Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
residential building standards and industry practice. About CSIRO As Australia's national science agency, CSIRO is solving the greatest challenges through innovative science and technology. Many of our iconic
-
within the program, as required. The testing conducted primarily involves the use of antibody detection techniques such as Enzyme-linked immunosorbent assays (ELISAs), Haemagglutination inhibition (HI) and
-
within the program, as required. The testing conducted primarily involves the use of antibody detection techniques such as Enzyme-linked immunosorbent assays (ELISAs), Haemagglutination inhibition (HI) and
-
of changes, provision of documentation at point of use and archiving of superseded or obsoleted documentation. Provide on-call support for electrical, dry fire and EWIS plant equipment. Role particulars
-
Australia's greatest challenges takes a diversity of minds and lived experiences. We know diverse teams are more effective and deliver more innovative outcomes. As an equal employment opportunity organisation
-
effective use of data and AI. You will clarify data roles and accountabilities, strengthen the management of key data assets, uplift data capability, and lead CSIRO’s AI governance approach to ensure ethical
-
triage system and use data to analyse opportunities for new functionality across systems, workflows and processes. As with all positions in the ePublishing team, the position offers broad and varied
-
Crop Trait Improvement Teams. Adhere to the spirit and practice of CSIRO’s Values, Code of Conduct, Health, Safety and Environment procedures and policy and diversity initiatives. Role particulars
-
quickly to changes. Within broad guidelines, use professional expertise, knowledge of other disciplines and research experience/achievement to formulate, develop and complete an approved research program
-
and maintain testing methodologies, scoping documents, rules of engagement and repeatable playbooks for environments that do not fit standard IT patterns, including threat-informed and adversary