Average salary: $114,139 /yearly
More statsSearch Results: 160 vacancies
...Australian Citizens residing in Australia only respond. Must have NV1.
Essential criteria
Conduct Threat Assessments as required
Create Cyber Threat Intelligence products
Perform assessments of vulnerabilities when new CVEs are
announced
Perform business impact...
Suggested
Remote job
...was founded on May 29 1933 and is headquartered in Dhahran Saudi Arabia.
Job Summary
We are seeking an experienced Radiation Protection Consultant to join our Environmental Protection Department. This role is essential in guiding and improving our operations related...
Suggested
Full time
Relocation
...role required candidate to permanently relocate at Dhahran Saudi Arabia.
Hold a bachelors degree in chemical engineering or fire protection engineering
Possess 10 years of relevant industry experience in oil and gas petrochemicals or related industries with a focus...
Suggested
Full time
Relocation
...console and are powered by Sophos X-Ops, the company's cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the... ...and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share...
Suggested
Remote job
Full time
Local area
Worldwide
Hybrid work
Weekend work
...critical role in ensuring that solutions are resilient against cyber threats, align with regulatory requirements, and adhere to industry best... ..., resilient, and compliant solutions that mitigate risks and protect sensitive information.
#Policy and Principle Establishment:...
Suggested
Hourly pay
...designing, implementing and maintaining robust security solutions to protect the Client's data and systems. The person in this role will work... ...to mitigate risks.
Stay up-to-date on the latest security threats, trends, and technologies.
Develop and maintain security policies...
Suggested
Contract work
Work at office
Immediate start
...console and are powered by Sophos X-Ops, the company's cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the... ...and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share...
Suggested
Remote job
Full time
Local area
Worldwide
Hybrid work
...level.
* Migrate digital in-flight manuals for the Air Force onto the PROTECTED Enterprise platform.
* Replace current logistics scanner devices with secure and supportable mobile devices.
* Analyze threat data and provide risk mitigation feedback for commercial/personal...
Suggested
Contract work
Temporary work
Work at office
Immediate start
...console and are powered by Sophos X-Ops, the company's cross-domain threat intelligence unit. Sophos X-Ops intelligence optimizes the... ...and selection process to support you, please let us know.
Data Protection
If you choose to explore an opportunity, and subsequently share...
Suggested
Remote job
Full time
Temporary work
Local area
Worldwide
Hybrid work
...domains: Cyber Strategy, Architecture & Engineering, Cyber Risk Management, Cyber Threat Detection & Response, Cyber Threat Exposure Management, Identity & Access Management, Data Protection, Infrastructure Security, Privacy, Cyber Resilience and Breach Support.
Experience...
Suggested
Hybrid work
...ICT Security Engineer to join their team and contribute to the protection of critical systems. As an ICT Security Engineer, you will play... ..., and GCP.
# Tactical, operational, and strategic level cyber threat intelligence skills.
# Familiarity with threat modelling methodologies...
Suggested
Full time
...Operating Procedures (SOPs):
~ Develop and maintain SOPs for operations, including network security, endpoint protection, vulnerability management, and threat intelligence.
Operating Frameworks:
Assist with the development of a Cybersecurity Plan, a...
Suggested
Remote job
Contract work
Work at office
Home office
...Network Security Engineer to join their team and contribute to the protection of critical infrastructure. As an ICT Network Security Engineer... ...by identifying vulnerabilities, weaknesses, and potential threats.
# Experience in performing architecture reviews to identify security...
Suggested
Full time
...ICT Security Specialist is responsible under broad direction to protect ASD systems and information, meet domestic and international policies... ...security. ASD's purpose is to defend Australia from global threats and help advance our national interests.
Situated in Canberra...
Suggested
Contract work
For contractors
Flexible hours
$100 per hour
...Standard Operating Procedures (SOPs):
Develop and maintain SOPs for operations, including network security, endpoint protection, vulnerability management, and threat intelligence.
Operating Frameworks:
Assist with the development of a Cybersecurity Plan, a Cybersecurity...
Suggested
Hourly pay
Contract work
Immediate start
...Technical Security Specialist to join their team and contribute to the protection of our applications and systems. Your responsibilities will... ....
Incident response, including reverse engineering and threat hunting.
# Excellent problem-solving skills and the ability...
Full time
$126,000 - $171,000
...The Organisation
The Australian Security Intelligence Organisation (ASIO) protects Australia and Australians from threats to their security. In a complex, challenging and changing security environment, our success is built on the imagination and intelligence of our team...
Full time
Work at office
Online
Work from home
Relocation
Relocation package
Flexible hours
Sunday
...established network practices
In configuring and utilising computer protection components (e.g. hardware firewalls, servers, routers, as... ...environments.
Tactical, operational, and strategic level cyber threat intelligence skills.
Understanding of current challenges and opportunities...
Contract work
Temporary work
Work at office
Immediate start
...Systems and Application Security Risk Management Red Teaming Emerging Threat Analysis and Intelligence Security Automation Data Analytics &... ....
Provide training on security awareness.
Ensure protection of critical information and infrastructure.
Provide expertise...
Full time
Online
Relocation
Hybrid work
...and grow.
About the Role (your why)
With the ever-emerging threat on IT systems it is imperative Datacom continue to grow our Cyber... ...ensure adherence to Information Security Manual (ISM) and The Protective Security Policy Framework (PSPF)
On-going auditing, monitoring...
Full time
Contract work
Remote job
Work from home