Average salary: $99,628 /yearly
More statsGet new jobs by email
- ...situational and executive-level reports on cybersecurity incidents. Collaborate with SOC analysts, IT teams, threat intelligence, and management during investigations. Provide clear updates during active incidents and translate technical findings into business-friendly...SuggestedSunday
- ...security violations and incidents, reporting as necessary to management Ensures the integrity and protection of networks, systems,... ...enforcement of organizational security policies, through monitoring of vulnerability scanning devices Implements, enforces, communicates, and...SuggestedOnline
- Break things. Understand them. Make them safer. If you've ever looked at a system and thought "there's a way into this" and then kept going until you proved it, this will feel familiar. If you've never really seen yourself in a corporate environment, that's fine. Most people...SuggestedHybrid workRemote job
- ...Description Summary We are seeking an experienced Client IT Security Manager to lead the ongoing management and enhancement of our... ...Additional Responsibilities Work with application owners on vulnerability remediation and reporting. Manage cyber security incident notification...SuggestedLocal area
- ...professional excellence of the business. This role reports to the Managing Consultant. This is a client facing role and as such it... ...outcome for this role will be the identification of security vulnerabilities and risks within client environments. As a specialist...SuggestedHybrid workFlexible hours
- What is this position about? The role of the Vulnerability Management Analyst (APS) sits within IT for Securities Services (2S) at BNP Paribas SA Australia Branch. Provide day‑to‑day operational support for the organization's Vulnerability Management (VM) program. The...SuggestedTemporary work
- Job Requisition ID # 25WD93562 Position Overview Our team within Autodesk Construction is looking for a Software Architect to help us build collaborative tools for Payment Solutions. We facilitate payments between builders and subcontractors, making the construction process...SuggestedFor contractorsInterim role
- ...Chief Information Officer, the Information Security Officer plays a pivotal role in our firm's overall security posture. Responsible for managing cyber security awareness, maintaining compliance with ISO27001, and protecting the firm against information security threats. This...SuggestedPermanent employmentFull timeWork at officeImmediate startRemote jobFlexible hours
$37.54 per hour
...vibrant on-campus location, close to public transport The Vulnerability & Threat Analyst provides operational support to the... ...when, where and how work is done, we can support our staff to manage their personal commitments, while optimising their work performance...SuggestedHourly payPart timeCasual workFlexible hours- Network architecture | HLD/LLD | Cisco ACI Your new company Renowned education client based in South-eastern suburbs of Melbourne. Your new role My client is engaging a senior, enterprise-level Network Architect to lead the architectural design and delivery...SuggestedFull timeContract workHybrid work
- ...Mining Software Architect Initial 6-month contracts in WA Remote work available Australia wide Bespoke software / fleet management projects Our client A leading, global resources client based in the Perth CBD. The role We are seeking a Mining...SuggestedContract workRemote job
- ...Ensure compliance with regulatory requirements and industry standards. Prepare network documentation, diagrams, and reports for management and audit purposes. Provide technical leadership and mentoring to network engineers and IT staff. Participate in disaster recovery...SuggestedFull timeHybrid work
- ...of Australia’s most critical digital infrastructure. We’re looking for a talented Network Architect to lead the design and shaping of managed network solutions across the full customer lifecycle. This spans pre sales, transition, and in life optimisation. You will act as the...SuggestedHybrid workHoliday workFlexible hours
- ...complex technology landscapes, drive large-scale transformations, and enhance user experiences. As expectations for identity and access management solutions grow, we are committed to providing cutting-edge services in Identity Governance and Administration (IGA), Privileged...SuggestedHybrid workFlexible hours
- ...Security We’re looking for an experienced Information Security Manager with a strong background in GRC, external audits, and security... ...security obligations Monitor threat intelligence and vulnerability trends, translating insights into actionable security improvements...SuggestedFull timePart timeHybrid workOnlineLocal areaFlexible hours
- Location: Brisbane (Australia) or Wellington (New Zealand) Employment Type: Full-Time | Senior / Consultant Level About Cybernetic Global Intelligence Cybernetic Global Intelligence (Cybernetic GI) is a leading cybersecurity consulting firm specialising in advanced...Full time
- ...information security domains such as, but not limited to, endpoint security, network security, IDS/IPS, data loss prevention, vulnerability management, incident response, threat hunting, identity and access management, and application security. Investigate and utilise new...Permanent employmentFull timeLocal area
- Urgent requirement of Palo Alto Certified Cyber Security Consultant - Contract - Brisbane Requirements Palo Alto Networks certifications : Cyber Security Professional Next-Generation Firewalls Ability to pass Queensland Police vetting Ability to provide...Full timeContract workImmediate start
- ...Penetration Tester to deliver security assessments across a mix of government and private sector clients. This role involves identifying vulnerabilities, simulating real-world attacks, and supporting compliance within regulated and security-sensitive environments. Key...Remote jobFull timeContract workHybrid work
- Requirements Gathering, Analysis and Documentation: 1 Work closely with business stakeholders, global trade compliance specialists, developers, legal researchers and data teams to elicit and define clear, complete, and testable requirements. 2 Conduct stakeholder interviews...Full time
$90,000 - $120,000
...Pacheco ROLES AND RESPONSIBILITIES ~Analyses business processes, policies, and other relevant arte facts to gather information management requirements. ~Assess business systems for their information management capabilities. ~Facilitate stakeholder interviews,...Permanent employment- If you live in Australia or New Zealand, you've likely heard of AMP. But at a time when society is changing, we are too. We're now a nimbler business with new leadership and thinking. For us, these are exciting times. There's a real potential for big thinkers to help...Work from homeFlexible hours
- ...and evaluating inefficiencies and recommending optimal business practices, and system functionality and behavior. Using project management methodologies, principles and techniques to develop project plans and to cost, resource and manage projects. Taking responsibility...Full time
- Here at Builders Academy Australia we live and breathe building and construction. We intimately understand the industry and have strong relationships within the building and construction community and the education sector. Through these established connections, we are...Full time
$80,000 - $90,000
...understanding of the software development lifecycle (SDLC) * Experience working in Agile/Scrum environments * Strong stakeholder management and communication skills * Ability to translate business requirements into technical outcomes * Hands-on experience with tools like...Full time- ...payroll integrations and an understanding of S/4HANA environments. Experience working within unionised payroll environments and managing multiple enterprise agreements. Strong background in process mapping and test documentation for complex system changes. Ability...Permanent employmentFull timeHybrid workLocal areaOffshore2 days week
- ...~Design, deploy and sustain ICT security capabilities across complex environments ~Implement and maintain SIEM, SOAR and vulnerability management platforms ~Support and maintain Windows and Linux infrastructure, including servers and storage ~Troubleshoot operational...Contract workHybrid workFlexible hours
$121,000
...crime, assault and trauma. Read more about our services here - What are the specifics of the role? Reporting to the ICT Program Management Lead, the Business Analyst is integral in achieving ICT results which are aligned with the organization’s vision and strategic goals...Permanent employmentFixed term contractWork at officeHoliday workFlexible hours- ...their objectives by bringing a systematic and disciplined approach to evaluate and improve the effectiveness of the organization’s risk management, control, and governance processes. Your primary role will be to lead and oversee the audit team while serving as the primary...Relocation
$165,000 - $180,000
...the confidentiality, integrity or availability of those ICT systems and their information are managed as per Defence Security requirements. ~ Identifying threats and vulnerabilities arising from the design of ICT systems in the Program; ensuring that they are appropriately...Permanent employmentFull time

