Ensure compliance with regulations and privacy laws WHAT YOU’LL NEED TO SUCCEED...SuggestedOnline
- ...through continuous security monitoring and controls. Respond to incidents following established Cyber Incident Response procedures. Manage service requests capacity planning and vendor coordination. Keep documentation up to date and support ongoing operational...SuggestedFull timeHybrid workImmediate startFlexible hoursSunday
- ...Work collaboratively with a national team across the full project lifecycle including project costing, client engagement, contractor management and bids / tenders. Use your multi-disciplinary project experience and communication skills to mentor and guide junior engineers...SuggestedFull timePart timeFor contractorsHybrid workWork at officeRemote jobHoliday workFlexible hours
- ...professional services throughout the project lifecycle – from advisory, planning, design and engineering to program and construction management. On projects spanning transportation, buildings, water, new energy and the environment, our public- and private-sector clients trust...SuggestedFull timePart timeFor contractorsHybrid workWork at officeRemote jobHoliday workFlexible hours
- ...tools (FortiSIEM and MS Sentinel) to ensure swift identification and resolution of potential threats. ~ Utilise vulnerability management tools such as Tenable and MS Defender to report on vulnerabilities within customer environments and propose appropriate remediation...SuggestedFull time
- ...to assist in the development of the information security architecture and roadmap as well as maximise value for money investment. # Manage stakeholder relationships through effective communication negotiation and issues management to ensure stakeholders are engaged throughout...SuggestedContract work
- ...The role As a Cyber Consultant you will utilise your knowledge experience and stakeholder management skills to deliver Cyber Security and Risk Professional Services projects and tasks. You will perform a key role in the cyber function by conducting risk assessments...SuggestedContract workOnlineFlexible hours
- ...player with excellent knowledge-sharing skills Well-developed technical writing and documentation experience Familiarity with managing and interpreting threat intelligence feeds Desirable: Experience with Splunk SOAR and development of Playbooks Knowledge of...SuggestedHourly payContract workHybrid work
- ...Identifying threats and vulnerabilities arising from the design of ICT systems in the Program; ensuring that they are appropriately managed and mitigated as per the respective systems Security Risk Management Plans Ensuring that system Standard Operating Procedures (SOP...SuggestedFull timeContract workFor contractors
- ...a team. 5. Well-developed writing skills and experience maintaining technical documentation. 6. Experience working with and managing threat intelligence feeds. Desirable criteria 1. Experience using Splunk SOAR to develop Playbooks. 2. Knowledge of Splunk...SuggestedFull time
- ...Work collaboratively with a national team across the full project lifecycle including project costing client engagement contractor management and bids / tenders. Use your multi-disciplinary project experience and communication skills to mentor and guide junior engineers...SuggestedFull timePart timeFor contractorsHybrid workWork at officeRemote jobHoliday workFlexible hours
- ...this pivotal role reporting to the Executive Manager Threat Hunt and Detection Engineering... ...partner with platform owners to validate data quality and coverage for priority signals... ...maintain audit-ready documentation and apply privacy-by-design principles when handling sensitive...SuggestedPermanent employmentFull timeFlexible hoursNight shift
- ...cases to detect potential malicious activity. Experience performing incident response activities. Experience working with and managing threat intelligence feeds. Experience using Splunk SOAR to develop Playbooks. Knowledge of Splunk Risk Based Alerting (RBA)...SuggestedFull timeContract workHybrid workFlexible hours
- ...aid in identification and remediation of cyber security related incidents. YOUR RESPONSIBILITIES Collect of cyber security related data for analysis evaluation and identification of the root of the attacks against the ICT environment and key systems. Implement...SuggestedHourly payContract work
- ...the confidentiality, integrity and availability of our systems and data. With expertise in cyber security principles, technologies, and... ...strategic (Enterprise and Organisation risks) are appropriately managed within the GRC tool through the risk lifecycle About YOU ~ Cyber...SuggestedPermanent employmentFull timeHybrid workFlexible hours
- ...to resolve such gaps. Key responsibilities include: Participate in incident response, continuous monitoring and vulnerability management, and act as a cyber-security technical Subject Matter Expert (SME) for projects Review, build, maintain, and mature cyber security...Permanent employmentFull timeFlexible hours
$116,262 - $127,078
...Protect university systems and data, ensuring a secure digital environment for students and staff. Engage in advanced threat detection, vulnerability management, and cutting-edge cybersecurity practices. Full-time appointment on an ongoing basis. Base salary range:...Full timeOnlineSunday- Cyber Security Professionals – SOC Analysts | Cyber GRC | Incident Responses (NV1–NV2) | Expression of Interest Life Days are the Leidos way of recognising that we all need extra time to take care of life. By working slightly more than the minimum weekly hours (2 hours per...Permanent employmentFull timeOnlineShift work
- ...digital solutions across cloud, collaboration, cyber security, data services and network infrastructure, all backed by over 20 years... ...understanding of cloud, networking, firewalls, ITSM and vulnerability management tools such as Rapid7, Tenable or Qualys Even if you don’t...Hybrid workHoliday workFlexible hours
- ...compliance ensuring the security and integrity of our systems and data. This role will also be responsible for coordinating... ...Support the implementation and documentation of Information Security Management System (ISMS) policies and procedures Lead organisational security...Full timeWork at officeFlexible hours1 day week
$16.7 per hour
...and regulatory awareness to mature the security posture and risk management capabilities of a complex strategic environment. Key... ...and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law. About...Permanent employmentOnlineLocal areaImmediate start- ...Design, deploy and sustain ICT security capabilities across complex environments ~Implement and maintain SIEM, SOAR and vulnerability management platforms ~Support and maintain Windows and Linux infrastructure, including servers and storage ~Troubleshoot operational...Contract workHybrid workFlexible hours
- ...Testing & Assurance Consultant About the client: Our client is a major organisation committed to strengthening vulnerability management and security assurance across complex ICT environments. This role is pivotal in maturing vulnerability assessment processes and optimising...Full timeContract work
- ...gap and compliance audits including reporting and documentation management. Maintain verify and update accreditation documentation sets... ...and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other law. Required...Permanent employmentFull timeLocal area
- ~Exciting opportunity within a Federal Government agency! ~12-month contract with up to 2 x 12-month extensions! ~Location: Canberra, ACT – Hybrid work model - Remote candidates may be considered on a case-by-case basis! A leading Federal Government Department ...Hourly payContract workHybrid workRemote job
- ...opportunity for growth and development with exposure to a broad range of cybersecurity platforms across the various services such as identity data endpoint and networks. Please note that due to the high level of interest in this role only applications that include a cover letter...Full timeHybrid workWork at office
- ...led group of experts helping clients tackle complex technology risks and cyber threats. With deep capabilities in cyber strategy risk management cloud security and incident response the team works across industries to deliver innovative resilient solutions. Be part of a...Full timeWork at officeLocal areaRemote jobFlexible hours
$102,657
...Technology Infrastructure Library (ITIL) Cyber security Office 365 Azure or AWS cloud services Security Information and Event Management (SIEM) software Server administration Networking Requirements This is a Position of Trust Level two (PoT 2). You are...Full timeTemporary workPart timeFixed term contractHybrid workWork at officeImmediate startWork from homeHome officeFlexible hours- ...in extending an offer include (but are not limited to) responsibilities of the job education experience knowledge skills and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other law. Required Experience: IC...Permanent employmentFull timeOnlineShift work
- ...Analyst to support the delivery of our cybersecurity operations portfolio. This role involves working closely with internal teams and managed security service providers to ensure timely identification, response, and remediation of cybersecurity incidents, safeguarding the...Full time