Get new jobs by email
$120,000 - $130,000
...As a Data Governance Officer, you will play a pivotal role in implementing and administering a robust data governance framework. Working... ...risk and compliance while contributing to a major information management program.What You Will Do: Support the implementation and...SuggestedFull timeFor contractors- ...leadership - shaping ethical, compliant use of data and emerging technologies Your new... ...team. As the Group Regional Data Protection Officer APAC, you will act as the key data... ...and aligned. Oversee regional risk management, including DPIAs, LIAs, IDTAs, breach response...SuggestedPermanent employmentFull timeWork at office
$171,261 - $173,174
...Policy Manager– talent pool Policy, Reform and Legislation Law Reform and Legal Services Apply now and join Australia’s top public sector employer where we will support you and provide an exciting and flexible working environment! Talent Pool Recruitment for ongoing...SuggestedTemporary workFlexible hoursSunday$121,185
...make a splash in your career? WaterNSW is seeking an experienced Data Governance & Quality Officer (full-time, permanent) to join our... ...Bachelor’s degree in a relevant discipline such as Information Management, Data Science, Computer Science, Information Systems, or a related...SuggestedPermanent employmentFull timeHybrid workWork at officeRemote jobFlexible hours- ...Make an impact by using your expertise to protect our country from threats. Job... ...and incidents, reporting as necessary to management Ensures the integrity and protection of... ...develops security policies or plans for data, software applications, hardware, telecommunications...SuggestedOnline
- ...Time opportunity Location - North Sydney, NSW About us Data Zoo provides identity verification data that enables financial... ..., this role is pivotal in strengthening our governance maturity, managing regulatory risk, and reinforcing trust in our identity ecosystem....SuggestedPermanent employmentFull timeWorldwide
- ...resolution of potential threats. ~ Utilise vulnerability management tools such as Tenable and MS Defender to report on... ...Familiarity with IDS/IPS, EDR Solutions, cloud technologies and endpoint protection. ~ Knowledge of network protocols, security architectures...SuggestedFull time
- ...experience providing L2 SOC Analyst Incident Response. ~ Proven experience co-ordinating incident investigation and response activities, managing escalated cases end-to-end. ~ Exposure to proactive threat hunting and advanced attacker techniques (e.g., APTs, ransomware, BEC)....SuggestedPermanent employmentFull timeWork from homeSunday
$165,000 - $180,000
...systems on the Program to ensure risks to the confidentiality, integrity or availability of those ICT systems and their information are managed as per Defence Security requirements. ~ Identifying threats and vulnerabilities arising from the design of ICT systems in the...SuggestedPermanent employmentFull time- ...become part of a global team of over 50,000 planners, designers, engineers, scientists, digital innovators, program and construction managers and other professionals delivering projects that create a positive and tangible impact around the world. We're one global team driven...SuggestedFull timePart timeFor contractorsHybrid workWork at officeLocal areaRemote jobWorldwideHoliday workFlexible hours
- ...foundation or ISC2 CC are also acceptable An understanding of core cyber security principles (CIA triad, defence-in-depth), basic risk management concepts and control-based security frameworks Exposure to cyber security assessments, IT audits, Governance, risk and compliance...SuggestedPermanent employmentFull timeOnlineFlexible hours
- ...to reduce "noise" and improve response times. Vulnerability Management: Review assessment reports, validate security flaws, and monitor... ...Analytical Rigor: Ability to dissect complex logs and telemetry data to make informed decisions under pressure. Standards Proficiency...Suggested
- ...Design, deploy and sustain ICT security capabilities across complex environments ~Implement and maintain SIEM, SOAR and vulnerability management platforms ~Support and maintain Windows and Linux infrastructure, including servers and storage ~Troubleshoot operational...SuggestedContract workHybrid workFlexible hours
- ...Cyber Security Analyst (Principal Cyber Security Analyst) to join its high-performing Cyber Operations Section. This is a critical role protecting a global network from malicious actors and contributing to national cyber resilience. The successful candidate will be offered a 12-...SuggestedHourly payContract workHybrid workRemote job
- ...advanced threats, employing proactive and reactive countermeasures to protect the IAG environment from sophisticated cyber-attacks. This is a... ...), EDR (CrowdStrike), Purview and ServiceNow. Experience managing incidents in SaaS/IaaS cloud environments. Skilled in Python,...SuggestedPermanent employmentFull timeWork from homeHoliday work
