Get new jobs by email
- ...supporting the coordination and facilitation of assurance and accreditations related activities within the Operations & Technology – Information Security and Resilience function. The person will be primarily responsible for ensuring compliance to the TMF Group’s ISAE 3402...
- ...Summary Support the business by driving information security, IT risk, and compliance initiatives in line with local, regional, and global standards. Key Responsibilities Partner with IT, Risk, Compliance, Audit, and business stakeholders to align security...
- ...Why This Role Matters Our client is seeking a high-caliber Information Security Lead to take global ownership of their cybersecurity posture. In this role, you aren’t just a monitor; you are the architect of the policies and technical best practices that protect mission...
- ...An international technology organisation operating large-scale compute and cloud environments is seeking an experienced Information Security Manager to lead and strengthen its global cybersecurity posture. This role will be responsible for shaping security strategy...
- DUG is looking for an Information Security Manager to join our global team. In this role, you'll take ownership of our cybersecurity posture, shaping policies, monitoring for threats, and implementing best practices to protect our data, systems, and users. We operate primarily...
- ...organisation operating large-scale compute infrastructure and cloud-based environments is looking to appoint an experienced Information Security Manager to strengthen its cybersecurity capabilities. This role will be responsible for leading the organisation’s cybersecurity...
- ...Why This Role Matters At Finexus, security is fundamental to the trust our clients place in our SaaS, infrastructure, and outsourcing services for the banking and financial industry. The Information Security Engineer plays a critical role in protecting our systems, data...
- ...services. At ADE, we are dedicated to ensuring world-class security and performance across all our products and services. The... ...Security Analyst is a key part of this mission, supporting the Information Security department with a hybrid role of Governance (GRC) and...
- ...global supply chain has access to the Flash memory it needs to keep our world moving forward. Job Description As Information Security Analyst (Level 3), you will play a key role in shaping and operationalizing Sandisk’s enterprise Information Security...
- ...establish and track quantifiable performance metrics. Lead complex security projects from initiation to closure. Proactively manage and... .... Requirements: Bachelor's degree in Computer Science, Information Security, or a related field At least 3 years of experience...
- ...Swarovski, where innovation meets inspiration, our people desire to explore, experience, and create. We are looking for an Information Security Analyst where you will get a chance to work in a rewarding role within a diverse team that is pushing boundaries. Be part of...
- ...Be a part of something BIG! The Senior Information Security Specialist will be responsible to provide independent security architecture and risk assurance across technology initiatives, ensuring that information security risks are identified early, assessed consistently...
- ...Chief Security Information Officer, CISO, Malaysia At AIG, we are reimagining the way we help customers to manage risk. Join us as a Chief Security Information Officer, Malaysia to play your part in that transformation. It's an opportunity to grow your skills and...
- ...Role Summary As a content reviewer, you will be tasked with working on workflows that focus on apps that pose security risks to users. Collaborate with multiple teams such as cyber security experts, client stakeholders and other peer teams for resolution management...
- ...Hong Kong Stock Exchange under the stock code 1828. For more information, please visit FWD Technology and Innovation Malaysia Sdn.... ...business and technology services such as information security, cloud operations, IT solutions delivery, digital and data, actuarial...
- ...and Access Management (IAM) operation services for APAC. Ensure secure & timely access to systems and resources. Collaborate with... ...Job Qualifications Required: • Bachelor’s Degree in Information Technology, Computer Science or related field. • 5 years...
- ...Hong Kong Stock Exchange under the stock code 1828. For more information, please visit FWD Technology and Innovation Malaysia Sdn.... ...business and technology services such as information security, cloud operations, IT solutions delivery, digital and data, actuarial...
- ...We are seeking a pragmatic and hands-on Chief Information Security Officer (CISO) to lead and mature the organisation's cybersecurity capabilities across the region. This role is responsible for defining and executing the company's information security strategy, strengthening...
- Full time Information security Engineering specialist Malaysia, Kuala Lumpur 2026-01-29 10 days ago IT&S Apply Facebook Linkedin Twitter Instagram Email Copy Link Full time RQ097465 Information security Engineering specialist...
- ...About The Team As a Senior Information Security Specialist at ShopeePay & Monee Malaysia, you will play a key role in safeguarding our digital assets, information systems and data. You will leverage your extensive information security/cybersecurity experience to develop...
- ...can't wait, let's shape it together! British American Tobacco DBS has an exciting opportunity for an APMEA Regional Information Security Officer in Sunway City The APMEA Regional Information Security Officer plays a pivotal role in managing and supporting Cyber...
- ...Job Responsibilities: # Act as the Lead of IT Security, supporting business, technology, and security operational requirements, with... ..., and enforcement of IT infrastructure security standards and information security processes. # Ensure the protection of data and...
- ...Job Description: Monitor and analyze security related alerts through the various platforms. Conduct timely investigation of alerts, perform analysis and event triage. Leverage security research, security assessment, operations, and incident response to ensure security...
- ..., and proper data transformation for reporting and analysis. Security and System Performance -Ensure secure data transmission and... ...: -Diploma or Bachelor’s Degree in Computer Science, Information Technology, or related field. -Minimum 3 years of experience...
- ...Job Description: Assist in security risk governance, identifying basic vulnerabilities, and supporting control implementation. Support technical assessments of network documentation and infrastructure processes for common security risks. Collaborate with Engineering...
- ...Hong Kong Stock Exchange under the stock code 1828. For more information, please visit FWD Technology and Innovation Malaysia Sdn.... ...business and technology services such as information security, cloud operations, IT solutions delivery, digital and data, actuarial...
- ...competitive advantage. **About the Role** a strong foundation in modern security operations. Join our international SOC team and play an active... ...Applicant Privacy Policy.Click to review Legal Notices and Information.Gen is committed to requests for reasonable accommodations to...
- ...In this exciting role, you'll provide Information Security expertise, advice and guidance for all routine YTL Utilities UK and Wessex Water business operations. You'll help develop, buy, and deliver systems that are secure from the start, and support the upkeep of...
- -Responsible for maintaining and supporting the organization’s IT infrastructure, including servers, networks, systems, and applications. -Ensures smooth operation with minimal downtime, performs system backups, and provides technical support to users. -Handles...
- ...Job Description: Embed security principles into the design of system architectures to mitigate the risks posed by new technologies and business practices. Leverage security research, security assessment, operations, and incident response to ensure security across...

