Explore top tech companies.
All Filters
Office Type

Industry

Size

Open Jobs

Remote Jobs

Tech Stack

Top Sydney, New South Wales Cybersecurity Companies (28)

Fintech • Legal Tech • Software • Financial Services • Cybersecurity • Data Privacy
40 Offices
8,000 Employees

CSC is a global leader in providing business, legal, tax, and digital brand services to companies around the world. With more than 8,000 employees, CSC operates in more than 140 jurisdictions, delivering solutions that help businesses thrive. We pride ourselves on our client-focused approach, market-leading expertise, and unmatched global reach.


Hardware • Information Technology • Security • Software • Cybersecurity • Conversational AI
6 Offices
3,000 Employees

Meraki is a Greek word meaning “something done with soul, creativity, or love.” With this name as our mantra, we’re building a welcoming workplace that attracts eclectic, curious, purposeful people who unite to ignite our customers’ passions. Together, we create powerful, simple technology with the potential to change everything.


Cloud • Computer Vision • Information Technology • Sales • Security • Cybersecurity
25 Offices
10,000 Employees

CrowdStrike has redefined security with the world’s most advanced cloud-native platform that protects and enables the people, processes and technologies that drive modern enterprise. Tested and proven, the world's largest organizations trust CrowdStrike to stop breaches with unparalleled protection against the most sophisticated cyberattacks. The CrowdStrike culture has been built upon our Core Values since the day we began. We are Fanatical About the Customer, Relentlessly Focused on Innovation and believe that our Limitless Passion drives Unlimited Potential for every CrowdStriker. As a purpose-built remote-first company, we believe cultivating a connected culture for every employee, no matter where they are in the world, is a key ingredient in building a high-performing, diverse team. We don’t have a mission statement. We’re on a mission—to stop breaches. Ready to join a mission that matters?


Cloud • eCommerce • Information Technology • Cybersecurity
Sydney, New South Wales, AUS
707 Employees

Macquarie Technology Group (ASX:MAQ) is Australia’s data centre, cloud, cyber security and telecom company for mid-large business and government customers. It’s our obsession with customer service that makes us so different. Today we have the best NPS (Net Promoter Score) in Australia


Aerospace • Information Technology • Cybersecurity • Defense • Manufacturing
24 Offices
141,000 Employees

We are engineers and technicians. Skilled scientists and thinkers. Bold innovators and dreamers. We work on advanced technologies that will transform aerospace as we know it. We’re the leading manufacturer of defense, space and security systems, commercial jetliners, and service provider of aftermarket support.


Artificial Intelligence • Cloud • Information Technology • Security • Software • Cybersecurity • Data Privacy
11 Offices
1,000 Employees

Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings, and an overall improved security posture. Used by 4,000+ customers worldwide today, Snyk’s Developer Security Platform automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.


Cybersecurity
Sydney, New South Wales, AUS
34 Employees

Darwinium Digital Security and Online Fraud Prevention Darwinium is a next generation digital security and fraud prevention platform running on the perimeter edge, protecting every customer interaction from fraud, scams and online abuse. The Darwinium platform unifies digital security with fraud prevention to create a single, holistic view of customer journeys across every digital touchpoint – Web, Apps and APIs. Combine advanced fraud analytics with customer journey orchestration to make better risk decisions, and take real-time action on evolving threats. Darwinium’s unique integration point, running on the perimeter edge via content delivery networks (CDNs), provides a continuous view of user behavior, from pre-authentication, through account creation, login, change-of-details and payments, all via one simple deployment. Moving fraud and risk decisions to the perimeter edge is privacy preserving and low latency. It also removes the reliance on ‘point-in-time’ API-based solutions that are vulnerable to exploitation via operational siloes and disjointed risk assessments. Darwinium is implemented once, and then covers every interaction a user makes on your website or mobile app. What’s more, user journeys can be fully configured within the platform and adapted at the click of a button, based on trust and risk. Trusted customers can be instantly recognized and rewarded with frictionless online journeys, while high-risk behavior can be blocked, re-routed or stepped-up in real time, according to risk appetite. Separate human and bot traffic, add downstream context from upstream user behavior, protect customers from account takeover and identity spoofing, identify scams and social engineering behaviors, block content and promo abuse, and detect fraudulent payments.


Cloud • Information Technology • Cybersecurity
Sydney, New South Wales, AUS
25 Employees

See tomorrow and stay ahead. As your progressive partner in Cloud, Cyber Security, Retail Solutions and Managed IT Services, together we’ll see what’s ahead and embrace its full potential. Our difference lies less in what we do, more in how we do it. 25 years’ experience in brilliant strategy and delivery is backed by a team of open, collaborative and relationship-driven ‘people-people’. We’re as invested in your ambitions as you are.


