Get new jobs by email
- ...globe, giving them the vital edge in their markets. Make an impact Global contact person within Swisslog for all Information Security Management System (ISO) related activities. Responsible for the global ISO 27001 implementation and certification according to...
- ...Summary: Lead access services team and manage the organization Identity and Access... ...IAM) operation services for APAC. Ensure secure & timely access to systems and resources... ...Required: • Bachelor’s Degree in Information Technology, Computer Science or related...
- ...A Safety and Security Manager is responsible for managing all aspects of security for assigned hotels to deliver a safe Guest and Member... ...patience, tact and diplomacy to diffuse anger and collect accurate information Experience in Safety and Security Management Fire...
- ...to develop in the following areas: Information Technology Operations Desktop Service... .../ Automation Information Security Network Cybersecurity Penetration... ...business projects. Interact with senior management teams and our alumni GTT network....
- ...helping to develop cutting-edge solutions to solve real-world energy problems. We are currently seeking a System Engineer, Information Management to join our team based in Kuala Lumpur. Successful candidates will be offered Fixed Term Contract. About us:...
- ...about the role Sitting within Technology, Intelligence, Security and Crisis Management (ISC) is the overarching function which delivers geo-... ...risk appetite. In coordination with the RSM facilitate information exchange with the BSRs in relation to security threats...
- ...organization, apply now. We are currently seeking a Test Manager - Application Security & Penetration testing to join our team in Kuala Lumpur,... ...looking for people with ~ Bachelor ’ s degree in information security, Computer Science, or related field. ~...
- ...expert community of science, safety and security, as well as digital specialists, our aim... ...driven and experienced Security Project Manager to lead security focused initiatives across... ...Security certifications: Certified Information Security Manager (CISM) or Certified Information...
- ...'s the role? Join us as an Intern in our Product Portfolio Management team and you will work on exciting projects in Operation Excellence... ...process expert for systems and processes all around product information, you will: 1. Consult and support the Global Marketing...
- ...Purpose Statement: Develop and implement an effective global security strategy and program to mitigate risk, safeguard the... ...ensure continuity of operations. Responsible for the day to day management of all Physical Security software/applications, working in close...
- ...Description The Professional 1, Information Technology role is a critical position... ...fulfillment. Implement and uphold IT Incident Management protocols, including timely escalation... ...system functionality. Administer IT Security solutions and Patch Management systems,...
- ...Develop and maintain the organization's IT security governance framework in alignment with... ...recommendations for improvements. ~Manage security risk assessments and ensure mitigation... ...Governance) should have: ~A degree in Information Technology, Computer Science, or a...
MYR 120,000 - 150,000 per year
...development. Job Description ~Develop and implement IT security policies and procedures to protect company systems... ...The Successful Applicant A successful IT Security Manager should have: ~A degree in Information Technology, Cybersecurity, or a related field. ~...- ...Providing application support to resolve software bugs, performance issues, or user errors. -Performing routine maintenance, managing configurations, and monitoring application health -Primary point of contact for users, offering guidance, and resolving usability...
- ...Job Description 1: M365 Security Architect Role Level: Senior / Lead Experience... ...) Encryption & Compliance: Information Protection & DLP (DSC01). Defender Suite... ...(TP05). Governance: Data Lifecycle Management (DSC02), eDiscovery (DCS03), and Auditing...
- ...growing team in Kuala Lumpur! Within our Security Team, you are responsible for the... ...reporting to protect strategic customer information and infrastructure! # Be the last line... ..., EDR, Vulnerability assessment, Patch management Log management would be a plus Or...
- ...companies a full range of solutions: Trade Credit Insurance, Business Information, Debt Collection, Single Risk insurance, Surety Bonds,... ...term vision Clear definition and execution of GTM strategy Manage and lead BI sales team members to execute the strategy in...
- ...What will I be doing? As the Security Officer, you will be responsible for performing... ...visitors and report any suspicions to the Management. Conduct random bag inspections of... ...suspicious people enter the elevator, promptly inform CCTV and relevant departments to pay...
- ...Heartist ®. Job Description Supervises Security personnel on assigned shifts to ensure... ...In the absence of the Safety/Security Manager, functions on assigned shift as primary... ...corporate, and management directives. Informs the Safety/Security Manager or designee...
- ...The opportunity EY is looking for Manager/ Senior Manager for Technology Consulting... ...clients’ assignments in the areas of: Information management and business intelligence... ...views on applications, integration, data, security, operations and development You’ll lead...
- ...communication and collaboration abilities. Willingness to learn and adapt to new technologies and programming languages. Additional Information WD thrives on the power and potential of diversity. As a global company, we believe the most effective way to embrace the...
- ...Provide 2nd level support for network security services deployed in the Cloud, covering technologies such as Firewalls, web proxies... ...to the network security infrastructure follow the change management process ensuring all changes are documented and can be supported...
- Job Responsibilities: -Develop and maintain systems using Java and other relevant programming languages. -Participate in system design, development, testing, and implementation. -Troubleshoot, debug, and enhance existing applications to improve performance and functionality...
MYR 180,000 - 250,000 per year
...ensure operational stability. ~Oversee the organization's information security framework, ensuring compliance with relevant regulations and... ...The Successful Applicant A successful Information Security Manager - Business Continuity, Disaster Recovery should have: ~A degree...MYR 10,500 - 19,500 per month
...Security Operations Center (SOC) Manager Petaling Jaya, Selangor, Malaysia Recruit Hero helps talents to connect with best companies and jobs... ...Certificate from a recognized institution, preferably in IT/Information Systems/ Computer Science/ Computer Engineering or any...- Full Time Gaji RM 2200- RM2500 Caruman KWSP , SOCSO & SIP Lokasi Batu Cave Berminat hubungi +601123709167 (Firdaus) & +0193586918 (Mr Jeyabalan)
MYR 16,000 - 18,000 per month
...Opportunity to hone your skills as a Salesforce Security Product Owner About Our Client A... ...27001. ~Advise on identity and access management, data protection, logging and... ...services. ~Collaborate closely with Business Information Security Leads (BISLs), platform teams,...- Are you a security expert with a passion for IT Security and a commitment to protecting... ...compromise (BEC) attacks. -Vulnerability Management, Pentest and Reporting: Assist in... ...degree in Cybersecurity, Computer Science, Information Technology, or a related field (or...
- ...Our teams design and deliver intelligent, secure, and high-performance digital solutions... ...Cloud environments Implement and manage cloud security platforms, including CSPM... ...Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent...
- ...Kuala Lumpur that provides high-level information technology and engineering expertise to... ...role you will play in our team Cyber Security is responsible for identifying, detecting... ...time-sensitive cyber security incident management and threat response. Identify and...
