Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
Build software that supports CSIRO’s leading research Work in an agile, innovative, and autonomous team Collaborate with experts across tech and science The Data Management and Applications (DMA) team, part of CSIRO’s Information Management and Technology (IMT) group, develops software solutions...
-
and exploiting IP assets. Engaging with Research Program Leaders and technical staff in identifying, developing, protecting and managing IP assets. Managing IP for the Energy sector, working with
-
experience with computer modelling. Strong communication, presentation, and report writing skills, complemented by adept problem-solving abilities through teamwork, stakeholder engagement, and client
-
Acknowledgement of Country CSIRO acknowledges the Traditional Owners of the land, sea and waters, of the area that we live and work on across Australia. We acknowledge their continuing connection to their culture and pay our respects to their Elders past and present. View our vision towards...
-
: Curating responsibilities including identifying, sorting, and mounting specimens. Using computer skills to transfer information from insect specimens into morphological data matrices. Supporting research
-
service with a diverse group of stakeholders. Experience with relevant computer software comprising Microsoft, Word, Excel and Outlook. Possess and maintain a current driver's license. Desirable Relevant
-
Acknowledgement of Country CSIRO acknowledges the Traditional Owners of the land, sea and waters, of the area that we live and work on across Australia. We acknowledge their continuing connection to their culture and pay our respects to their Elders past and present. View our vision towards...
-
principles and diverse stakeholder groups. Poise, diplomacy, and grace under pressure. Tertiary qualification (or equivalent industry experience in computer science, information management, data governance
-
CSIRO Leading and managing CSIRO’s cyber security strategy and cyber security program, integrated with the broader protective security framework Establishing, maintaining and maturing the information
-
ability to monitor safety of maintenance and contracted works Demonstrated ability to use and maintain the currency of computer-based safety systems, e.g. Donesafe. Demonstrated experience in supervising