Information Technology • Security • Cybersecurity
3 Offices
102 Employees

At Payatu we believe in following one’s passion and with that thought, we have created a world class team of researchers and executors who are bending the rules to provide state of the art security services. Recognized by Great Place to Work (India) as an amazing workplace. We are a passionate bunch of folks working on the latest and leading edge security technology. OUR SERVICES At Payatu, we offer a host of security testing and assessment services. For us, your security is our priority. Through our expertise and research methodologies, we ensure the security of our client’s assets. -INTERNET OF THINGS (IOT) SECURITY TESTING -PRODUCT SECURITY ASSESSMENT -PAYATU RED TEAM ASSESSMENT -BLOCK CHAIN SECURITY AUDIT -CLOUD SECURITY ASSESSMENT -CRITICAL INFRASTRUCTURE SECURITY TRAINING Payatu’s deep technical training provides in-depth knowledge of the subject at hand with the prime focus on hands-on labs that enable attendees to understand the concepts thoroughly. Our trainers are highly qualified, internationally acclaimed and certified professionals who provide detailed case studies of their real-life experience with security issues and new vulnerabilities. ADVISORY Providing the best advisory services for your security assessment through sharp, technical and insightful analysis. RESEARCH Undertaking detailed research and study in the area of security testing. Through our expertise and research methodologies, we ensure our client’s assets. With the state of the art in-house fuzzing infrastructure and dedicated team to fuzz popular software, Payatu team regularly report the vulnerability in various software. More information please drop an email on [email protected]

Let Your Resume Do The Work
Upload your resume to be matched with jobs you're a great fit for.

Artificial Intelligence • Cloud • Information Technology • Software • Cybersecurity • App development • Big Data Analytics
20 Offices
23,000 Employees

Persistent Systems is a leading provider of digital transformation services, offering innovative solutions tailored to various industries worldwide. With a robust global presence, they deliver cutting-edge services in product engineering, digital strategy, and data analytics, helping businesses thrive in today's rapidly evolving landscape. From healthcare and financial services to retail and manufacturing, Persistent Systems empowers organizations across diverse sectors to embrace technology and drive sustainable growth.


Analytics • Cybersecurity
Sydney, New South Wales, AUS
20 Employees

Huntsman Security is the creator of the Huntsman Security Analytics Platform that protects sensitive environments and critical national infrastructure in the Five Eyes community. A private Australian company founded in 1999; we have offices in Australia and the UK, with operations in Japan. The Huntsman technology delivers comprehensive Security Analytics capabilities, including Safe Automation and Threat Verification at crucial stages of the incident management process. Utilising machine-based learning and high speed in stream processing to collect and contextualise security data in real time, Huntsman automatically pinpoints the threats that matter to limit the time at risk for any organisation. Our philosophy is driven by the vision that cyber resilience requires the collaboration of smart technologies, skilled professionals and sound process execution. As data volumes grow and skilled security expertise becomes increasingly scarce, automation is fast evolving into a critical factor in the successful pursuit of cyber security.


Artificial Intelligence • Cybersecurity
Sydney, New South Wales, AUS
20 Employees

Data is valuable. It’s what your business runs on. It’s your most important asset after your people. We all have an obligation and a business need to protect data. At CipherStash, we believe that data confidentiality and security is a fundamental human right, as well as a business imperative. And that protecting data shouldn’t slow down your business. CipherStash: Protect data. Not just systems.


Security • Software • Cybersecurity
3 Offices
201 Employees

Secure Code Warrior makes secure coding a positive and engaging experience for developers as they increase their skills. We guide each coder along their own preferred learning pathway, so that security-skilled developers become the everyday superheroes of our connected world.


Information Technology • Sales • Security • Cybersecurity • Automation
5 Offices
442 Employees

Silverfort is on a mission to bring identity security everywhere, and allow organizations to operate without fear or disruptions. Fueled by a belief that enterprises and their identity teams deserve better, we found a way to break down the silos of identity security—eliminating the critical gaps and blind spots left behind by a patchwork of point solutions. After years of research, we found a way to break free from these limitations. Silverfort created the only end-to-end identity security platform that secures all identities—humans and machines, on-prem and in the cloud. Our patented Runtime Access Protection (RAP) technology seamlessly integrates with the entire IAM infrastructure and secures it from within with unmatched visibility, analysis, and inline enforcement of security controls. This innovative approach brings protection to all resources in all environments, including ones that were previously impossible to secure, such as legacy systems, service accounts, command-line tools and IT/OT infrastructure. Finally, enterprises can stay ahead of the evolving identity threats, minimize their attack surface, stop breaches before they can spread, close compliance gaps, and break free from countless limitations and endless efforts. Silverfort is the identity security platform the industry deserves, earning us the trust of more than 1,000 leading organizations, including several Fortune 50 companies. This is identity security done right. Join Silverfort, and be part of a team that’s pushing the boundaries of identity security—no compromises, no blind spots, no limits.


