Get new jobs by email
- ...feel a sense of belonging, they can be more creative, innovative, and thrive at all points in their careers. The Incentive Pay Analyst is responsible for assisting in the administration, analysis, and optimization of incentive compensation programs. This role...
- ...business and technology center in Kuala Lumpur that provides high-level information technology and engineering expertise to ExxonMobil... ...the marketplace. What role you will play in our team Cyber Security is responsible for identifying, detecting, protecting against,...
- -Lead or assist in Information Security audits and Risk Management initiatives using frameworks such as PCI DSS, ISO 27001, NIST, COBIT... ...technology risks and recommend appropriate controls based on risk level, business requirements, and implementation feasibility. -...
- ...What's the role? Join Hilti’s Cyber Security Career Starter Program: a one-year, full-time career development program designed for recent... ...global team. Landing roles include: 1. Digital Business Analyst Cyber Risk Management: Identify and assess risks to keep...
- ...valued) - Own transport and valid driving license required - Willing to travel for client visits and business development Junior Level: - Passion for sales and eagerness to learn - Fresh graduates or 1 year of sales experience - Basic business communication skills -...
- ...trading desks. Working Hours: 3PM-12AM OR 4PM-1AM What will you do? Responsible for confirmation and settlement of all Securities Settlements trades Ensure all transactions are processed in accordance to the bank rule, Standing orders, circulars, laid-down...
- ...specializing in penetration testing, digital forensics, and compliance services across Southeast Asia. They are looking for the Cyber Security Engineer who can: -Conduct penetration tests and vulnerability assessments on components including, but not limited to,...
- ...enduring long hours of physical tasks and adapting to warehouse environments. -Computer Skills (Plus Point): Basic proficiency (Data entry,MS Word/Excel). -Probation: 3 + 1 months (3-month initial assessment, with a potential 1-month extension based on performance)....
- ...The Opportunity EY is seeking a passionate Cyber OT (Operational Technologies), Industrial Control Systems (ICS) security and / or IoT expert to join a world leading practice... .... Engage with clients at a strategic level, delivering exceptional service and identifying...
- ...Cyber security is one of the most important risks facing businesses today. Systems, applications, and processes are becoming increasingly interconnected and automated and many organizations are now reliant upon technology to drive business strategy and growth. Our...
- ...to go. Join EY and help to build a better working world. The opportunity At EY, we are expanding our market-leading cyber security services to meet increasing client demand. We are seeking highly motivated Managers and Senior Managers to join our team, lead...
MYR 2,000 - 3,000 per month
...receipts while providing excellent service to B2B clients. -Inventory Management: Conduct accurate stock checks and manage inventory levels effectively. -Store Operations: Maintain a clean and organized store environment; ensure all products are displayed...- ...in IAAS, Public Cloud, or IDC (Data Center) environments, as well as familiarity with SAAS solutions (particularly in the DDOS or Security Domain), AWS, Cloud platforms, or CDN services, will be highly regarded; however, candidates with proven sales experience or backgrounds...
- ...BAE Systems Digital Intelligence is home to 4,500 digital, cyber and intelligence experts. We work collaboratively across 10 countries... ...research, penetration testing & enterprise defensive security. We are looking for an enthusiastic candidate to work as...
- ...Job Description Get to Know the Team The Cyber Risk & Control team is part of Grab's Cyber Security - Cyber Assurance function. We keep Grab's operations... ...and compliance data sources, so partners at any level can read the risk picture without needing a walkthrough...
- ABOUT SWIPEY Swipey is a B2B spend management platform built for Malaysian businesses. We help companies control, automate, and track company spending — and we run our own finance ops the same way: lean, automated, and always improving. ABOUT THE ROLE This is a hands-on...
- Job Scope/Description: -Data Entry Duties - Accurately enter, update, and maintain data in company databases, spreadsheets, or systems. - Verify data for accuracy and completeness before entry. - Perform regular data backups and ensure data integrity...
- ...talent to join our growing team in Kuala Lumpur! Within our Security Team, you are responsible for the implementation, the administration... ...more than 430 customers worldwide in controlling their cyber risks from the anticipation of threats to the ability to react...
- ...Cyber security is one of the most important risks facing businesses today. Systems, applications, and processes are becoming increasingly interconnected and automated and many organizations are now reliant upon technology to drive business strategy and growth. Our...
- ...experience available, servicing traders of all levels from beginners to institutional-level... ...Axi colleagues safe in the world of Cyber. With a key focus on engineering and automation... ...on implementing strategic solutions to security problems, providing a secure environment...
- ...center in Kuala Lumpur that provides high-level information technology and engineering... ...you will play in the team As a Network Security Engineer, you will play a critical role in... ...and standards, protecting against evolving cyber threats. This role involves operating and...
- ...discretion in preparing these deliverables. No second-level review occurs. Provides quotation,... ...accurately. ~ Possesses basic clerical and data entry skills. ~ Preferred experience in F5/Citrix/A10 and security solution related. ~ Able to perform basic mathematical...
- ...Our teams design and deliver intelligent, secure, and high-performance digital solutions... ...here. Why We Need You The Service Desk Analyst (L1 & L2) is responsible for delivering... ...across the organization, combining first-level issue handling with advanced second-line...
- ...customers’ participation details received from different channels. -Process submission with the stipulated Service Level Agreement (SLA). -Accurate data entry. -Consistent follow up with the customer on their participation details. -Highlight / recommend any...
MYR 16,000 - 18,000 per month
...Competitive Salary ~Opportunity to hone your skills as a Salesforce Security Product Owner About Our Client A large organization in... ...roles, APIs, and integration controls. ~Contribute to cyber security standards, patterns, and reusable guidance for CRM platforms...- ...Job Description 1: M365 Security Architect Role Level: Senior / Lead Experience: 5+ Years in Large-Scale Infrastructure Design Role Purpose The M365 Security Architect will lead the design and governance for a 40,000-user M365 transformation. You will...
- ...Responsibilities: To control and monitor all entry and exit points for employees, visitors, contractors, and vehicles; to verify authorization... ...operate gates and automatic barriers according to scheduled and secure them after working hours; to conduct inspections on delivery...
- ...IT Security & Service Management – Engineers, Specialists & Analysts Location: Bangsar South Employment Type: Full-Time Work Environment: On-site | 24... ...including weekends/public holidays) Experience Level: Mid to Senior (3–7+ years) About the Role:...
- ...requirements. -Ensure compliance with Bursa Securities/ stock exchange requirements, statutory... .... -Review and approve journal entries, reconciliations, and accounting... ...and manage multiple priorities. -High level of integrity, attention to detail, and commercial...
- ...We're Hiring: L2 Security Engineer (SOC) / Senior Security Analyst Location: Kuala Lumpur (KL Sentral) Work... ...customers in strengthening their cyber resilience, digital infrastructure... ...handle security incidents and provide Level 2 (L2) support during analysis and...
