Get new jobs by email
- ...Make an impact by using your expertise to protect our country from threats. Job... ...and incidents, reporting as necessary to management Ensures the integrity and protection of... ...develops security policies or plans for data, software applications, hardware, telecommunications...SuggestedOnline
- ...Time opportunity Location - North Sydney, NSW About us Data Zoo provides identity verification data that enables financial... ..., this role is pivotal in strengthening our governance maturity, managing regulatory risk, and reinforcing trust in our identity ecosystem....SuggestedPermanent employmentFull timeWorldwide
$132,236
...Data Governance and Stakeholder Liaison Officer (ID: REQ653322) Employment Type: Health Manager Level 3 – Full Time, Exempt (2 years) Remuneration: $132,236.00 - $150,222.00 per annum, plus 12% superannuation Hours Per Week: 38 Additional Benefits: Generous Flexible...SuggestedPermanent employmentFull timeTemporary workFlexible hoursSunday- ...innovative and integrated financial solutions. Enterprise Risk Management (ERM) is a sub function of HSBC’s Group Risk. Its purpose is to... ...covering specific the risk types of Technology (including Cyber) Risk, Data, Privacy and Information Security Risk. In country risk...SuggestedLocal areaFlexible hours
- ...functionality by proactive monitoring, service and incident response. This is an excellent opportunity for current Service Desk/Incident management candidates who are looking for their next step in their careers toward Network Security and Cyber. You must hold NV1 or NV2 AGSVA...SuggestedFlexible hoursShift work
- ...a large, complex organisation operating in a highly regulated environment, where cyber security plays a critical role in protecting core systems, data and services. The organisation continues to invest in strengthening its cyber operations capability, with a focus on improving...SuggestedHourly payFull timeContract work
- ...Design, deploy and sustain ICT security capabilities across complex environments ~Implement and maintain SIEM, SOAR and vulnerability management platforms ~Support and maintain Windows and Linux infrastructure, including servers and storage ~Troubleshoot operational...SuggestedContract workHybrid workFlexible hours
- ...implementation, and operation of our cyber security practices, protecting our technology systems and information assets. The... ...to, endpoint security, network security, IDS/IPS, data loss prevention, vulnerability management, incident response, threat hunting, identity and...SuggestedPermanent employmentFull timeLocal area
- Urgent requirement of Palo Alto Certified Cyber Security Consultant - Contract - Brisbane Requirements Palo Alto Networks certifications : Cyber Security Professional Next-Generation Firewalls Ability to pass Queensland Police vetting Ability to provide...SuggestedFull timeContract workImmediate start
- ...perspectives to help pioneer progress and protect what matters most. You’ll be trusted to... ...Defence Delivery sits within the Digital, Data and Cyber Security portfolio, delivering... ...to assist in the design and operational management of ICT security systems and associated infrastructure...SuggestedPart time
- ...delivers IT and airborne solutions that protect and advance the Australian way of life. Our... ...the Security Information and Event Management tool, network intrusion systems and Host... ...as internal equity, alignment with market data, applicable bargaining agreement (if any)...SuggestedFull timeOnlineLocal areaFlexible hours
$148,069.48
...Key responsibilities of this role are: Manage escalations from the Security Operations Centre... ...or remediation. Monitor and interpret data received from existing SIEM platforms to... ...in using SIEM tools and endpoint protection platforms (e.g., EDR/EPP) and demonstrated...SuggestedHybrid workFlexible hours- ...security monitoring and incident triage across a diverse enterprise environment, working alongside experienced cyber professionals and managed security service providers. You’ll follow established playbooks, consume threat intelligence, assist with investigations, and build...SuggestedFull timeNo agencyLocal areaFlexible hours
- ...to reduce "noise" and improve response times. Vulnerability Management: Review assessment reports, validate security flaws, and monitor... ...Analytical Rigor: Ability to dissect complex logs and telemetry data to make informed decisions under pressure. Standards Proficiency...Suggested
- ...your unique skills and perspectives to help pioneer progress and protect what matters most. You'll be trusted to play your part in... ...Participate in incident response, continuous monitoring and vulnerability management, and act as a cyber-security technical Subject Matter Expert (...SuggestedPermanent employmentFull timeFlexible hours
- ...hourly rates $$$ A prominent Federal Government agency is seeking an experienced Lead Cyber Security Analyst to support the protection of a global government network, delivering advanced cyber defence, incident response, and security operations functions. The successful...Hourly payContract work
- ...effective assurance. Essential criteria include Experience providing assurance and advisory services across vendor delivered and managed security services, with strong communication skills to engage effectively with technical specialists, senior executives, and...Full timeHybrid work
- ...following: ~Cyber Threat Intelligence, Security Operations or Cyber Security Advisory roles ~Analysing complex cyber security data and producing intelligence or risk reporting ~Stakeholder engagement in complex enterprise or government environments ~Working with...Contract work
- Job details Posted18 March 2026 SalaryNegotiable LocationCanberra Job type Contract Discipline Cloud & Infrastructure Reference90M0703621_1773789232 Job description Location: Canberra ACT Initial 12 months contract + 2 X 12 months extension options ...Contract work
- ...regulated ICT environment where strong cyber governance and risk management are essential to business continuity and trust. Your new... ...activities in line with the Information Security Manual (ISM) and Protective Security Policy Framework (PSPF) Developing and maintaining...Contract work
- ...up-to-date knowledge of emerging cyber threats and industry trends. Key focus areas include: Multi-Factor Authentication (MFA) Data Loss Prevention (DLP) Network Security Security Governance Microsoft Entra ID The Successful Applicant A successful Cyber Security...Daily paidFull timeTemporary work
- ...Protect critical infrastructure while making a meaningful impact Work in a collaborative, experienced team with modern tools and varied, engaging work Brisbane or Melbourne based Join a team that's All Kinds of Useful At Origin, being useful is more than a tagline...Hybrid work
