Get new jobs by email
- ...and services to ensure cost savings and supply chain efficiency. 4.Supplier Management: Identify, evaluate, and manage relationships with suppliers. Negotiate contracts and agreements to secure the best terms and conditions. 5.Team Leadership: Lead and mentor MRO...
- ...on site and promote the project as planned. Participate in the acceptance and quality inspection of key nodes. Technical Management: ~ Review construction drawings, technical solutions and construction plans, identify potential risks and make optimization suggestions...
- ...Job Scope: Senior Network Security Engineer Security Architecture & Design Design and implement secure network architectures for enterprise... ...(e.g., NACSA, PDPA). Incident Response & Threat Management Lead investigation and remediation of security incidents...
- 職位範圍:高級網路安全工程師 安全架構與設計 為企業和雲端環境設計和實施安全的網路架構。 評估並建議安全解決方案和增強功能以改善 整體安全態勢。 安全評估與審計 進行風險評估、漏洞掃描和滲透測試。 根據標準和當地法規(例如 NACSA、PDPA)執行合規性檢查和審計。 事件回應和威脅管理 領導安全事件和違規行為的調查和補救。 制定並維護事件回應程序和劇本。 解決方案部署與集成 規劃並執行防火牆、SIEM、IDS/IPS、VPN、端點保護和 DLP 等安全解決方案的部署。 將安全...
- ...Our Mission At Palo Alto Networks® everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting... .... Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation...
- ...delivering solutions that align with their goals across cloud, network, and cybersecurity environments. The ideal candidate will have... ...understanding of network architecture, including private/public cloud and security solutions. Act as a technical lead during requirement...
- ...We are currently looking for a Network Development Manager to join one of the leading MNC players in the direct-selling (MLM) space. This position requires your urgent attention. Reporting to: Senior Network Development Manager Location: Petaling Jaya Join a...
- ...outdoor pool, set amidst stunning surroundings, encourages guests to linger and unwind. Job Description Safety & Security Manager you are responsible for the conformity with all corporate, federal and local regulations related to Occupational Health and Safety...
MYR 120,000 per year
...committed to excellence in customer service by leveraging people, processes, and technology. seeking an IT Operations Manager to oversee Infrastructure & Network Technology initiatives. This role involves managing specific projects or multiple projects while ensuring...- ...Job Responsibilities: Recruit, sign, train, and manage hosts, and establish efficient operation workflows. Leverage the company proprietary AI tools to craft livestream content strategies for hosts that align with overall corporate strategy. Monitor and analyze...
- ...Set up the governance framework and drive security programs as per regulatory requirements.... .../KRIs and report performance to senior management. Prepare documentation and coordinate... ...of cyber security architecture, IAM, Network Security, Segmentation, cloud security,...
- ...Were Hiring: Project Manager Microsoft 365 E5 Security Workloads Location: Kuala Lumpur, Malaysia (Onsite) About Us: Oxydata Software Sdn Bhd is a 100% Malaysian-owned IT company established in 2006. As a trusted technology partner, we specialize in...
- ...Strong knowledge and hands-on experience with routing protocols (OSPF, BGP, EIGRP, etc.). Good understanding of cloud networking and related security concepts on AWS/Azure/GCP. Ability to independently implement and troubleshoot network and firewall issues. CCNP certification...
- ...potential clients within the assigned territory through cold calling, networking, referrals, and market analysis. Generate qualified leads... ...sales deals to achieve or exceed sales targets. Account Management & Relationship Building: Build and maintain strong,...
- ...to Zero, a global campaign led by the United Nations to achieve net-zero greenhouse gas emissions by 2050. JOB DESCRIPTIONS: Secure premises and personnel by patrolling property; monitoring surveillance equipment; inspecting the building, equipment, and access points...
- ...Cyber security is one of the most important risks facing businesses today. Systems, applications, and processes are becoming increasingly... ...of cyber engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day completion of...
- ...Responsibilities: The application of Security Expertise to assist our customers in implementing... ...their IT infrastructure. Respond on Network and Security alerts discovered via... ...configure, implement or perform change management on security equipment. This is a...
- ...Key Responsibilities: 1. Security Architecture & Engineering • Design and implement enterprise-wide... .... Threat Detection & Response • Implement and manage threat intelligence tools and solutions. • Monitor networks and systems for security breaches or intrusions....
- ...to investment banks and high net worth individuals. Our management team have significant experience in the Forex, CFD and... ...across a broad range of technologies from server, storage, networking, security, audio/visual, as well as cloud and on-premise infrastructure...
- Service and maintenance of Ricoh copier. Conduct regular preventive maintenance and inspections. Support in setting up printer/scanner and network connections. Troubleshooting printing and scanning issues for customers. *Salary base on working experienced.
- -Lead and participate in assigned project management tasks. Serve as an in-house subject matter expert to analyze and provide... ..., implement, and configure scalable infrastructure and network systems. -Design secure infrastructure architecture, plan for security and...
- ...Security Executive As a FC Security Executive you will support the FC EHS & Security Manager based in our Cluster Fulfillment Center . You are the focal person who is responsible to maintain order and safety throughout the premises and protect FC facilities , valuable...
- ...local and internet We are seeking a highly motivated and knowledgeable individual to join our academic team as a Lecturer in Cyber Security. The successful candidate will deliver high-quality teaching, contribute to curriculum development, engage in scholarly research...
- ...Role: Lead Cloud Security Engineers Location: KL, Malaysia We are partnering with... ...implement security controls across cloud, network, and endpoint environments Lead the development... ..., alerting pipelines, and automation Manage vulnerability assessments and drive...
- ...research, development and innovation in defence domain. STRIDE strengthens Science & Technology support for Malaysian defence and security requirements. Involved in enhancing self reliance capabilities through collaboration with defence industry and research institution...
- ...Role: Were looking for a proactive and skilled IT Network Specialist to support and manage our critical network and voice infrastructure. This is... ...a collaborative team environment focused on delivering secure, resilient, and scalable network solutions that support...
MYR 10,500 - 19,500 per month
...Security Operations Center (SOC) Manager Petaling Jaya, Selangor, Malaysia Recruit Hero helps talents to connect with best companies and jobs in Malaysia. We're currently looking for Security Operations Center (SOC) Manager for a company hiring in Petaling Jaya,...- ...support. Act as a focal point for large account network problem resolution and provide technical leadership. Manage the current and future requirements for Cisco... ...protocols (OSPF, RIP, BGP, Static), and security protocols (ACL, NAT, VPN IPsec Tunnel, SSL VPN...
- ...Cyber security is one of the most important risks facing businesses today. Systems, applications... ...Your key responsibilities As a Manager/ Senior Manager in the EY cyber security... ...service both internally to our wider network of colleagues and to our clients and the...
- ...Technologies), Industrial Control Systems (ICS) security and / or IoT expert to join a world... ...effectively with EY’s engagement managers, directors, and partners. Key Responsibilities... ...assessments of OT systems, networks, and assets to identify and mitigate potential...