Get new jobs by email
- ...through continuous security monitoring and controls. Respond to incidents following established Cyber Incident Response procedures. Manage service requests capacity planning and vendor coordination. Keep documentation up to date and support ongoing operational...SuggestedFull timeHybrid workImmediate startFlexible hoursSunday
- ...Make an impact by using your expertise to protect our country from threats. Job... ...and incidents, reporting as necessary to management Ensures the integrity and protection of... ...develops security policies or plans for data, software applications, hardware, telecommunications...SuggestedOnline
- ...Work collaboratively with a national team across the full project lifecycle including project costing, client engagement, contractor management and bids / tenders. Use your multi-disciplinary project experience and communication skills to mentor and guide junior engineers...SuggestedFull timePart timeFor contractorsHybrid workWork at officeRemote jobHoliday workFlexible hours
- ...professional services throughout the project lifecycle – from advisory, planning, design and engineering to program and construction management. On projects spanning transportation, buildings, water, new energy and the environment, our public- and private-sector clients trust...SuggestedFull timePart timeFor contractorsHybrid workWork at officeRemote jobHoliday workFlexible hours
- ...resolution of potential threats. ~ Utilise vulnerability management tools such as Tenable and MS Defender to report on... ...Familiarity with IDS/IPS, EDR Solutions, cloud technologies and endpoint protection. ~ Knowledge of network protocols, security architectures...SuggestedFull time
- ...to assist in the development of the information security architecture and roadmap as well as maximise value for money investment. # Manage stakeholder relationships through effective communication negotiation and issues management to ensure stakeholders are engaged throughout...SuggestedContract work
- ...Consultant you will utilise your knowledge experience and stakeholder management skills to deliver Cyber Security and Risk Professional Services... ...and defining Saabs internal project activities to help protect and improve Saabs information security posture and competitive advantage...SuggestedContract workOnlineFlexible hours
- ...Identifying threats and vulnerabilities arising from the design of ICT systems in the Program; ensuring that they are appropriately managed and mitigated as per the respective systems Security Risk Management Plans Ensuring that system Standard Operating Procedures (SOP...SuggestedFull timeContract workFor contractors
- ...player with excellent knowledge-sharing skills Well-developed technical writing and documentation experience Familiarity with managing and interpreting threat intelligence feeds Desirable: Experience with Splunk SOAR and development of Playbooks Knowledge of...SuggestedHourly payContract workHybrid work
- ...a team. 5. Well-developed writing skills and experience maintaining technical documentation. 6. Experience working with and managing threat intelligence feeds. Desirable criteria 1. Experience using Splunk SOAR to develop Playbooks. 2. Knowledge of Splunk...SuggestedFull time
- ...Work collaboratively with a national team across the full project lifecycle including project costing client engagement contractor management and bids / tenders. Use your multi-disciplinary project experience and communication skills to mentor and guide junior engineers...SuggestedFull timePart timeFor contractorsHybrid workWork at officeRemote jobHoliday workFlexible hours
- ...this pivotal role reporting to the Executive Manager Threat Hunt and Detection Engineering youll be at the forefront of protecting Australias digital future. A bit about your... ...you partner with platform owners to validate data quality and coverage for priority signals and...SuggestedPermanent employmentFull timeFlexible hoursNight shift
- ...detection rules that keep our customers protected. If you enjoy solving problems, exploring... ...across cloud, collaboration, cyber security, data services and network infrastructure, all... ..., firewalls, ITSM and vulnerability management tools such as Rapid7, Tenable or Qualys...SuggestedHybrid workHoliday workFlexible hours
- ...security and integrity of our systems and data. This role will also be responsible for... ...and documentation of Information Security Management System (ISMS) policies and procedures... ...protocols firewalls IDS/IPS and endpoint protection tools (Microsoft Defender CrowdStrike etc...SuggestedFull timeWork at officeFlexible hours1 day week
$16.7 per hour