Information Technology • Software • Cybersecurity
Sydney, New South Wales, AUS
24 Employees

Cocoon Data stands as a beacon of security in the vast digital landscape. At our core we value data integrity and dedicate ourselves to the mission of secure collaboration through innovation. We develop cutting-edge data security solutions which stay one step ahead of the security challenges of tomorrow. Cocoon Data's carefully crafted zero-trust and zero-footprint quantum-hardened API service KBOSS dynamically protects data in all states. KBOSS equips to empower others' movements towards more robust security postures, including compliance across CMMC, ITAR, HIPPA and other other industry standards. In parallel with our solutions, Cocoon Data seeks inspiration in and conquers liminal spaces of insecurity with robust future-ready innovation.


Big Data • Security • Software • Analytics • Cybersecurity
8 Offices
5,001 Employees

Kroll is the world’s premier provider of services and digital products related to valuation, governance, risk and transparency. We work with clients across diverse sectors in the areas of valuation, expert services, investigations, cyber security, corporate finance, restructuring, legal and business solutions, data analytics and regulatory compliance. Our firm has nearly 5,000 professionals in 30 countries and territories around the world. For more information, visit www.kroll.com.


Software • Cybersecurity
Sydney, New South Wales, AUS
7 Employees

We’re an Australian technology company with headquarters in Sydney. Our unique approach to identity management is derived from a wealth of international, real-world experience in deploying outcome-focused biometric solutions. We have seen the emphasis on data security, authorisation and access management dramatically increase. However, the authentication methods associated with authorisation and access have failed to evolve in line with the significant implications of not doing so. Multi-factor authentication is a start. But the foundational component of most user IDs is a username and password in a digital context, or an access card in a physical one – both methods posing undue risk and exposure when it comes to regulatory compliance and security. Our vision is to eliminate usernames, passwords, access cards and PIN numbers from the authentication conversation altogether. We allow organisations to create and maintain a single credential that can be used across all access points, both physical and logical. This gives business leaders the ability to manage who accesses what, when and where – securely and conveniently. We’re building the future of identity.


Big Data • Cloud • Consumer Web • Healthtech • Software • Cybersecurity • Generative AI
25 Offices
52,650 Employees

Since 1993, EPAM Systems, Inc. (NYSE: EPAM) has leveraged its software engineering expertise to become a leading global product development, digital platform engineering, and top digital and product design agency. Through its ‘Engineering DNA’ and innovative strategy, consulting, and design capabilities, EPAM works in collaboration with its customers to deliver next-gen solutions that turn complex business challenges into real business outcomes. EPAM’s global teams serve customers in more than 45 countries across five continents. As a recognized market leader in multiple categories among top global independent research agencies, EPAM was one of only four technology companies to appear on Forbes 25 Fastest Growing Public Tech Companies list every year of publication since 2013 and ranked as the top IT services company on Fortune’s 100 Fastest-Growing Companies list in 2019, 2020, and 2021.


Cybersecurity
2 Offices
1,260 Employees

CyberCX is the leading independent provider of cyber security services in the trans-Tasman region, with global offices in the United Kingdom and United States. With a workforce of over 1,300 professionals, we are a trusted partner to private and public organisations across all sectors, helping our customers confidently manage cyber risk, respond to incidents and build resilience in an increasingly complex and challenging threat environment. Through our end-to-end range of cyber capabilities, CyberCX empowers our customers to securely accelerate opportunities in the digital economy. Our services include: consulting and advisory; governance, risk and compliance; digital forensics and incident response; privacy advisory; security testing and assurance; network and infrastructure solutions; cloud security and identity management; managed security services and cyber security training. CyberCX (Australia) Website: www.cybercx.com.au Phone: 1300 031 274 CyberCX (New Zealand) Website: www.cybercx.co.nz Phone: 0800 436 273 CyberCX (United Kingdom) Website: www.cybercx.com Phone: +44 (0) 1865 504 032 CyberCX (United States) Website: www.cybercx.com Phone: +1 212 364 5192


Information Technology • Cybersecurity
2 Offices
23 Employees

Borderless CS is an ISO 27001:2022 certified leading cybersecurity Company in Australia. We use over a decade of experience to provide cutting-edge solutions that protect Australian businesses from cyber threats. Our use of industry standards set by NIST, the ACSC Essential 8 maturity model, and ISO 27001 ensures that our assessment and recommendations adhere to globally recognised best practices.