Get new jobs by email
- ...supporting the coordination and facilitation of assurance and accreditations related activities within the Operations & Technology – Information Security and Resilience function. The person will be primarily responsible for ensuring compliance to the TMF Group’s ISAE 3402...
- ...Summary Support the business by driving information security, IT risk, and compliance initiatives in line with local, regional, and global standards. Key Responsibilities Partner with IT, Risk, Compliance, Audit, and business stakeholders to align security...
- ...Why This Role Matters Our client is seeking a high-caliber Information Security Lead to take global ownership of their cybersecurity posture. In this role, you aren’t just a monitor; you are the architect of the policies and technical best practices that protect mission...
- DUG is looking for an Information Security Manager to join our global team. In this role, you'll take ownership of our cybersecurity posture, shaping policies, monitoring for threats, and implementing best practices to protect our data, systems, and users. We operate primarily...
- ...technology providers, we craft transformative digital experiences that enhance customer engagement and drive business success. \n Information Security Responsibilities Promote and enforce awareness of key information security practices, including acceptable use of...
- ...excellence! We are looking for key talents to develop in the following areas: Information Technology Operations Desktop Service Digitalization / Automation Information Security Network Cybersecurity Penetration Testing Our ideal candidate:...
- ...An international technology organisation operating large-scale compute and cloud environments is seeking an experienced Information Security Manager to lead and strengthen its global cybersecurity posture. This role will be responsible for shaping security strategy...
- Senior Information Security Specialist page is loaded## Senior Information Security Specialistlocations: Shah Alamtime type: Full timeposted on: Posted 2 Days Agojob requisition id: JR2026007180Joining Razer will place you on a global mission to revolutionize the way the...
- ...organisation operating large-scale compute infrastructure and cloud-based environments is looking to appoint an experienced Information Security Manager to strengthen its cybersecurity capabilities. This role will be responsible for leading the organisation’s cybersecurity...
- Information Security Analyst page is loaded## Information Security Analystlocations: Bandar Bayan Baru, MYStime type: Full timeposted on: Posted Todayjob requisition id: R-107796At Swarovski, where innovation meets inspiration, our people desire to explore, experience,...
- ...If you want to shape a brighter future at AIA Digital+, please read on.**About the Role**This role provides end‐to‐end local Information Security support to Group Information Security Managed Marketed. (Predominantly for AIA Sri Lanka), operating from ITM Malaysia. The...
- ...competitive advantage. **About the Role** a strong foundation in modern security operations. Join our international SOC team and play an active... ...Applicant Privacy Policy.Click to review Legal Notices and Information.Gen is committed to requests for reasonable accommodations to...
- ...Job Responsibilities: Help and support the head of department with the day-to-day information security tasks, such as risk assessment, monitoring, reporting, and advice. Responsible for locating and fixing security flaws in the networks and computer systems of an...
- ...The Security Operation Lead is responsible for leading Tranglo’s Security Operations function, including 24x7 monitoring, incident response... .... Required skills & qualification ~ Bachelor’s degree in Information Security, Computer Science, or equivalent experience. ~4+...
- ...global supply chain has access to the Flash memory it needs to keep our world moving forward. Job Description As Information Security Analyst (Level 3), you will play a key role in shaping and operationalizing Sandisk’s enterprise Information Security...
- ...and Access Management (IAM) operation services for APAC. Ensure secure & timely access to systems and resources. Collaborate with... ...Job Qualifications Required: • Bachelor’s Degree in Information Technology, Computer Science or related field. • 5 years...
- Job Responsibilities: -Develop and maintain systems using Java and other relevant programming languages. -Participate in system design, development, testing, and implementation. -Troubleshoot, debug, and enhance existing applications to improve performance and functionality...
- ...Relevant Diploma with 1 year working experience in the same or related field. Diploma or Bachelor's degree in Computer Science/Information Technology/Computer Engineering with 3 years working experience in the same or related filed. Salary RM2.2K and above depending on...
- ..., and proper data transformation for reporting and analysis. Security and System Performance -Ensure secure data transmission and... ...: -Diploma or Bachelor’s Degree in Computer Science, Information Technology, or related field. -Minimum 3 years of experience...
- ...by helping track IT project handovers, sales forecasts, and operational updates. -Assist in gathering market and competitor information in the government IT space to support pricing, costing, and business insights. -Help prepare reports for management, ensuring...
MYR 120,000 - 180,000 per year
...Compensation ~High-Impact Industry About Our Client The client is a long‑established global organisation specialising in business information, risk insights, and trade‑related solutions. With a diverse international workforce, they operate across numerous markets and...- ...be helping to develop cutting-edge solutions to solve real-world energy problems. We are currently seeking a System Engineer, Information Management to join our team based in Kuala Lumpur. Successful candidates will be offered Fixed Term Contract. About us:...
- ...and technology center in Kuala Lumpur that provides high-level information technology and engineering expertise to ExxonMobil's Upstream,... ...Depending on business needs, placements are made in Cyber Security, Cloud Technology, Software Development and Productivity solutions...
- ...analytical and problem-solving skills to deal with the challenges and complexities of the automation process. Additional Information #LI-SK1 WD thrives on the power and potential of diversity. As a global company, we believe the most effective way to...
- ...world. With nearly 80 years of global experience, we offer companies a full range of solutions: Trade Credit Insurance, Business Information, Debt Collection, Single Risk insurance, Surety Bonds, Factoring — all driven by a unique data patrimony, cutting-edge technology...
- ...The Admin and Security Supervisor is responsible for coordinating office functions, supervising security personnel and maintaining strict... ..., dedicated, responsible and teamwork Additional Information Are you ready to Unleash Your Possibility within JDE Peet'...
- ...automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and... ...investigative role in security incidents providing essential information to key control points. Drive improvements in threat...
- ...and technology center in Kuala Lumpur that provides high-level information technology and engineering expertise to ExxonMobil's Upstream,... .... What role you will play in our team Cyber Security is responsible for identifying, detecting, protecting against,...
- -Responsible for maintaining and supporting the organization’s IT infrastructure, including servers, networks, systems, and applications. -Ensures smooth operation with minimal downtime, performs system backups, and provides technical support to users. -Handles...
MYR 178,200 - 217,800 per year
...maintain identity and access management (IAM) solutions to ensure secure and efficient access to systems. ~Monitor and enforce... ...A successful IAM Security Engineer should have: ~A degree in Information Technology, Cybersecurity, or a related field. ~Strong knowledge...

