Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
CSIRO Leading and managing CSIRO’s cyber security strategy and cyber security program, integrated with the broader protective security framework Establishing, maintaining and maturing the information
-
participants. You’ll work across multiple STEM education programs, matching participants to opportunities, supporting program teams, maintaining accurate records, and providing day-to-day guidance. This people
-
: Essential criteria A doctorate (or will shortly satisfy the requirements of a PhD). The doctorate must be in a relevant discipline area, such as statistical machine learning, computational and quantitative
-
ability to monitor safety of maintenance and contracted works Demonstrated ability to use and maintain the currency of computer-based safety systems, e.g. Donesafe. Demonstrated experience in supervising
-
the challenge. Visit CSIRO.au for more information. The opportunity CSIRO’s Information and Technology (IMT) business unit is delivering an ambitious program of work to support the organisation’s strategy
-
organisation. Act at the program on a page level, partner with researchers across boundaries to grow the scale of CSIRO’s partnering and business development activities including research partnerships with
-
working relationships. Desirable: A tertiary qualification in accounting or finance as well as commencement or completion of the CA/CPA Program, or equivalent work experience. For full details about this
-
-scale storage, cloud services, data centres, computing and high-performance research environments. Working closely with IMT leaders and program heads, you’ll ensure infrastructure aligns with
-
. Familiarity with scientific instruments, data collection/ processing techniques. Strong computer literacy and ability to interpret technical documents. Applicants with a current SCUBA diving certification (e.g
-
engineering expertise to solve complex, computation-heavy challenges. Architect and deliver distributed software systems using containerisation and inter-process communication frameworks. Act as a trusted