Independent Observer
... - and post-deployment operational, WHS, security training and activities. When required, ... . Obtain and maintain a Maritime Security Identification Card (MSIC). The following ...
... - and post-deployment operational, WHS, security training and activities. When required, ... . Obtain and maintain a Maritime Security Identification Card (MSIC). The following ...
... shifts. The Opportunity: As the Specialist Services Officer, you will manage ... a cover letter addressing the Specialist Services Officer Selection Criteria 2024. ... , please refer to the attached Specialist Services Officer - Position Description.pdf. ...
... are currently looking for a Specialist - HSS (Health, Safety, Security) Systems Location: Perth Roster: Monday ...
... one of the largest Electronic Security companies in Australia. BENEFITS Due ... Manager from within the Electronic Security industry to join their team ...
... consultancy looking for an Security Lead responsible for the cyber threat management of key applications. ... team and integrate security across the development cycle. You ... product development and incorporate security requirement frameworks and testing into ...
... and vendor management, through governance, security, and risk management. This role will lead the Cyber Uplift Program to enhance the ... data breaches, malware infections, and cyber-attacks. Communicate cybersecurity risks and ...
... may range from being very specialist in nature to quite broad, ... in ensuring our nation’s ongoing security.Our Ideal CandidateA Senior Nuclear ... provide a strategic level of specialist, professional and technical expertise, potentially ...
... ). Implement and maintain network security measures and platforms, including firewalls, ... upgrades, patch management, and security audits. Ensure secure connectivity between ... , and troubleshoot network and security devices and systems. Proven experience ...
110000 130000... may range from being very specialist in nature to quite broad, ... in ensuring our nation’s ongoing security. Our Ideal Candidate A Senior ... provide a strategic level of specialist, professional and technical expertise, potentially ...
... and ideally have exposure to security technologies such as CrowdStrike, Azure, ... intelligence feeds to identify emerging cyber threats and vulnerabilities. Conducting extensive ... , as they are with other Security Technologies such as CrowdStrike, Azure, ...