...delivers IT and airborne solutions that protect and advance the Australian way of life. Our... ...to mature the security posture and risk management capabilities of a complex strategic environment... ...internal equity, alignment with market data, applicable bargaining agreement (if any)...SuggestedPermanent employmentOnlineLocal areaImmediate start- ...skills and conduct defensive cyber security operations ensuring protection of their global network. As the Principal Cyber Security... ...incident response activities. Experience working with and managing threat intelligence feeds. Experience using Splunk SOAR to...Full timeContract workHybrid workFlexible hours
- ...aid in identification and remediation of cyber security related incidents. YOUR RESPONSIBILITIES Collect of cyber security related data for analysis evaluation and identification of the root of the attacks against the ICT environment and key systems. Implement...Hourly payContract work
- ...the confidentiality, integrity and availability of our systems and data. With expertise in cyber security principles, technologies, and... ...strategic (Enterprise and Organisation risks) are appropriately managed within the GRC tool through the risk lifecycle About YOU ~ Cyber...Permanent employmentFull timeHybrid workFlexible hours
- ...in incident response, continuous monitoring and vulnerability management, and act as a cyber-security technical Subject Matter Expert (SME... ...mature cyber security capabilities to ensure the company is protected against existing and developing threats Participate in internal...Permanent employmentFull timeFlexible hours
$116,262 - $127,078
...Protect university systems and data, ensuring a secure digital environment for students and staff. Engage in advanced threat detection, vulnerability management, and cutting-edge cybersecurity practices. Full-time appointment on an ongoing basis. Base salary range...Full timeOnlineSunday- ...to the nature of the role, you must be an Australian Citizen and hold an active NV1- NV2 security clearance. Do work that matters. Protect Australia’s digital frontlines. At Leidos Australia, we’re professionals who thrive on tackling complex challenges and delivering...Permanent employmentFull timeOnlineShift work
- ...delivers IT and airborne solutions that protect and advance the Australian way of life .... ...audits including reporting and documentation management. Maintain verify and update... ...as internal equity alignment with market data applicable bargaining agreement (if any)...Permanent employmentFull timeLocal area
- ...Testing & Assurance Consultant About the client: Our client is a major organisation committed to strengthening vulnerability management and security assurance across complex ICT environments. This role is pivotal in maturing vulnerability assessment processes and optimising...Full timeContract work
- ...Cyber Security Analyst (Principal Cyber Security Analyst) to join its high-performing Cyber Operations Section. This is a critical role protecting a global network from malicious actors and contributing to national cyber resilience. The successful candidate will be offered a 12-...Hourly payContract workHybrid workRemote job
- Job Description Cyber Security GRC Consultant Government & Regulated Environments About the client: Our client is a major organisation committed to strengthening ICT security and compliance across complex environments. This role is pivotal in delivering robust governance...Full timeContract work
- ...departments is looking to engage a Public Key Infrastructure (PKI) Cybersecurity Analyst to lead the enhancement of digital identity management, cryptographic resilience, and secure authentication mechanisms across government systems. The successful PKI Cybersecurity Analyst...Hourly payContract workFlexible hours
$113,022 - $136,747
...Security Analyst will work closely with the Manager, Enterprise Cybersecurity GRC and... ...Compliance function. This role supports the protection of critical health information and services... ...security frameworks e.g. Victorian Protective Data Security Standards, Essential 8, NIST....Full timeFixed term contractSeasonal workFlexible hoursShift work- ...Design, deploy and sustain ICT security capabilities across complex environments ~Implement and maintain SIEM, SOAR and vulnerability management platforms ~Support and maintain Windows and Linux infrastructure, including servers and storage ~Troubleshoot operational...Contract workHybrid workFlexible hours
- ...led group of experts helping clients tackle complex technology risks and cyber threats. With deep capabilities in cyber strategy risk management cloud security and incident response the team works across industries to deliver innovative resilient solutions. Be part of a...Full timeWork at officeLocal areaRemote jobFlexible hours
- ...opportunity for growth and development with exposure to a broad range of cybersecurity platforms across the various services such as identity data endpoint and networks. Please note that due to the high level of interest in this role only applications that include a cover letter...Full timeHybrid workWork at office