Get new jobs by email
- Security Analyst page is loaded## Security Analystlocations: Remote Malaysiatime type: Full timeposted on: Posted Todayjob requisition id... ...Qualifications and Skills*** Bachelor’s degree in computer science, Information Technology, or related field (or equivalent experience).*...
- Senior Business Analyst page is loaded## Senior Business Analystlocations: Kuala Lumpur, Malaysiatime... ...to creating innovative, scalable, and secure platforms and services for patients,... ...time zones.* Actively engage and inform stakeholders across the business on progress...
- A leading technology firm is seeking an experienced Technical Project Manager in Shah Alam, Malaysia. You will manage client relationships, ensure project delivery, and work with cutting-edge blockchain technologies. Ideal candidates will have over 5 years of experience...
- Organisational Data Senior Analyst page is loaded## Organisational Data Senior Analystremote... ...in the form of providing guidance and information to employees, managers and HR relating... ...Extract, Global Perspective, Information Security, Leading transformation, Management...
- ...India The Role: Due Diligence, Sr. Analyst The Team: We are a Client Due... ...experts (SMEs) and clients, ensuring that all information shared is timely, accurate, and complete... ...Working knowledge of industry information security and privacy standards including, NIST...
- ...Job Description: Security Strategy & Governance Lead the development, implementation, and maintenance of a comprehensive information security framework, policies, procedures, and guidelines. Ensure that the organization's security posture aligns with compliance...
- ...Description: Cyber Security Expertise: Strong understanding of cybersecurity principles, practices, and technologies. Knowledge... ...with cross-functional teams to communicate complex technical information to non-technical stakeholders. Strong understanding of...
- ...Job Summary Were hiring a Security Compliance Analyst to help strengthen client trust and support our sales growth through clear reliable... ...Engineering teams to validate security and compliance information. Maintain and organize the companys security and compliance...
- ...Responsibilities Acts as a team leader providing guidance to Security Engineering team and sets goals and assists the team in... ...Requirements: A Bachelor's Degree in Computer Science, Engineering, Information Systems or its equivalent. Minimum 8-15 years of related...
- ...Knowledge, Skills and Experience: ~2 to 5 Years of relevant work experience. ~ High School Graduate with Engineering or Information Technology field of study required. ~ Post-Sales implementation certifications for engineers. ~ Able to execute instructions...
- ...passionate and detail-oriented Cybersecurity Analyst with 13 years of hands-on experience and a CCSP (Certified Cloud Security Professional) certification. The ideal... ...Bachelors degree in Computer Science, Information Technology, Cybersecurity, or a related field...
- ...will be part of a dynamic team of specialist involved t o deliver various types of training courses and auditing related to Information Security & IT Service Management and share knowledge and experiences against ISO 27001 ISO 20000 and BSI standards against current...
- ...Job Description: 1. Monitor and advise on information security issues related to IT systems, ensuring that internal security controls are appropriate and effectively implemented. 2. Plan, coordinate, and execute cybersecurity projects in alignment with the company's...
- ...Strategic Cybersecurity Initiatives Assist the Manager of Security Technology & Project Delivery in driving enterprise-wide cybersecurity... .../ Experience 1. Bachelor's Degree in Computer Science, Information Technology, or equivalent qualifications 2. Minimum 4-6...
- ...Join Xsolla as an Application Security Specialist, where you'll dive deep into our infrastructure, architecture, services, and tools... .... Actively participate in the Bug Bounty program and other information security incident investigations. Regularly utilize tools like...
- ...committed to creating a workplace where everyone feels valued empowered and inspired to grow. Our mission is to securely connect people places and information with end-to-end technology solutions at scale. At New Era youll join a team-oriented culture that...
- ...its users. The Group currently has offices in Singapore Indonesia Malaysia and more information on WhiteCoat please visit . What you will be doing The Information Security Senior Executive is responsible for embedding security into the entire software development...
- .... Join us and make a difference too! Job Title: Financial Analyst Location: Kuala Lumpur, Malaysia (Hybrid - 2 days per week... ...disability or impairment throughout our recruiting process, please inform your Talent Acquisition Partner. About Us BSI is a...
- ...Job Description: Security Analyst (Japanese Speaker) About DXC Technology: We are a Fortune 500 global IT services leader. Our... ...effectively implement corporate security policies on existing information system. Any other related work as requested by the Lead /...
- ...in the execution of clients’ assignments in the areas of: Information management and business intelligence IT strategy, architecture... ...architectural views on applications, integration, data, security, operations and development You’ll lead the team on client...
- ...experienced, attempted solutions or work-around, and other relevant information. Complete time critical assignments or service request by... ...with data programming/administration, mobile development and security as more information is provided online and via the cloud. ~...
- ...What are we looking for An Information Technology Executive serving Hilton Brands is always working on behalf of our Guests and working... ...of networking Windows Server environments and IT security protocols. Familiarity with hotel systems such as Opera PMS...
- ...individual and team goals · Protect confidential and sensitive information and materials · Observe strict compliance to licensing,... ...trademark legislation · Accomplish other duties as required · Adhere to all DXC Policies & Procedures – Including Security and SOBC...
- ...projects (e.g., Azure, AWS), ensuring scalability, resilience, and security of IT infrastructure and applications. * Champion digital... ...capabilities. * Strengthen cybersecurity practices, data governance, and information security across the organisation. * Deliver strategic planning...
- ...other servers including Energy Components, XHQ, etc.) The PI Analyst position includes providing implementation work and ongoing support... ...Requirements: Bachelor's degree in a relevant discipline (Information Systems, Computer Science, etc.) A minimum of 5 years of...
- ...Role Purpose : The Business Analyst primary role is to analyse, understand and document business users requirements in a manner that... ...users, IT application teams, data governance and enterprise information management teams 2. Develop analytical and reporting solutions...
- ...Job title: Security Incident Analyst Level 2 (Shift Basis) Location: Malaysia World-changing careers enabled by Johnson Matthey. With... ...ensuring that all security incidents/problems raised via the information security stack are resolvedin a timely and professional...
- ...KPI. Roles and Responsibilities 1 CSiPOS New Business(NB) Submission Onboarding: Validate all submitted documents and information for CSiPOS NB cases within the stipulated turnaround time(TAT) and ensure accuracy. Defer cases with incomplete or incorrect...
- ...are paid positions-offering opportunities to use what you've learned at university on real projects. We are looking for Information Technology interns from these backgrounds: Information Technology, Computer Science, Information System & CyberSecurity...
- ...IT Security & Service Management Engineers Specialists & Analysts Location: Bangsar South Employment Type: Full-Time Work Environment: On... ...ownership or support key areas such as network and information security incident problem or change...


