Sort by
Refine Your Search
-
an Export Administration Regulations (EAR) clearance/approval, to perform the inherent requirements of the position. Also, due to the specific duties and/or conditions associated with this role, the preferred
-
of the broader SKA-Low Computing and Software group, which delivers advanced computing and technology solutions for the SKA Project. This group works on integrated control systems, high-performance
-
: Curating responsibilities including identifying, sorting, and mounting specimens. Using computer skills to transfer information from insect specimens into morphological data matrices. Supporting research
-
service with a diverse group of stakeholders. Experience with relevant computer software comprising Microsoft, Word, Excel and Outlook. Possess and maintain a current driver's license. Desirable Relevant
-
studies in system engineering. Expertise in computers and network systems involving automated control systems. Experience in design, development installation, commissioning and/or servicing of SCADA & PLC
-
processing equipment (e.g. Fischer–Tropsch, HEFA, and/or plasma reactors) and associated laboratory and field-based analytical systems in accordance with safe operating procedures Planning, designing and
-
degree in Electrical Engineering, Renewable Energy Engineering, Software Engineering, Computer Science or a similar/related discipline. Minimum two years of demonstrated industry experience in
-
Acknowledgement of Country CSIRO acknowledges the Traditional Owners of the land, sea and waters, of the area that we live and work on across Australia. We acknowledge their continuing connection to their culture and pay our respects to their Elders past and present. View our vision towards...
-
principles and diverse stakeholder groups. Poise, diplomacy, and grace under pressure. Tertiary qualification (or equivalent industry experience in computer science, information management, data governance
-
CSIRO Leading and managing CSIRO’s cyber security strategy and cyber security program, integrated with the broader protective security framework Establishing, maintaining and maturing the information