Average salary: $132,298 /yearly
More statsGet new jobs by email
- ...do attitude. Together were strong and resilient and we work hard to make sure were always at our best. The Cyber Security Vulnerability Manager is responsible for leading and evolving the vulnerability management program across the Qantas Group. This role ensures the identification...SuggestedPermanent employmentFull timeWork at officeRemote jobHoliday workFlexible hours
- ...Job Expectations A fantastic opportunity has presented itself for a Cyber Security Vulnerability Operations Manager reporting to the Senior Manager Threat Intelligence and Vulnerability Operations where you will join the Cyber Security Practice team. A bit...SuggestedPermanent employmentFull timeFlexible hours
$75,000 - $95,000
...Pacheco ROLES AND RESPONSIBILITIES ~Analyze business processes, policies, and other relevant artefacts to gather information management requirements. ~Assess business systems for their information management capabilities....SuggestedPermanent employment$130,000 - $155,000
...Brisbane CBD | Permanent | 9 Day Fortnight Your new company We're partnering with a leading organisation to find a Resilience Manager who combines technical credibility with business acumen. This is not just about frameworks-it's about making resilience real,...SuggestedPermanent employmentFull timeHybrid workWork at officeFlexible hours- ...mappings Produce visual models such as process flows sequence diagrams and architecture diagrams Use Jira or Azure DevOps (ADO) to manage user stories documentation and sprint progress Required Experience Expertise in translating features into detailed testable...SuggestedPermanent employmentFull time
- ...through continuous security monitoring and controls. Respond to incidents following established Cyber Incident Response procedures. Manage service requests capacity planning and vendor coordination. Keep documentation up to date and support ongoing operational...SuggestedFull timeHybrid workImmediate startFlexible hoursSunday
- ...security violations and incidents, reporting as necessary to management Ensures the integrity and protection of networks, systems,... ...enforcement of organizational security policies, through monitoring of vulnerability scanning devices Implements, enforces, communicates, and...SuggestedOnline
- Where critical infrastructure meets real-world digital engineering. This role sits at the intersection of Operational Technology and enterprise digital systems. As our OT Application Architect you will be designing the application layer that supports a 24/7 safety-critical...SuggestedFull timeContract workRemote job1 day week
- ...security clearance (ITAR Requirement) We’re seeking an experienced Information Security Officer to support the protection and compliant management of Classified Information within a leading Defence-sector organisation. In this role , you’ll help safeguard sensitive...SuggestedPermanent employmentFull time
- ...Location: Perth, Australia Company: Webuild S.p.A. We are looking for expressions of interest for an experienced Cyber Security Manager to join the IT Security Team in Perth on an upcoming power project based in the South of Perth! In this role, you will effectively...SuggestedImmediate startRemote jobFlexible hours
- ...ideal candidate will be able to conduct penetration testing and vulnerability assessments with minimum supervision. This role requires a... ...Penetration Testing Wireless Penetration Testing Mobile Device Management (MDM) / Endpoint Review GenAI (Chatbots) Penetration...SuggestedTemporary workOnlineLocal areaFlexible hours
- ...) in the security industry, the consultant is responsible for managing the entire lifecycle of offensive security engagements, from initial... ...(e.g., Python scripting). Produce detailed reports on vulnerabilities, risk ratings, impacts, remediation steps, and technical...SuggestedRemote jobFull time
- ...specifications and recommends actions. Ensures relevant technical strategies, policies, standards and practices (including security and cost management) are applied correctly. DESN5 Designs large or complex systems and undertakes impact analysis on major design options and trade-...SuggestedContract workFor contractorsOnlineFlexible hours
$150,000
...This role provides the opportunity to conduct high-impact security assessments for enterprise clients across Australia, identifying vulnerabilities before attackers can exploit them. If you're an OSCP or CREST-certified Penetration Tester looking for the next step in your...SuggestedPermanent employmentHybrid work- ...complex infrastructure traditional and specialized environments. The successful candidate will not only identify and exploit vulnerabilities but must also translate complex technical findings into clear high-quality deliverables. This involves authoring both detailed technical...SuggestedFull timeRemote job1 day week
