AUSTRALIAN CITIZENSHIP REQUIRED FOR THIS POSITION: Yes RELOCATION ASSISTANCE: No relocation assistance available CLEARANCE TYPE: AU- Secret (NV1) TRAVEL: Yes, 10% of the Time Description We are Northrop Grumman Australia. Our 800 strong team is leveraging unparalleled global resources to deliver sovereign Defence capability aligned to the Government's priorities across Aeronautics, Mission Critical Systems, Space and Guided Weapons. … are also developing a reputation as a great place to work. Help us define what is possible for our nation and for your career. DARC is a global network of three next-generation ground sensors, based in the United States, the United Kingdom, and Australia. Together, they will deliver a unique 24/7 all-weather capability, tracking objects … to enhancing security and safety in deep space on a global scale. Your Role The Information Systems Security Officer (ISSO) is responsible for the day-to-day onsite execution of the Systems Security Engineering activities required for the ongoing maintenance and uplift of the cybersecurity posture within the project. This spans systems, subsystems, products and external interfaces, and More ❯
its Technology Team as they progress an ambitious transformation programme. As the evolution continues, they now require a Security Access Analyst to join the team. Reporting to the Head of IT Security, the Security Access Analyst role is integral to the management and integrity of network and system access within the group. You will be responsible for ensuring … that access rights are granted according to role-based access control (RBAC) principles and are in compliance with organisational policies. You will conduct regular audits of access rights to verify adherence to security protocols and to identify any discrepancies that may pose a risk. Key duties will include: Support the joiners/movers/leavers process ensuring timely provisioning … modification, or revocation of access rights Assist in enforcing the "PrincipleofLeastPrivilege" by contributing to access reviews and adjustments under guidance Assist in utilising automated tools or mechanisms to facilitate periodic access reviews within specific operational domains Aid in defining RBAC roles, permissions, and access levels aligned with business needs The ideal candidate More ❯
to join our dynamic team. The successful candidate will play a critical leadership role in delivering complex technical programs and driving key cyber security initiatives, particularly in the areas of Authentication, Identity and Access Management (IdAM), and overall access governance.This role will collaborate closely with cyber security, engineering, and business stakeholders, ensuring the delivery of secure, modern platforms … objectives with broader enterprise technology goals. Cyber Security and IdAM Partner with Cyber Security stakeholders to design and implement secure authentication mechanisms (e.g., MFA, SSO). Drive the rollout of identity governance solutions and ensure integration with enterprise-wide access management systems. Ensure all programs comply with security best practices, regulatory requirements (e.g., GDPR), and internal security policies. Oversee … IT Service Management, and business units. Translate strategic cybersecurity objectives into clear technical requirements and roadmaps. Collaborate with the Retail Tech and Business Change teams to enable secure rollout of new store and enterprise features. Technical Execution Ensure agile delivery of high-quality, secure solutions using Scrum, SAFe, or other scaled agile frameworks. Guide transitions from legacy systems More ❯