Get new jobs by email
- ...high-quality support. Act as a focal point for large account network problem resolution and provide technical leadership. Manage... ...NMS, DNA Center, routing protocols (OSPF, RIP, BGP, Static), and security protocols (ACL, NAT, VPN IPsec Tunnel, SSL VPN Tunnel)....
- ...About the Company We are a premier technical training provider specializing in high-level networking and infrastructure education. Unlike generalist training firms, we focus on deep-dive technical certifications (Cisco, AWS, Microsoft). We are looking for hands-on...
- Security Analyst page is loaded## Security Analystlocations: Remote Malaysiatime type: Full timeposted on: Posted Todayjob requisition id:... ...Bitdefender GravityZone experience preferred.* Understanding of network, endpoint, identity, email security, and common attack...
- Industry: Automotive MNC Environment Exciting career opportunity Responsibilities: Ensure day-to-day data transfer/ entry of PPAP Data into Electronics Database. Ensure timely delivery of periodic reporting to wider team. Data Analysis...
MYR 6,000 - 7,000 per year
This position is now filled ~Opportunity to be a part of a new system roleout ~Flexible working environment About Our Client The company is a leading provider of heavy equipment, parts, and services across Australia, Papua New Guinea, and the Solomon Islands. It...- ...As a Specialist, IT Security at GoGlobal, your primary responsibilities will include protecting information systems, networks, and data from security breaches, ensuring compliance with security regulations, and providing solutions to security challenges. You will play...
- ...seeks candidates with diverse backgrounds, experiences, and perspectives to joinour family of industry subject matter experts. The Security Auditing Program Manager, assigned to a specific client, will be embedded in a Remote role as part of the client's global security...
- Data Centre Network Infrastructure Construction Project Manager page is loaded## Data Centre Network Infrastructure Construction Project... ...process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we need...
- A leading technology company in Penang, Malaysia is looking for a Network Engineer to manage its global network infrastructure remotely. The ideal candidate must have 10+ years in network infrastructure and strong expertise in cloud technologies and network device administration...
- ...organization, apply now. We are currently seeking a Helpdesk Analyst - Japanese Speaking to join our team in Remote Work, Wilayah... ...providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. our...
- A global security consulting firm in Kuala Lumpur is seeking a Security Auditing Program Manager to oversee security auditing programs and penetration testing. The ideal candidate will have over ten years of corporate security management experience and expertise in threat...
- ...clients to build tools and systems that shape the way people interact with technology around the world. We're building a global network of language professionals, linguists, and culturally aware contributors who are passionate about shaping the future of technology through...
- ...seeking a Cybersecurity Senior Engineer to lead and enhance their cybersecurity initiatives. This role requires expertise in GCP security, vulnerability management, and automation. The successful candidate will design and optimize security tools, manage risks, and develop...
- ...meaningful peer-to-peer conversations, and equitable growth and development opportunities. Make the Most of our Global Organization : Network with other new co-workers within your first 30 days through our onboarding program. Connect with Your Community: Participate in...
- Key Responsibilities: Assist in monitoring and analyzing security alerts from various security tools (e.g., SIEM, IDS/IPS, firewalls)... ...security breaches. Learn to identify vulnerabilities in systems, networks, and applications. Contribute to improving the security...
- ...Description: Cyber Security Expertise: Strong understanding of cybersecurity principles, practices, and technologies. Knowledge of DevSecops and Application Security domains. Familiarity with security tools and technologies such as, SAST, DAST and SCA...
- ...monitoring, and troubleshooting of IT systems, including hardware, software, and network infrastructure. 2. Provide technical support to employees and ensure smooth, efficient, and secure daily operations. 3. Assist in the evaluation, negotiation, and management of IT...
- .... -Create and maintain effective customer relationships to secure customer satisfaction and providing the deepest level of product... ...Platform -Infrastructure solutions - Servers, storage and networking (HPE, Dell Technologies, Aruba, Cisco, etc) -Data Protection...
- ...least a Diploma, Advanced/Higher/Graduate Diploma, or Degree in fields like Computer Science, Information Technology, Networking, Engineering, Security, Digital Transformation, FinTech, Software, Data Analytics, AI, Multimedia, or related areas. -Proficiency in both...
- ...• Protect systems and information infrastructure, including firewalls and data encryption programs • Upgrade systems to enable security software • Install and upgrade antivirus software • Test and evaluate new technology • Perform penetration testing • Analyze...
- ...manage cloud-based systems and applications. ~Implement cloud network architectures for different cloud and cloud/hybrid systems. ~Provide... ...as needed to help the company excel. ~Ensure the security of cloud-based systems. ~Participate in cloud readiness assessments...
- ...System Reliability, Optimize System Efficiency, Enhance Systems Security, IT Systems uptime and reliability (availability), process... ...Troubleshoot and manage servers, configuration of switch, email systems, network security, internet access, telephony, printers, access control...
- ...requirements, including infrastructure setup, data management, security, scalability, and disaster recovery. ~Cloud infrastructure... ...and deploy cloud resources such as virtual machines, storage, networking components, and containers, following best practices and security...
- ...FTView SE, AVEVA System Platform, TIA Portal, etc. ~Others: Network design/administration. Qualifications: ~Self-motivated, excellent... ...strategies and sequences of operation for HVAC, lighting, security, and other building systems. ~Conduct engineering...
- ...Join us as a Network Security Engineer to play a crucial role that will make the most of your technical expertise. Make your mark in our IT Security Team How you will create an impact The Network Security Engineer will be responsible for deploying tuning...
- ...financial centers across North America Europe and APAC. About the Role We are looking for a detail-oriented Junior Business Analyst to support a high-impact Fee Billing Remediation Project with one of our key banking clients. The ideal candidate has strong...
- SHARE Job Description The Responsibilities of the Role: ~Network operation support which includes monitoring network performance, troubleshooting... ...such as switches, routers, wireless and F5 load balancer. ~Security operation support to monitor network security device...
- ...Job Description Senior Security Consultant - Network Security This company is an Industry Leader in Cybersecurity services and solutions. They are also CREST Accredited for the provision of Penetration Testing (Pentest) services. They are looking for an experienced...
- ...Job Summary Were hiring a Security Compliance Analyst to help strengthen client trust and support our sales growth through clear reliable security communication. Youll play a key role in maintaining compliance documentation managing security questionnaires and ensuring...
- ...IS/IT organization ~10+ years of experience in the field of network engineering, demonstrating a strong foundation and expertise in... ...ensuring that LAN and Wi-Fi services are delivered and maintained secure and compliant with internal standards and external regulations,...



