Get new jobs by email
- ...SENIOR INFORMATION SECURITY MANAGEMENT SPECIALIST Location: Kuala Lumpur, Malaysia (Remote/Hybrid) Reports to: Senior Director, Information Security Business: Global Data Centers ROLE SUMMARY Our client, a global data center provider, is hiring a Senior...
- Security Analyst page is loaded## Security Analystlocations: Remote Malaysiatime type: Full timeposted on: Posted Todayjob requisition... ...and Skills*** Bachelor’s degree in computer science, Information Technology, or related field (or equivalent experience).* Certifications...
- ...As a Specialist, IT Security at GoGlobal, your primary responsibilities will include protecting information systems, networks, and data from security breaches, ensuring compliance with security regulations, and providing solutions to security challenges. You will play...
- DC Cluster, Security Manager page is loaded## DC Cluster, Security Managerlocations: Malaysiatime type: Full timeposted on: Posted Todayjob... ...REQUIREMENTS: Bachelor’s degree in Security Management, Information Security, or a related field. Professional certification such...
- ...Solution Specialist – MS Security is responsible for designing, securing, and managing Microsoft 365 messaging environments. The role centers on executing high-impact migrations, maintaining hybrid architectures, and ensuring robust security and compliance. Key Responsibilities...
- A technology consultancy is looking for a Solution Specialist – MS Security who will design and manage Microsoft 365 messaging environments, focusing on high-impact migrations and hybrid architectures. The ideal candidate will have 3-5 years of experience in Exchange administration...
- ...company. We are currently looking for a Senior Software Engineer (Security) in Malaysia. In this role, you will design, develop, and... ...personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate...
- A leading technology partner is seeking a Senior Software Engineer (Security) in Malaysia to design and develop security features for large-scale web platforms. This role involves collaborating with engineering teams, mentoring less experienced engineers, and ensuring...
- ...seeking a Cybersecurity Senior Engineer to lead and enhance their cybersecurity initiatives. This role requires expertise in GCP security, vulnerability management, and automation. The successful candidate will design and optimize security tools, manage risks, and develop...
- ...should be proficient in PHP with knowledge of Node.js and Python. Responsibilities include coding, managing databases, and ensuring security. They offer flexible remote work, bonuses, and mentorship opportunities for professional development. Fresh graduates are...
- ...sales or solutions engineering and an in-depth understanding of SOC operations. The successful candidate will engage with Managed Security Service Providers and drive successful technical engagements, making the SOC platform a trusted solution in customers' security operations...
- A leading energy company in Kuala Lumpur is seeking a Staff Software Engineering Manager to lead a team in delivering high-quality software solutions. The ideal candidate will have over 10 years of experience in engineering, expertise in cloud technologies, and a passion...
- ...procurement. skills and experience required ~ Degree in Information Technology, Computer Science, Information Systems ~4-5 years... ...and management skills. ~ Ability to install, configure, and secure Windows operating systems. ~ Basic understanding of networking...
- ...Safety and Compliance -Adhering to all health, safety and security protocols. Community Engagement -Get to know our... ...Confidentiality is a must—staff must not disclose company or personnel information outside of job duties. We welcome early applications and will...
- ...authority, facilitate reviews including presentation to authority to secure timely approval of tender packages. Develop expertise in... ...that may affect services/price of materials. Analyze tender information and develop benchmark for comparison. Continue to seek cost...
- ...that support digital paid performance media channels. Stay informed about industry trends, design tools, and emerging technologies... ...simple: Cryptocurrency in Every Wallet. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating...
- ...on technical involvement, ensuring high‑quality, scalable, and secure software solutions. You will work closely with Product, Design... ...personal data to evaluate your candidacy and share relevant information with the hiring employer. This processing is based on legitimate...
- ...between MANDARIN and English speakers. The interpreter needs to be able to process information quickly and with accuracy in a professional manner. It is essential to ensure a quiet & secure environment. Note pads and writing utensils, glossaries, and dictionaries are...
- ...critical workplace feedback throughout an employee’s lifecycle to inform better management decisions. To achieve this, we need to build... ...engagement. Work closely with Engineering, DevOps, and IT Security teams to ensure our platform is robust, scalable, and upholds the...
- ...acquisition of Fieldwire. We offer the best of both worlds: the security of a traditional company and the startup dynamism of our... ...of our customers. Fieldwire solves the problem of access to information and coordination of labor at a large scale for some of the largest...
- ...facilitating communication between Malay and English speakers. The interpreter must process information quickly and accurately in a professional manner while ensuring a quiet and secure environment. Note pads, writing utensils, glossaries, and dictionaries are useful tools....
- ...providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. our... ...the application process, please contact us at . This contact information is for accommodation requests only and cannot be used to...
- ...Lumpur, MY, MY Global Business Unit: OTH Job Function: Information Technology Requisition Number: 194236 Description: Job... ...Experience in supporting Windows 10 & 11 administration and security patch. Hands-on experience in Microsoft/Office 365 administration...
- ...into production solutions. Knowledge of Enterprise Mobility & Security (EMS), Active Directory, Azure AD Connect, and related... ...specific needs and we will make every effort to accommodate you. Any information shared will be stored securely and treated in the strictest of...
- ...APAC region**. Based in Malaysia, you’ll partner with Managed Security Service Providers (MSSPs) and enterprise customers to drive technical... ...voice of the customer, ensuring feedback and insights inform future product innovation. *The position can be based in Malaysia...
- ...for this position, please send your CV or request for further information to Jane Dodgson via ****@*****.*** About EPI-... ...SAP landscapes, and optimize the performance, management and security of their SAP and SAP SuccessFactors systems. We simplify and speed...
- ...to scale operations and allow other teams to be autonomous. Security and Compliance: Manage and audit security controls to meet... ...creativity and empathy for users. Quick Thinking: Able to derive information, think critically and make snap judgements based on measured...
- ...Country Manager - Malaysia and Indonesia Proto is bringing secure AI to everyone. We specialise in local languages and end-to-end... ...-person client presentations to C-level executives, including information discovery sessions, product demonstrations, and proposals....
- ...responsible for accurately entering, updating, and maintaining information in our systems and databases. The ideal candidate possesses... ...data discrepancies or updates. Maintain confidentiality and security of sensitive information. Support other administrative tasks...
- ...Key Responsibilities: Accurately input, update, and maintain information in spreadsheets and database systems. Organize, sort, and... ...accessible. Maintain data confidentiality and follow all data security protocols. Suggest improvements to existing processes for...
