Get new jobs by email
- ...the globe, giving them the vital edge in their markets. Make an impact Global contact person within Swisslog for all Information Security Management System (ISO) related activities. Responsible for the global ISO 27001 implementation and certification...
- ...with the appropriate functional teams to collect and summarize information to establish proposals. Ensures contract terms and... ...final quote. Ensure project reviews for all sales projects to secure final approval from all departments (finance, engineering, project...
- ...Why This Role Matters Our client is seeking a high-caliber Information Security Lead to take global ownership of their cybersecurity posture. In this role, you aren’t just a monitor; you are the architect of the policies and technical best practices that protect mission...
- ...Summary Support the business by driving information security, IT risk, and compliance initiatives in line with local, regional, and global standards. Key Responsibilities Partner with IT, Risk, Compliance, Audit, and business stakeholders to align security...
- ...organisation operating large-scale compute infrastructure and cloud-based environments is looking to appoint an experienced Information Security Manager to strengthen its cybersecurity capabilities. This role will be responsible for leading the organisation’s cybersecurity...
- ...departments to ensure customer commitments align with production and to secure necessary resources -Collaborate with procurement teams to... ...member -Communicate project status, updates and technical information to team members and stakeholders -Work closely with cross-...
- ...and Access Management (IAM) operation services for APAC. Ensure secure & timely access to systems and resources. Collaborate with... ...Job Qualifications Required: • Bachelor’s Degree in Information Technology, Computer Science or related field. • 5 years...
- ...talent to join our growing team in Kuala Lumpur! Within our Security Team, you are responsible for the implementation, the administration... ...analysis and reporting to protect strategic customer information and infrastructure! # Be the last line of defense before a disaster...
- - Providing application support to resolve software bugs, performance issues, or user errors. -Performing routine maintenance, managing configurations, and monitoring application health -Primary point of contact for users, offering guidance, and resolving usability...
- Job Responsibilities: -Develop and maintain systems using Java and other relevant programming languages. -Participate in system design, development, testing, and implementation. -Troubleshoot, debug, and enhance existing applications to improve performance and functionality...
- ...storage and on-site guest support -Collect cash payments and security deposits -Handle damage claims (e.g. submit via Airbnb)... ...and automated messages -Maintain and update building/unit information records Admin Coordination -Record and track unit defects...
- ...Job Description 1: M365 Security Architect Role Level: Senior / Lead Experience: 5+ Years in Large-Scale Infrastructure Design... ...Expertise (M365 Components) Encryption & Compliance: Information Protection & DLP (DSC01). Defender Suite (Design/Strategy):...
- ...Maintain relevant configuration parameters specific to assigned warehouses in the Warehouse Management System, within the boundaries of security profile/role. Prepare and provide monthly reports as required by management. Update and communicate KPIs and best practices...
- ...A Safety and Security Manager is responsible for managing all aspects of security for assigned hotels to deliver a safe Guest and Member... ..., tact and diplomacy to diffuse anger and collect accurate information Experience in Safety and Security Management Fire Safety...
- ...us and become a Heartist ®. Job Description Supervises Security personnel on assigned shifts to ensure compliance with policies... ...compliance with government, corporate, and management directives. Informs the Safety/Security Manager or designee of anything that...
- ...-Coordinate statutory contributions and ensure compliance with regulations, including Employees Provident Fund Malaysia, Social Security Organization Malaysia, and Employment Insurance System Malaysia -Maintain employee records and ensure HR documentation is accurate...
- ...Job Description: Senior Network Security Engineer Let me tell you about the role As a Connectivity Information Security Engineering Specialist you will provide advanced technical expertise to support information security and risk activities specific to your specialism...
- ...consultations. -Visual Presentation Maintain high visual merchandising standards and ensure the store always looks its best. -Security and Care Follow strict security procedures and handle luxury items with professionalism and vigilance. [Apply now at ; JOB...
- ...world. With nearly 80 years of global experience, we offer companies a full range of solutions: Trade Credit Insurance, Business Information, Debt Collection, Single Risk insurance, Surety Bonds, Factoring — all driven by a unique data patrimony, cutting-edge technology...
MYR 178,200 - 217,800 per year
...maintain identity and access management (IAM) solutions to ensure secure and efficient access to systems. ~Monitor and enforce... ...A successful IAM Security Engineer should have: ~A degree in Information Technology, Cybersecurity, or a related field. ~Strong knowledge...- ...the respective person in charge of the original AP. -Conduct inspections of bonded cars weekly to ensure the K8 documents are securely maintained and readily available. -Handle invoicing processes from suppliers, ensuring accuracy and timely completion....
- ...Members, and owners alike. What will I be doing? As the Security Assistant, you will be responsible for performing the following... .... When suspicious people enter the elevator, promptly inform CCTV and relevant departments to pay attention, preventing unauthorized...
- ...by helping track IT project handovers, sales forecasts, and operational updates. -Assist in gathering market and competitor information in the government IT space to support pricing, costing, and business insights. -Help prepare reports for management, ensuring...
- ...and technology center in Kuala Lumpur that provides high-level information technology and engineering expertise to ExxonMobil’s Upstream,... .... What role you will play in our team Cyber Security is responsible for identifying, detecting, protecting against,...
MYR 8,000 per month
...Responsibilities Sales & Business Development Drive and expand sales for aluminium roofing products within Malaysia Identify and secure new projects through specification, tender, and direct sales channels Achieve monthly and annual sales targets Client &...- ...Identify, approach, and develop relationships with potential customers Prepare proposals, presentations, and business pitches to secure new clients Manage new customer onboarding and order processes Product & Project Management Support new product...
- ...automation, this role focuses on implementing strategic solutions to security problems, providing a secure environment for our customers and... ...investigative role in security incidents providing essential information to key control points. Drive improvements in threat...
- ...engineering excellence. Our teams design and deliver intelligent, secure, and high-performance digital solutions that help... ...You Bring to the Team Bachelor’s degree in Computer Science, Information Security, or related field (or equivalent experience). Minimum...
- ...Account Management: Building trusted partnerships with corporate HR and management to ensure successful program implementation and secure renewals or expansions. -Target Achievement: Being accountable for achieving and exceeding individual monthly/quarterly sales targets...
MYR 16,000 - 18,000 per month
...Competitive Salary ~Opportunity to hone your skills as a Salesforce Security Product Owner About Our Client A large organization in... ...or managed services. ~Collaborate closely with Business Information Security Leads (BISLs), platform teams, Architecture, Privacy,...
