Get new jobs by email
- ...SENIOR INFORMATION SECURITY MANAGEMENT SPECIALIST Location: Kuala Lumpur, Malaysia (Remote/Hybrid) Reports to: Senior Director, Information Security Business: Global Data Centers ROLE SUMMARY Our client, a global data center provider, is hiring a Senior...
- ...responsible for building customer loyalty? Join our highly-skilled Security Consulting team Our Professional Services team is a group... ...with customers, internal teams and partners to share information and deliverables Do what you love To be successful in this...
- Security Analyst page is loaded## Security Analystlocations: Remote Malaysiatime type: Full timeposted on: Posted Todayjob requisition... ...and Skills*** Bachelor’s degree in computer science, Information Technology, or related field (or equivalent experience).* Certifications...
- ...MANAGER/ASSISTANT MANAGER - PROJECT AND SERVICE DELIVERY, INFORMATION TECHNOLOGY Company Overview Leading Growth Through Innovation As the World's No.1 Nitrile Glove manufacturer, Hartalega is currently in the process of recruiting a diverse pool of talented people...
- DC Cluster, Security Manager page is loaded## DC Cluster, Security Managerlocations: Malaysiatime type: Full timeposted on: Posted Todayjob... ...REQUIREMENTS:** Bachelor’s degree in Security Management, Information Security, or a related field. Professional certification such...
- ...Solution Specialist – MS Security is responsible for designing, securing, and managing Microsoft 365 messaging environments. The role centers on executing high-impact migrations, maintaining hybrid architectures, and ensuring robust security and compliance. Key Responsibilities...
- A leading data infrastructure company is seeking a Security Manager in Malaysia. This role involves developing security policies, overseeing security operations, and managing incident responses in data centers. Ideal candidates will possess a Bachelor's degree in a related...
- A leading global technology firm seeks a Security Consultant in Malaysia to provide security solutions and support customer engagement. The ideal candidate will have 5 years of experience in application and API security, and a relevant degree. Responsibilities include...
- A leading global technology company in Kuala Lumpur is hiring a Security Consultant responsible for integrating security solutions for clients. With at least 5 years of experience and a degree in Computer Science, you will advocate for security best practices, lead customer...
- A security management company is seeking a Senior Security Manager to oversee armed security operations for multiple government sites. This remote position involves managing a team of security guards and ensuring compliance with regulations. Candidates should have at least...
- ...to scale operations and allow other teams to be autonomous. Security and Compliance: Manage and audit security controls to meet... ...creativity and empathy for users. Quick Thinking: Able to derive information, think critically and make snap judgements based on measured...
- A technology consultancy is looking for a Solution Specialist – MS Security who will design and manage Microsoft 365 messaging environments, focusing on high-impact migrations and hybrid architectures. The ideal candidate will have 3-5 years of experience in Exchange administration...
- ...seeking a Cybersecurity Senior Engineer to lead and enhance their cybersecurity initiatives. This role requires expertise in GCP security, vulnerability management, and automation. The successful candidate will design and optimize security tools, manage risks, and develop...
- ...should be proficient in PHP with knowledge of Node.js and Python. Responsibilities include coding, managing databases, and ensuring security. They offer flexible remote work, bonuses, and mentorship opportunities for professional development. Fresh graduates are...
- ...cybersecurity firm is seeking an experienced Cloud & Backend Developer in Kuala Lumpur. This role involves designing and deploying secure software solutions impacting millions of users globally. Candidates should have 3-5 years of experience in backend or cloud development...
- ...sales or solutions engineering and an in-depth understanding of SOC operations. The successful candidate will engage with Managed Security Service Providers and drive successful technical engagements, making the SOC platform a trusted solution in customers' security operations...
- ...experianplc.com. Job Description The Third-Party Security Assessor undertakes general Third-Party Security reviews. There... ...program. Provide on-demand consultancy to other teams within Information Security, Governance and the Business to assist in improving...
- ...of appliances and food. Follow all company and safety and security policies and procedures; report maintenance needs, accidents,... ...clean and professional; maintain confidentiality of proprietary information; protect company assets. Speak with others using clear and...
- ...collaboration with various departments, Sales & Marketing, and Safety & Security. Assume command during emergency situations and oversee the... ...quality standards for Front Office operations Additional Information Inspired Place for inspiring People Embark on a new era...
- ...is prepared. Communicate assistance needed during busy periods. Inform Chef of excess food items for use in daily specials. Inform... ...employees; serve as a role model. Follow all company and safety and security policies and procedures; report maintenance needs, accidents,...
- ...and payment methods in accordance with hotel policy. Provide information regarding hotel facilities, services, local attractions, and... ...organization. Ensure compliance with safety, emergency, and security procedures. 4. Compliance & Standards Adhere to hotel...
- ...Check figures, postings, and documents for accuracy. Organize, secure, and maintain all files, records, cash and cash equivalents in... ..., store, and/or analyze computerized financial and payroll information. Prepare, maintain, audit, and distribute statistical, financial...
- ...correct entry, mathematical accuracy, and proper codes. Organize, secure, and maintain all files, records, cash and cash equivalents in... ...Record, store, access, and/or analyze computerized financial information. Maintain accurate electronic spreadsheets for financial and...
- ...Working Party tools readiness including receiving inspection secure storage picking packing and dispatch of all tools and parts.... ...or application you are consenting to Airbus using and storing information about you for monitoring purposes relating to your application...
- ...in the stock room. Open unpack and label merchandise with security tags. Support customer purchases and returns in the register... ...ability to approach and fulfill customer needs. Additional Information : This is a part-time position and will be based in KLIA2...
- ...workday.com.At Workday, we value our candidates’ privacy and data security. Workday will never ask candidates to apply to jobs through... ...medical conditions), gender identity or expression, genetic information, marital status, medical condition, mental or physical disability...
- ...that support digital paid performance media channels. Stay informed about industry trends, design tools, and emerging technologies... ...simple: Cryptocurrency in Every Wallet. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating...
- ...organizational structure required ~ Knowledge of Department of Homeland Security policies and procedures. ~ Understanding of federal... ..., gender identity, national origin, age, pregnancy, genetic information, disability, status as a protected veteran, or any other...
- ...across many of the top selling titles on console and PC. We've secured an exciting AAA IP project and anticipating further project... ...industry. PERSONAL DATA PROTECTION POLICY By providing your information in this application, you understand that we will collect and...
- ...across many of the top selling titles on console and PC. We've secured an exciting AAA IP project and anticipating further project... ...package. PERSONAL DATA PROTECTION POLICY By providing your information in this application, you understand that we will collect and...
