Average salary: $94,900 /yearly
More statsSearch Results: 68 vacancies
$1,000 - $2,000 per day
...that feels good and advised over 230,000 clients on their talent needs. Role: The successful candidate will be an experienced information security architecture specialist with a sound understanding of the Information Security Manual, ACSC Essential Eight Maturity Model,...
Suggested
Full time
Contract work
Flexible hours
...Information Security Architect ( Part time) with baseline security clearance Canberra
# Experience in developing and implementing cyber security strategies particularly in cloud environments including SaaS solutions.
# Experience advising on the use of Artificial...
Suggested
Full time
Part time
...lookout for their next team member.
We value your experience in providing expert advice and guidance to clients with respect to security strategies.
You can solve problems, make recommendations, offer solutions, develop policies, conduct training, and implement solutions...
Suggested
Remote job
Permanent employment
Full time
...Pre-Sales Consultant within Cyber Security Team
To be eligible for our Graduate Program, when submitting your application, you should... ...your degree no later than February 2025
Preferred degree: Information Technology, Cyber Security or Law (Security Preferred)
Role...
Suggested
Contract work
...Willyama Services is seeking a skilled Cloud Security engineer to join our dynamic team.
As a Cloud Security Engineer, you'll have... ...Associate
Certified Cloud Security Professional (CCSP)
Certified Information Systems Security Professional (CISSP)
One or more of the...
Suggested
Permanent employment
Full time
$180 - $220 per hour
ICT Security Systems Engineer and Analytics Specialist - RFQ-ASD-59-2024 - SOW 1 - Original
Due to the nature of clients we work... ...responsible for foreign signals intelligence, cyber warfare and information security. ASD's purpose is to defend Australia from global...
Suggested
For contractors
Flexible hours
...Overview:
The Business Solutions Branch within DFATs Information Management and Technology Division, has a requirement for a labour... ...and implement a strategic architecture plan for a sustainable, secure, and cost-efficient ecosystem of multiple orgs, multiple clouds...
Suggested
Online
Overseas
...to be an Australian Citizen, and be eligible for Baseline/ NV1 Security Clearance **
What You’ll Do
At the moment, as the Senior... ...Compliance with all Datacom Cloud Operational and Information Security Management policies, procedures and processes to ensure...
Suggested
Full time
Work at office
Remote job
Work from home
...enterprise environment.
Strong knowledge of secrets management concepts cryptographic principles security best practices and standards including Federal Government information security policy (i.e. Information Security Manual Protective Security Policy Framework) and the...
Suggested
Remote job
...opportunities do not have the ability to obtain sponsorship for a security clearance (including applicants who currently hold a security... ...for foreign signals intelligence, cyber warfare and information security. ASD's purpose is to defend Australia from global threats...
Suggested
Contract work
For contractors
Flexible hours
...Broadcam Symantec Data Centre Security Engineer with NV1 clearance Canberra/Sydney/Adelaide
Minimum of 3 years experience in the... ...Application Control mitigation strategy and the applicable Information Security Manual (ISM) controls and how to implement them within...
Suggested
Full time
...Minimum 2 days in the office. Flexible working arrangements
Security Clearance: Must have Negative Vetting Level 1
About the Role... ...best practices and standards including Federal Government information security policy (i.e. Information Security Manual, Protective Security...
Suggested
Full time
Contract work
Work at office
Flexible hours
Urgent requirement of Broadcom Data Centre Security Engineer Contract Canberra / Sydney / Brisbane / Adelaide / Melbourne
Requirements... ...Application Control mitigation strategy and the applicable Information Security Manual (ISM) controls and how to implement them within...
Suggested
Full time
Contract work
Immediate start
...opportunities do not have the ability to obtain sponsorship for a security clearance (including applicants who currently hold a security... ...for foreign signals intelligence, cyber warfare and information security. ASD's purpose is to defend Australia from global threats...
Suggested
Contract work
For contractors
Flexible hours
...deliver the technical implementation of a suite of priority cyber security enhancements to support secure credential management.
The... ...best practices and standards including Federal Government information security policy (i.e. Information Security Manual Protective Security...
Suggested
Full time
Contract work
Immediate start
...designing feature enhancements, implementation, and maintenance of a secure secrets management infrastructure using Hashicorp Vault.
*... ...security best practices and standards, including Federal Government information security policy (i.e., Information Security Manual, Protective...
Contract work
Immediate start
...Technical Architect will design Azure solutions on IaaS and PaaS with Security in mind and will be comfortable presenting these solutions to... ...skills (verbal written and listening): an ability to present information concisely to communicate in a manner applicable to all levels...
Full time
Online
Remote job
Relocation
Relocation package
Flexible hours
$1,000 - $2,000 per day
...Designing and Implementing Azure Solutions: Develop scalable, secure, and highly available cloud solutions on the Azure platform.... ...Competence in networking, systems administration, data protection, information security, and CI/CD tooling, and Strong written and verbal communication...
Full time
Part time
Flexible hours
3 days week
1 day week
...Graduate AI and Automation Sec DevOps Engineer with the Cyber Security Team
To be eligible for our Graduate Program, when submitting... ...degree no later than February 2025
Diploma/Certificate/Degree in Information Technology (Security preferred)
Role starting in Feb 2025...
...updates are communicated to relevant parties both formally and informally
Identify practice development activities and help in defining... ...The Employee is required to follow the companys Information Security Policies (ISP and ISMP) at all times
Microsoft Business...
Full time
Relocation
Offshore