...IT Security Operations Manager page is loaded IT Security Operations Manager
Apply locations Malaysia - Kuala Lumpur time type Full time posted on Posted 13 Days Ago job requisition id JR0003341 Main duties and responsibilities
Support the internal stakeholders...
If you're looking for a career with Apple Leisure Group, please click here to view job postings.
If you're looking for a career with our Inclusive Collection, please click here to view job postings.
"I joined as a server on the catering staff. Thanks to Hyatt's training...
...Capco,
Capco, a Wipro company, is a global technology and management consultancy specializing in driving digital transformation in... ...to deliver change initiatives for leading clients across the securities services space.
Strong emerging end-to-end generalist problem...
...company page
Serves as a contact person to users for cyber security issues, mainly engages in real-time (threshold) security... ...various SOC entry channels (SIEM , Tickets, Email and Phone).
Manage incident response including incident detection, analysis, containment...
...page
Control Risks is currently looking to hire a Country Security Lead to support a global banking client and assume responsibility... ...bank stakeholder requirements, global and local standards.
Manages security and safety incidents, follow-up investigation and...
...international financial services provider, Allianz offers worldwide products and solutions in insurance and asset management. View company page
The Information Security Officer (ISO) Malaysia is a key role within the Allianz Technology’s global IS organization. The ISO is...
...the support, maintenance, and development of our global network security products. You'll interface with colleagues across teams and... ...products, e.g., firewalls and tapping equipment
life cycle management of security products in productions environment, e.g., firewalls...
...The Xsolla Team is looking for a passionate Application Security Specialist to work in our KL Office. We need a professional who knows... ...with product development, information technology, and management
Participate in security assessments of service architecture...
...Job Title: IT Security Lead
Reporting To: Chief Information Officer (CIO)
Job Summary: The IT Security Lead will be responsible... ...security. This role involves working closely with the CIO, Operations managers, Application managers, and other stakeholders to develop and...
...devising and overseeing the implementation of technologies that are secure, reliable, maintainable, scalable, and usable, and sharing... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general...
...critical IT and OT environment and be one of our dedicated IT security experts in Detection & Monitoring team. You’ll protect our company... ...environment and are open to input and feedback from team, management, and stakeholders.
Maybe you’ve read the above and can see...
...Head, Information Security Officer page is loaded Head, Information Security Officer
Apply locations Kuala Lumpur time type Full... ...policies for the effective implementation of Technology Risk Management Framework (TRMF) and Cyber Risk Framework (CRF).
Enforcing...
...Imagine a future where you strive to keep IT secure and resilient in a world that runs entirely on green energy
Join us in this role... ...work environment and are open to input and feedback from team, management, and stakeholders.
Maybe you’ve read the above and can see...
...banking, treasury, Islamic banking, listed derivatives, investment management, wealth management, structured lending and trade financing... ...management
* Analysis and neutralization of all cyber security threats
* Performs continuous security assessment and recommend...
...and builds enterprise softwares.
Job Description
Network Security product Web Application Firewall, Endpoint Detection and... ...best practice and on demand to ensure secured and protected.
Managing vendor for any tech refresh,exploring feature,support for any network...
...Southeast Asia.
Job Description
Propose and revise Group IT Security Policies and Standards for Regional & Overseas Units to ensure... ..., and processes, including email & internet policy, password management processes, etc.
Skilled in delivering training sessions,...
...and provide technical leadership for on-going delivery of system security solutions for th Bank Group. Have sufficient system security... ...scale covering all the system and infrastructure aspects.
2. Manage the delivery and implementation of system security projects in...
...The IT Security Analyst will be responsible for identifying security vulnerabilities and propose remedy for our systems and networks. This will involve conducting penetration tests, vulnerability assessments, and other security assessments. The IT Security Analyst will...
...big enough to compete and small enough to care.
To implement security vulnerabilities code scanning such as CheckMarx and SonarCube... ...Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general...
...Happiness, fun, joy, and care are a big part of our culture.
You’ll play an important role in:
developing governance, management, and security patterns on the newly built cloud platform
designing connectivity, infrastructure, identity, and access management and...
...Network Security Solution Architect in Kuala Lumpur at Logicalis
As Architects of Change, Logicalis' focus is to design, support... ...understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue...
...Description
Responsible for supporting and improving the IT Security Posture of related hardware, software, and configuration to... ...To perform any other tasks or assignments as directed by the management from time to time.
Qualifications
~ Bachelor’s Degree in...
...our story.
Job Description
Key Responsibilities
• Embed security culture within the CSG engineering teams
• “Shift left” and... ...involving Cloud environments and web services
• Assist with management and tuning of the Web Application Firewall (WAF)
• Assist...
...international mid sized group with appetite for innovations, approachable management, lead by objectives / targets which give the opportunity of a... ...You provide 1st and 2nd Level support solving current network security related incidents, service requests, changes and problems....
...documentation for the networking infrastructure, data flows, security compliance, and ports-and-protocols requirements.
Firewall... ...experience.
Hands on experience working with Panorama and management of multiple firewall device groups and templates.
Accustomed...
...EMIT - Industrial Cyber Security Engineer
ExxonMobil
ExxonMobil is one of the world’s largest publicly traded international oil... ...them.
Primary Job Functions:
ICS incident and event management
Threat identification and protection in the Operations Technology...
...incidents
* Leading large scope high impact cyber breaches and manage Incident Response (IR) workflow and activities
* Provides... ...external auditors.
* Experience in creating and updating cyber security playbook
* Architecture design of holistic IT security enterprise...
...VP, Information Security Engineering Lead, ISAS
United Overseas Bank Limited (UOB) is a leading bank in Asia with a global network... ...sets goals and assists the team in accomplishing those goals.
Manage security architecture and provide consultancy to strengthen security...
...Open Position: Team Lead, IT Security Operations (Investment and Management Company)
An Investment and Management Company is currently hiring Team Lead, IT Security Operations to join them in Kuala Lumpur office.
Key responsibilities include:
# More than 5 years...
...About Our Client
~ Pro-actively manage and get involved in IT Security related matters and across Securities and International entities regionally.
Job Description
Provide advisory on IT Security related issues (where countries do not have a dedicated IT Security...