Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Build software that supports CSIRO’s leading research Work in an agile, innovative, and autonomous team Collaborate with experts across tech and science The Data Management and Applications (DMA) team, part of CSIRO’s Information Management and Technology (IMT) group, develops software solutions...
-
Diagnostics, Surveillance & Response Program About CSIRO As Australia's national science agency, CSIRO is solving the greatest challenges through innovative science and technology. Many of our iconic
-
to work across time zones as needed. If you’re excited by cloud engineering, large‑scale scientific computing and the chance to contribute to a major global science mission, this is a great opportunity to
-
: Curating responsibilities including identifying, sorting, and mounting specimens. Using computer skills to transfer information from insect specimens into morphological data matrices. Supporting research
-
of the broader SKA-Low Computing and Software group, which delivers advanced computing and technology solutions for the SKA Project. This group works on integrated control systems, high-performance
-
the Australia Telescope National Facility (ATNF), the only facility of its kind in the southern hemisphere. Our technology development program is the cornerstone of the ATNF and is an internationally
-
service with a diverse group of stakeholders. Experience with relevant computer software comprising Microsoft, Word, Excel and Outlook. Possess and maintain a current driver's license. Desirable Relevant
-
degree in Electrical Engineering, Renewable Energy Engineering, Software Engineering, Computer Science or a similar/related discipline. Minimum two years of demonstrated industry experience in
-
, Computer Science, Information Technology, or a related experience. A current NetApp certification (e.g., NCDA) is highly desirable, reflecting demonstrated expertise in enterprise storage systems
-
CSIRO Leading and managing CSIRO’s cyber security strategy and cyber security program, integrated with the broader protective security framework Establishing, maintaining and maturing the information