- ...support our clients on their cyber risk management journey. With Investment From AXA Group... ...identify developing patterns and trends in data Strong verbal and written... ...status, religion, disability, or any other protected characteristic. At AXA XL, we know that an...Local areaFlexible hours
- Urgent requirement of Palo Alto Certified Cyber Security Consultant - Contract - Brisbane Requirements Palo Alto Networks certifications : Cyber Security Professional Next-Generation Firewalls Ability to pass Queensland Police vetting Ability to provide...Full timeContract workImmediate start
- ...implementation and maintenance of key security services, contributing to the protection of HAMBS systems and infrastructure. Key Responsibilities... ...as to their likely impact. Support the Cyber Security Manager in implementing HAMBS Cyber Security Strategy. Ensure cyber...Full timeContract workOnlineRemote jobFlexible hours
- ...implementation, and operation of our cyber security practices, protecting our technology systems and information assets. The... ...to, endpoint security, network security, IDS/IPS, data loss prevention, vulnerability management, incident response, threat hunting, identity and...Permanent employmentFull timeLocal area
$99,734 - $116,343
...In this role, you'll help the agency protect, detect, and respond to cyber security threats... ...Monitoring security alerts and analysing data to identify threats or unusual activity... ...awareness initiatives across the agency Managing and configuring security tools such as EDR...Permanent employmentFull timeHybrid workFlexible hours- ...-day security operations such as helping protect student, staff and parent information.... ...remediation activities with ICT, Infrastructure, Data/DevOps and external SOC/MDR partners.... ...and operate within ITIL-aligned service management processes. Contribute to threat detection...Full timeHybrid workOnlineFlexible hours
- ...delivers IT and airborne solutions that protect and advance the Australian way of life. Our... ...the Security Information and Event Management tool, network intrusion systems and Host... ...as internal equity, alignment with market data, applicable bargaining agreement (if any)...Full timeOnlineLocal areaFlexible hours
- ...delivers IT and airborne solutions that protect and advance the Australian way of life.... ...to mature the security posture and risk management capabilities of a complex strategic environment... ...internal equity, alignment with market data, applicable bargaining agreement (if any)...Permanent employmentHybrid workOnlineLocal areaImmediate startFlexible hours
- ...Cyber Security, Controls, Automation and Control Systems, and Protective Security Consultancy & Engineering. The Australia & New Zealand... ...will be regarded. ~ Exposure to SESA activities including managing hazard logs and requirements traceability and verification. ~...Permanent employmentFlexible hours
- ...impact. What you’ll be doing Leading day‑to‑day cyber security operations across Australia, ensuring our environment is monitored, protected, and well‑defended. Monitoring and triaging security alerts across networks, endpoints, identities, applications, and cloud...Full time
$119,423
...About The Role The Cyber Security Analyst role leads the protection of Council’s systems, data, and digital assets by driving organisation‑wide cyber... ...testing, and provide expert guidance on enterprise risk. Manage core security tools and monitor, investigate, and respond...Permanent employmentFull timeOnlineFlexible hours- ...program consists of AIR6500-1 Joint Battle Management System, AIR6502-1 Medium Range Ground... ...of : Australian Government cyber and protective security requirements in the Information... ...experience, skills, internal equity, market data, applicable collective bargaining agreements...Hourly payContract workLocal area
- ...Role in the Information System Security Management Plan under the GEO SPACES contract. Your... ...with the Australian Government Protective Security Policy Framework (PSPF), Information... ...to manage large volumes of non-standard data formats and the IT security challenges these...Contract workLocal areaImmediate start
$90,000 - $120,000
...environments and implementing best-in-class solutions. This role will play a key part in building, maturing, and running the vulnerability management programme, working closely with internal engineering teams and external partners. Ready to take the lead in securing complex...Hybrid workShift work- ...following: ~Cyber Threat Intelligence, Security Operations or Cyber Security Advisory roles ~Analysing complex cyber security data and producing intelligence or risk reporting ~Stakeholder engagement in complex enterprise or government environments ~Working with...Contract work