We use cookies to improve the user experience, analyze traffic and display relevant ads.
Details Accept
Enter position

Overview of salaries statistics of the profession "Cyber Security Manager in Australia"

Receive statistics information by mail
Unfortunately, there are no statistics for this request. Try changing your position or region.

Найдите подходящую статистику

Advisory Cyber Security Manager

Смотреть статистику

Information Security Manager

Смотреть статистику

Information System Security Manager

Смотреть статистику

Interim Information Security Manager

Смотреть статистику

IT Information Security Manager

Смотреть статистику

IT Security Manager

Смотреть статистику

Network Cyber Security Manager

Смотреть статистику

Network Security Manager

Смотреть статистику

Operational IT Security Manager

Смотреть статистику

Physical Security Front Line Manager

Смотреть статистику

Physical Security Manager

Смотреть статистику

Physical Security Operations Manager

Смотреть статистику

Private Security Manager

Смотреть статистику

Product Security Manager

Смотреть статистику

Regional Security Manager

Смотреть статистику

Retail Security Manager

Смотреть статистику

SAP Security Manager

Смотреть статистику

Security Account Manager

Смотреть статистику

Security And Crowd Manager

Смотреть статистику

Security And Crowd Operations Manager

Смотреть статистику

Security And Mobile Patrol Night Manager

Смотреть статистику

Security Contracts Manager

Смотреть статистику

Security Engineering Manager

Смотреть статистику

Security Guard Manager

Смотреть статистику

Security Installation Manager

Смотреть статистику

Security Officer Manager

Смотреть статистику

Security Operations Manager

Смотреть статистику

Security Policy Manager

Смотреть статистику

Security Project Manager

Смотреть статистику

Security Site Manager

Смотреть статистику

Store Security Manager

Смотреть статистику

Technology Information Security Manager

Смотреть статистику
Show more

Recommended vacancies

Application Security Engineer
Michael Page, Perth CBD
Working within the clients Cyber Security team, reporting to the Manager Cyber Security Technical OperationsWorking with Cyber Application Security, provide guidance and advice to teams as an SME for application security.Working with a range of different development teams across the globe, in multiple time zones.Conduct secure code reviews for various languages and frameworks (E.G. C#/Python).Using tools such as Snyk to identify applications that may be of concern from a security perspective and work with the development teams to address theseTrack progress across all applications.Work together in partnership with the business and with IT service owners to ensure security posture is consistently maintained and improved.Vulnerabilities in systems and software are identified and remediated. Plans are established and tracked to finalisationSafetyAwareness, practice and commitment to safe working practicesConduct hazard Identification and safety interactionParticipate in Safety AuditsReport IncidentsParticipate in incident investigationsParticipate in safety meetingsList the key objectives and key results expected from the contractor:Assigned tasks completed on time and required qualityVulnerabilities addressed and resolvedWork is delivered to cyber standardsStatus of vulnerabilities are tracked and reported clearlyCollaboration within the cyber teamStrong ability to deliver and drive continuous improvement initiativesA commitment to the safety of yourself and your team3-5 years of industry relevant experienceExperience with Application Security Testing tooling (E.G. Snyk)Experience with common CI/CD platforms and building/modifying pipelines (E.G. GitHub Actions/Azure DevOps Pipelines)Experience with securing common developer platforms (E.G. GitHub/Azure DevOps)Experience with automating common application security tasksExperience with training developers on application security guidelines and standards in line with industry best practices (E.G. OWASP/SLSA)Excellent collaboration and influencing abilities regarding Cyber Security solutions.Experience working in a global organization and large IT environments following ITIL processes, such as change control and incident management.Experience working in cloud environments (AWS and Azure) and an understanding of how identity management and access controls work within these environments.Strong Cyber operational process knowledge and/or experience (Patching, Cloud, Vulnerability Management etc).Self driven with strong organising and tracking skills