- ...opportunities Competitive rewards and benefits Flexible working options About the Role As the ICT and Cyber Security Manager, you will lead a high-performing team responsible for delivering the Network and Security stream across the Enhanced Defence High Frequency...OnlineRemote jobWork from homeFlexible hours
- ...complex technology landscapes drive large-scale transformations and enhance user experiences. As expectations for identity and access management solutions grow we are committed to providing cutting-edge services in Identity Governance and Administration (IGA) Privileged Access...Full timeHybrid workHoliday workFlexible hours
- This position is 100% remote, with flexible daily/weekly hours (part-time). We’re looking for a Software Architect contractor with strong expertise in composable modular architecture and event-driven design to support the next evolution of Sharewise: our marketplace...Full timePart timeFor contractorsRemote jobFlexible hours
- ...Australian Defence Force (ADF) to effectively plan prepare execute manage and report on aviation operations. The IT Security Officer... .... Lead incident response planning continuous monitoring and vulnerability management. Provide guidance and training to project teams...Permanent employmentFull timeOnlineLocal area
$70,000
...Responsibilities Identify and review emerging cyber threats and implement effective mitigation strategies. Advise and challenge change management and project activities that impact the Bank’s security posture. Conduct real-time monitoring, analysis, and triage of security...- ~ Exciting opportunity within a Federal Government agency! ~ Initial 12-month contract with 2 x 12-month extensions! ~Onsite role – Canberra location! A leading Federal Government Department is seeking an experienced Application Architect to deliver secure, modern...Hourly payContract workOnline
- ...diversity, leading technology, and measurable impact into its operations. With expertise spanning digital customer experiences, service management, integration, AI, cloud computing, and more, the company delivers vendor-agnostic and outcome-driven solutions. Trusted by...
- ...Project Delivery Oversee end-to-end solution delivery ensuring solution architecture integrity is maintained throughout. Identify and manage technical risk align to client-change control and proactively inspect solutions to maintain architecture integrity. Key Skills &...Full timeHybrid workFlexible hours
- ...consulting. We enable clients in more than 56 countries to navigate their digital transformation. With over three decades of experience in managing the systems and workings of global enterprises, we expertly steer our clients through their digital journey. We do it by enabling the...
- ...across other centres for process/system improvements. • The job holder works closely with group Telecom teams, Team leaders, and Managers to understand the scope of work, format, and the expectations. The role holder also often liaises with the other technology teams for...Contract workWork at officeOnlineRemote job
- ...suitability to the role. Applications close 13th November 2025 For further information regarding the role please contact Owen Hardidge Manager Business Transformation and Customer onor refer to the position description. Cardinia Shire Council is an equal opportunity...Full timeHybrid workOnlineLocal area
- ...and enable successful delivery of product changes and innovations through collaboration and continuous enhancement. Establish and manage testing strategies and plans for all products and services to ensure robust and consistent delivery across the University. About you...Full timeOnlineFlexible hoursSunday
- ...positive difference through its unique and transformational education. Geelong Grammar School is seeking a visionary IT Security Manager to lead our cyber security strategy and operations. This is a unique opportunity to join one of the worlds leading coeducational boarding...Full time
- ...Summary: As an Information Security Officer you will play a critical role in maintaining and improving HUB24s Information Security Management System (ISMS). You will ensure compliance with industry standards and regulatory requirements manage risk within agreed tolerances...Full timeFor contractors
- ...ll Be Doing You’ll be at the frontline of offensive security, uncovering vulnerabilities across networks, applications, and infrastructure, and working alongside our Cyber Consulting and Managed Services teams to turn findings into actionable solutions. This is the perfect...Holiday workFlexible hours
