Get new jobs by email
- ...0+ KYC-verified users across Asia and are backed by top-tier investors including Further Ventures, Matrix Partners, Delphi Digital, Hack VC, QCP, and SIG. Brand promise: Smart money moves made easy. We’re simplifying finance for the next generation—through technology...
- ...40,000+ KYC-verified users across Asia and are backed by top investors including Further Ventures, Matrix Partners, Delphi Digital, Hack VC, QCP, and SIG. Our brand vision is bold but clear: Smart money moves made easy. We’re simplifying the financial world for the...
- ..., Azure, Alibaba, Google Cloud, etc. Knowledge on SDN, orchestration or multi-vendor integrated deployment. Knowledge on hacking technique, exploit simulation or penetration test. Excellent communication and presentation skills. Why Join Us:...
- ...Are you a bold, creative, and results-driven marketer who thrives on hacking growth, launching game-changing campaigns, and shaping the future of work? We are looking for a Head of Marketing to supercharge our expansion, amplify our brand, and drive high-impact marketing...
- ...friendly rapport with strangers, and build implicit trust through your interactions with them. Flexible. The role is ultimately a growth hacking role; the specific tasks you might work on may vary as we learn new and better ways of acquiring clients. Plus, the role will...
- ...Asia is opening selective seats for aspiring IT professionals to transition into AI Engineering roles through our “Break into AI: Hack to Hire” program happening in Kuala Lumpur, Malaysia from 27 th Nov – 12 th Dec 2025 . This is not a theory course. This is a 2...
- ...Description Source new sales opportunities through inbound lead follow-up, outbound campaigns (call and email), and sales growth hacking campaigns. Research potential leads from business directories, web searches, or digital resources. Maintain your target list....
- ...tackle real-world cybersecurity challenges across risk & governance, awareness & training, internal consulting, engineering, ethical hacking, incident response, and operational technology (OT) security. Internship Tracks Available in 2025 Cybersecurity Governance,...
- ...web and mobile apps that help improve the lives of people around the world. We’ve helped companies like Daikin, Acson, Recruitopia, Hack In The Box, The Malaysian Insight, and Teleme take their idea from napkin sketches to real-shipped applications. We're currently building...
- ...web and mobile apps that help improve the lives of people around the world. We’ve helped companies like Daikin, Acson, Recruitopia, Hack In The Box, The Malaysian Insight, and Teleme take their ideas from napkin sketches to real-shipped applications. We're currently looking...
- ...web and mobile apps that help improve the lives of people around the world. We’ve helped companies like Daikin, Acson, Recruitopia, Hack In The Box, The Malaysian Insight, and Teleme take their idea from napkin sketches to real-shipped applications. We're currently looking...
- ...in both English and Mandarin. (Mandarin is a plus point) - A knack for creative thinking, innovation, and a drive for growth hacking strategies. -A challenge seeker and a problem solver. -Self-motivated and a team player. -Can-do attitude and grit to...
- ...the integrated media and CRM strategy. This is a pivotal leadership role where you will be the catalyst for a data-enabled growth-hacking mindset across our entire portfolio of brands in SEA markets. You will own the full-funnel consumer journey from acquisition to...
- ...tracking. Do Not Apply If -You think SEO = “writing articles” -You rely on AI-content spam / bulk-publish / “tool-based SEO hacks” -You need to be “told what to do” every week -You want a slow, cozy, low-urgency marketing role -You avoid ownership,...
- ...strategic direction into actionable processes and improve revenue across all assigned accounts. Revenue Growth: Identify growth hacking opportunities for current advertisers to accelerate their outcome goals. Participate in new business and pitch strategy development...
- ...experience of our web platform. You will be working toward the mission of delivering a WOW experience to our customers. You will be hacking in TypeScript and leading frontend technologies. We expect you to be passionate about merging usability with visual design and...
- ...markets. 3. Leadership and Talent -Direct, mentor and upskill a diverse team; build an always-learning culture (weekly tool demos, hack-days). -Champion inclusive hiring; foster cross-market collaboration and knowledge sharing. -Represent Production and...
- ...to manage multiple tasks and projects with a calm demeanour and work under pressure. -Strong passion in Cyber Security and stays updated with emerging threats and news. -Adhere to ethical hacking principles and comply with all relevant regulations and standards.
- ...growth. Product Marketing Innovation: Lead cutting-edge marketing campaigns for new product launches utilizing data-driven growth hacking tactics to ensure rapid market penetration and sustained engagement. Corporate Communications Excellence: Direct all aspects of...
- ...Certification/Licensing Requirements Certified CRISC (Certified Risk Information Systems Control) by ISACA Certified CHFI (Certified Hacking Forensic Investigator) by EC-Council Certified ECSA/LPT (Certified Security Analyst) by EC-Council Certified CEH (...
- ...creative industries. ~ Proven experience in a marketing leadership roles, with success in leading marketing strategies and growth hack for SaaS, cloud-based platforms, or digital products. ~ Experience with global brand management, particularly in the creative...
- ...relative levels of related experience will be considered).* At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.* Possession of industry-relevant certifications such as CompTIA Security+...
- ...Perform internal and external penetration tests on systems, networks, and applications to identify security weaknesses. Ethical Hacking: Simulate real‑world attack scenarios to assess system resilience. Use creativity, persistence, and just enough mischief to make defenders...
- ...or cyberattacks and incident response; Coordinate threat management and recovery against cyber threats (e.g., malware, phishing, hacking); Ensure timely reporting IT Security related incidents (cyberattacks, etc.) to senior management, the Board and regulators and...
- ...optimizer) Distributed computing environment Integration with financial exchange platforms and systems Systems with an increased hack resistance Secure communication protocols Technologies applied: C++, IPC, multiprocessing, TCP, asynchronoussockets, OpenCL,...
- ...requirement. ~ One or more professional, currently-held certifications related to Digital Forensics, Incident Response, or Ethical Hacking highly preferred (e.g., GCIH, GMON, GCED, GSOC, CEH, GCFE, GCFA, CFCE, ENCE). Information security management certifications (CISSP...

