’s goals. Define the product vision and goals in collaboration with security, business, risk, and technology stakeholders...Product Owner – Vendor Privileged Access Management Critical function within the Commonwealth Bank Cyber Security...
Commonwealth Bank of Australiawith a Security Clearance to be part of our team on the redevelopment project, covering the Albury Wodonga Military Area, Blamey... and ensuring it meets client requirements Authorise construction planning, programming and on-site completion schedules and liaise...
Downer Grouphunting, incident management, detection engineering and CI/CD. Extensive hands-on experience in cyber security risk... there making it. By expanding into new technology and relentlessly improving every day, we're creating...
Singtel, Microsoft IT, Legal, Project Engineering, MS Business Risk Management, and other internal groups to maintain the corporate... for delivering over 200 Microsoft web portals, Live and Online Services around the world including infrastructure, security...
Microsoftmachinery and equipment Manage and maintain Safe Operating Procedures (SOPs) and Risk Assessments for relevant equipment... parts and maintenance supplies Manage and maintain accurate records of chemical stock holdings, risk assessments...
QinetiQand CI/CD. Extensive hands-on experience in cyber security risk management, transformation while managing complex, projects...At Optus, we don’t sit back and let the future happen to us - we’re out there making it. By expanding into new...
Singtelplanning, resource management, recruitment, and risk mitigation Deep understanding of software delivery processes and what it... improvements in critical areas such as quality, security and scalability while ensuring that modern agile practices are embedded...
Gentrackwith appropriate level of security and keep for as long as we need it for legitimate business or legal reasons. We will then delete it..., and maintain an accurate risk register Chair project meetings and ensure timely issuance of meeting minutes and agendas Negotiate...
Jones Lang LaSalleinfrastructure, security controls and tooling we have to manage our internal IT systems and assets, scale and grow in maturity, in...'s internal facing systems servicing people, finance, legal, facilities, productivity, collaboration and core IT services...
Xeroengages in the exploration, production, transportation, and sale of crude oil and natural gas. It operates through the... Audits Division helps address fraud risk management across the Company with programs of awareness, policy and risk consulting...
MatchaTalentwith appropriate level of security and keep for as long as we need it for legitimate business or legal reasons. We will then delete it... within their respective portfolios. This role is supported by the Asset Risk and Compliance team. Key responsibilities will include: Key...
Jones Lang LaSalle, and data governance, security and privacy capabilities. VMIA is in the process of implementing the first phase of Property.... Training for conveyancers particularly on the characteristics of the DBI product and it's role within the consumer protection...
State Government of Victoriarecords. Adaptability in role allocation. Creation and maintaining spreadsheets Knowledge of a variety of IT programs ie... with variety of IT programs. Current National criminal history check What we Offer A focus on wellbeing initiatives...
St Vincent's Health Australiainfrastructure roadmaps, adoption, security, governance, and risk management is adhered to. Key Responsibilities: Define the... engages in the exploration, production, transportation, and sale of crude oil and natural gas. It operates through the...
MatchaTalentto the Chief Information Security Officer, you will provide support and advice on IT resumption controls, business continuity... ensuring the efficient and ongoing operation of IT services in the event of a disaster or business interruption. Reporting...
Swinburne University of Technologyof environment wide configurations including user policies, device policies, security policies, firmware, drivers, and automation...-quality upkeep of supporting documentation such as Designs, As-Builts, How-tos, environment reporting, risk registers, tickets...
Datacomengages in the exploration, production, transportation, and sale of crude oil and natural gas. It operates through the... of safety and environmental compliance, cyber security, advance process control and optimizations, energy and electrical...
MatchaTalent