Search Results: 14 vacancies
...engineering-focused team that seeks to stay on the cutting edge of security technology and the threat landscape.
Okta’s Identity Defense Operations (IDO) organization is expanding our team dedicated to identifying attacks against our customers, developing best practices...
Suggested
Online
Remote job
Flexible hours
...do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're making a difference every day-working for a safer, healthier, and more secure nation and world....
Suggested
Hybrid work
Shift work
...do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. We're making a difference every day-working for a safer, healthier, and more secure nation and world....
Suggested
Work at office
Online
Hybrid work
Shift work
...frameworks designed to withstand advanced cyber threats.
Enough about us, let's talk about you.
Your skills in offensive, defensive, security testing, cyber strategies, identity and access management, threat intelligence, digital forensics, and protecting data...
Suggested
Full time
Freelance
Flexible hours
...safety and the environment
~Equal Opportunity Employer – Indigenous candidates are encouraged to apply
~Established ex-Defense Force Alumni providing ongoing support and mentoring
~Ongoing mentoring and guidance from outstanding industry leaders and...
Suggested
Permanent employment
Full time
For contractors
Night shift
Day shift
Working Monday to Friday
...flexible start and finish times
Qualifications
About You and What You'll Bring
Demonstrated experience:
Working in defensive security operations roles, ideally in large enterprise environments
Leading teams
Developing and mentoring staff
Common...
Suggested
Permanent employment
Full time
Remote job
Work from home
Home office
Flexible hours
Shift work
Working Monday to Friday
...effectively tailor communication and communication style
perform high level research, complex analysis and problem solving to form defensible conclusions based on clear evidence
develop and manage key strategic relationships with a broad range of internal and external...
Suggested
Contract work
...experience managing/maintaining logging and SIEM technologies
2. Demonstrated knowledge of cyber security principles and processes in a defensive context
3. Demonstrated ability to develop alerting rules and dashboards to assist with threat detection and incident response....
Suggested
Contract work
...together – Today the modern enterprise is an Enterprise of Things. We are on a mission to secure the Enterprise of Things with active defense by identifying, segmenting, and enforcing compliance of every connected thing in a real-time and at scale. Our unified security...
Suggested
Online
Worldwide
...quickly gain knowledge of in a range of technologies
~Mentor and develop junior staff, and identify areas of people, process, and defensive tool improvement
Please note due to the nature of work only AUSTRALIAN CITIZEN who are willing to obtain NV1 are considered for this...
Suggested
Contract work
...and Compliance (GRC) requirements across all IT/OT areas.
Additionally youll provide technical leadership in the overall Cyber Defense by ensuring Security Design & Architecture Security Operations Incident Response Forensics Penetration Testing Network Systems and Application...
Suggested
Full time
Online
Relocation
Hybrid work
...remediation efforts.
Stay informed about the latest cybersecurity threats vulnerabilities and industry trends to inform proactive defense strategies.
Australian Citizen with baseline clearance
#splunk #cloud #soar #soc #australiancitizen #dashboard #canberra...
Suggested
Full time
...cyber threat intelligence, threat hunting, and vulnerability management activities
Desirable criteria
1. Experience with cloud defensive tools, such as Microsoft 365 Defender, Sentinel, AWS GuardDuty, and Splunk Cloud
2. Strong knowledge of incident response...
Suggested
Contract work
...to quickly gain knowledge of in a range of technologies
Mentor and develop junior staff, and identify areas of people, process, and defensive tool improvement
Essential Criteria
Graduated with relevant cyber security qualifications, and a few years' experience (3-6...
Suggested
Contract work
Immediate start
Hybrid work