373 information-security "https:" "https:" "https:" "https:" "https:" "UCL" positions at University of New South Wales
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
through excellence in research, outstanding education and a commitment to advancing a just society. Why your role matters The Health & Safety Data & Information Coordinator plays a key role in supporting
-
workflows, intake forms and processes to enhance user experience and operational efficiency. Manage system access, licences and security roles to ensure data security and integrity. Develop reports and
-
Group of Eight. If you want a career where you can thrive, be challenged and do meaningful work, you’re in the right place. The Specialist II, Security Engineering, is a key position in the Cyber Security
-
the right place. Specialist II, Security Engineering is a key position in the Cyber Security Engineering team, responsible for the implementation, configuration, automation, and support of cyber security
-
delivery within your domain of student information systems. Working collaboratively with academic and professional staff, service units, and external vendors, you will act as a key connector—ensuring strong
-
The Senior Data Steward is a senior advisory position within the Enterprise Data Office responsible for operationalising and implementing UNSW’s Data Governance Framework. This role ensures that governance
-
continues to evolve as it works toward its ambition of being a world class technology delivery and support team enabling the University with world class solutions and capabilities. The Senior Cyber Security
-
Apply now Job no:537821 Work type:Full Time Location:Sydney, NSW, Canberra, ACT Categories:Information Technology, Project Management 24 months fixed term role within UNSW IT as a IT Infrastructure
-
the Customer Relationship Management database. Assist with data entry for a variety of projects and tasks. Cooperate with all health and safety policies and procedures of the university and take all reasonable
-
institutional quality and technical standards. Enforce data accuracy and privacy protocols by validating systems against institutional regulations and security policies. Optimize system performance by evaluating