Average salary: $150,000 /yearly
More statsSearch Results: 176 vacancies
...Australian Citizens residing in Australia only respond. Must have NV1.
Essential criteria
Conduct Threat Assessments as required
Create Cyber Threat Intelligence products
Perform assessments of vulnerabilities when new CVEs are
announced
Perform business impact...
Suggested
Remote job
...Rewarding hourly rate! $$$$
One of Australia's leading Federal Government departments are looking to engage a Cyber Vulnerability and Threat Analystto work as part of an experienced and skilled team. The successful Cyber Vulnerability and Threat Analystwill deliver threat...
Suggested
Hourly pay
Contract work
...Power Protect is a vital business owned and operated through BGIS, which provides installation and maintenance services to critical power equipment for customers in a variety of industries.
Our team support Uninterrupted Power Supplies, DC Power Systems, Automatic Transfer...
Suggested
Full time
Flexible hours
...was founded on May 29 1933 and is headquartered in Dhahran Saudi Arabia.
Job Summary
We are seeking an experienced Radiation Protection Consultant to join our Environmental Protection Department. This role is essential in guiding and improving our operations related...
Suggested
Full time
Relocation
...role required candidate to permanently relocate at Dhahran Saudi Arabia.
Hold a bachelors degree in chemical engineering or fire protection engineering
Possess 10 years of relevant industry experience in oil and gas petrochemicals or related industries with a focus...
Suggested
Full time
Relocation
...console and are powered by Sophos X-Ops, the company's cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the... ...and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share...
Suggested
Remote job
Full time
Local area
Worldwide
Hybrid work
Weekend work
...critical role in ensuring that solutions are resilient against cyber threats, align with regulatory requirements, and adhere to industry best... ..., resilient, and compliant solutions that mitigate risks and protect sensitive information.
#Policy and Principle Establishment:...
Suggested
Hourly pay
...designing, implementing and maintaining robust security solutions to protect the Client's data and systems. The person in this role will work... ...to mitigate risks.
Stay up-to-date on the latest security threats, trends, and technologies.
Develop and maintain security policies...
Suggested
Contract work
Work at office
Immediate start
...level.
* Migrate digital in-flight manuals for the Air Force onto the PROTECTED Enterprise platform.
* Replace current logistics scanner devices with secure and supportable mobile devices.
* Analyze threat data and provide risk mitigation feedback for commercial/personal...
Suggested
Contract work
Temporary work
Work at office
Immediate start
...console and are powered by Sophos X-Ops, the company's cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the... ...and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share...
Suggested
Remote job
Full time
Local area
Worldwide
Hybrid work
...domains: Cyber Strategy, Architecture & Engineering, Cyber Risk Management, Cyber Threat Detection & Response, Cyber Threat Exposure Management, Identity & Access Management, Data Protection, Infrastructure Security, Privacy, Cyber Resilience and Breach Support.
Experience...
Suggested
Hybrid work
...console and are powered by Sophos X-Ops, the company's cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the... ...and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share...
Suggested
Remote job
Full time
Temporary work
Local area
Worldwide
Hybrid work
...ICT Security Engineer to join their team and contribute to the protection of critical systems. As an ICT Security Engineer, you will play... ..., and GCP.
# Tactical, operational, and strategic level cyber threat intelligence skills.
# Familiarity with threat modelling methodologies...
Suggested
Full time
...Operating Procedures (SOPs):
~ Develop and maintain SOPs for operations, including network security, endpoint protection, vulnerability management, and threat intelligence.
Operating Frameworks:
Assist with the development of a Cybersecurity Plan, a...
Suggested
Remote job
Contract work
Work at office
Home office
...Network Security Engineer to join their team and contribute to the protection of critical infrastructure. As an ICT Network Security Engineer... ...by identifying vulnerabilities, weaknesses, and potential threats.
# Experience in performing architecture reviews to identify security...
Suggested
Full time
...ICT Security Specialist is responsible under broad direction to protect ASD systems and information, meet domestic and international policies... ...security. ASD's purpose is to defend Australia from global threats and help advance our national interests.
Situated in Canberra...
Contract work
For contractors
Flexible hours
$100 per hour
...Standard Operating Procedures (SOPs):
Develop and maintain SOPs for operations, including network security, endpoint protection, vulnerability management, and threat intelligence.
Operating Frameworks:
Assist with the development of a Cybersecurity Plan, a Cybersecurity...
Hourly pay
Contract work
Immediate start
...Technical Security Specialist to join their team and contribute to the protection of our applications and systems. Your responsibilities will... ....
Incident response, including reverse engineering and threat hunting.
# Excellent problem-solving skills and the ability...
Full time
...toughest challenges in government, defence, intelligence and border protection. We’re robust and ambitious, and we empower our people to do... ...improve environment security posture to meet current and emerging threats, and will proactively work with other areas of the team to...
Permanent employment
Full time
Contract work
Local area
Flexible hours
...established network practices
In configuring and utilising computer protection components (e.g. hardware firewalls, servers, routers, as... ...environments.
Tactical, operational, and strategic level cyber threat intelligence skills.
Understanding of current challenges and opportunities...
Contract work
Temporary work
Work at office
Immediate start