Get new jobs by email
- ...represents a well-established Malaysian manufacturing company with over two decades of industry presence, currently seeking a Production Manager to lead its operations team. Specializing in the production and export of high-quality wooden furniture and components, the company...
- ...; JOB REQUIREMENTS: -Minimum of 3 years of experience in retail leasing within shopping malls is required -Proficient in both spoken and written English and Bahasa Malaysia. -Candidates should hold a relevant certificate in property or estate management
- ...including freight forwarding, contract logistics, cross-border trucking, and e-commerce logistics. Job Responsibilities: Manage and oversee the full import operations cycle, including SFFLA, customs clearance, costing, and billing for Import Jobs (Consol/FCL/...
- ...reported including hardware, software and network-related issue. System administration... ...backups to ensure the reliability and security of our IT infrastructure. Collaborating... ...the organization's Information Security Management System (ISMS) and ISO 27001....
- ...hardware malfunctions, software errors, network connectivity problems and application glitches... ...network infrastructure User Account Management - create, manage and maintain user... ...including bandwidth usage, network latency and security breaches Software Deployment -...
- ...through our central sales & marketing office in Petaling Jaya and a network of sales offices in Penang, Johor Bahru, Kuantan, Kuching and... ...Others ~ Any other tasks assigned from time to time Security Maintain Sika information with appropriate secrecy and adhere...
- ...role in helping individuals and families secure their financial futures. This position... ...-in customers, bank events and personal networking -Develop and implement effective sales... ..., interpersonal and relationship management skills -Possess a valid driving license...
- ...overview Are you passionate about designing resilient, secure, and future-ready networks? allnex invites you to join us as a Product Engineer –... ...platforms. Operational Leadership & Incident Management: Manage and steer daily network operations delivered by...
- ...delivering solutions that align with their goals across cloud, network, and cybersecurity environments. The ideal candidate will have... ...understanding of network architecture, including private/public cloud and security solutions. Act as a technical lead during requirement...
- ...Job Description for Security Analyst: ▪ Perform proactive monitoring for security log events for LifeTech customers in 24x7 mode... ...level support for security logs monitoring, security systems, management consoles and other monitoring tools ▪ Engage with partners and...
- ...Our Mission At Palo Alto Networks® everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting... .... Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation...
MYR 90,000 - 132,000 per year
...Job Description ~Implementation and operation of campus network security solutions globally for the production environment ~Assess and... ...on technical expertise, software upgrades, security policies management, troubleshooting, new versions and features ~General experience...- 安全分析師職位說明: ▪ 以全天候模式主動監控 LifeTech 客戶的安全日誌事件 ▪ 透過電話或電子郵件接收所有營運問題的來電/投訴/請求 ▪ 為安全日誌監控、安全系統、管理控制台和其他監控工具提供一級支持 ▪ 與合作夥伴和客戶合作,發現補救措施並跟進事件解決方案的有效性 ▪ 協調相關方提供安全服務,例如在多供應商環境中(適用時) ▪ 將安全事件升級到二級/安全工程師/負責人進行安全故障排除 ▪ 提供客戶所有偵測到的安全事件的補救行動計劃,並跟進事件管理進度 ▪ 對事件進行分析和安全調查 *必...
- ...We are currently looking for a Network Development Manager to join one of the leading MNC players in the direct-selling (MLM) space. This position requires your urgent attention. Reporting to: Senior Network Development Manager Location: Petaling Jaya Join a...
- ...We are seeking a talented individual to join our Network Security team at Marsh & McLennan Asia Business Services (MMABS) . This role... .... We will count on you to: Change and Configuration Management : Implement BAU changes to maintain network security integrity...
MYR 120,000 per year
...committed to excellence in customer service by leveraging people, processes, and technology. seeking an IT Operations Manager to oversee Infrastructure & Network Technology initiatives. This role involves managing specific projects or multiple projects while ensuring...- ...accessible price. We aim to be the best service provider in IT & Networking industry with the principle of always deliver the most... ...Networking and software. • Coordinate, plan and implement network security measures for data protection. • Perform Disaster Recovery...
- ...Set up the governance framework and drive security programs as per regulatory requirements.... .../KRIs and report performance to senior management. Prepare documentation and coordinate... ...of cyber security architecture, IAM, Network Security, Segmentation, cloud security,...
- ...with customers after quotation have been send out in order to secure the shipment. -Closely monitor and follow up shipment status... ...from vendor. -Perform any other jobs as assign by superior / management when required from time to time. [Apply now at ; JOB...
- ...Job Responsibilities: Recruit, sign, train, and manage hosts, and establish efficient operation workflows. Leverage the company proprietary AI tools to craft livestream content strategies for hosts that align with overall corporate strategy. Monitor and analyze...
- ...Cyber security is one of the most important risks facing businesses today. Systems, applications, and processes are becoming increasingly... ...of cyber engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day completion of...
- -Lead and participate in assigned project management tasks. Serve as an in-house subject matter expert to analyze and provide... ..., implement, and configure scalable infrastructure and network systems. -Design secure infrastructure architecture, plan for security and...
- ...Responsibilities: The application of Security Expertise to assist our customers in implementing... ...their IT infrastructure. Respond on Network and Security alerts discovered via... ...configure, implement or perform change management on security equipment. This is a...
- ...potential. Its sustainability and risk management is bar none and endorsed by six of the major... ...Job Description s : Network Design and Implementation: Design, configure... ...optimal performance and availability. Security and Compliance: Implement security measures...
- ...teams and vendors to design and integrate security technologies into complex IT... ...planning, technical documentation, and change management processes. - Provide technical leadership... ...Defender, etc. - Strong knowledge of network protocols, firewalls, VPN, Active Directory...
- ...Description The Responsibilities of the Role: ~Managing, designing, implementing, and troubleshooting of complex enterprise networking and communication architecture (LAN, WAN,... .... ~Maintaining network inter-devices security by utilizing technologies such as VLANs, Access...
- CISCO Network Administrator Position Description Join our dynamic team as a CISCO Network... ...future duties and responsibilities Manage and monitor the performance of our CISCO... ...Implement and maintain network security measures to protect our systems and data...
- ...Role: Were looking for a proactive and skilled IT Network Specialist to support and manage our critical network and voice infrastructure. This is... ...a collaborative team environment focused on delivering secure, resilient, and scalable network solutions that support...
- Install and configure Ricoh copier print and scan functions. Troubleshooting printing and scanning issues for customers. Perform basic network setup and support.
- ...Key Responsibilities: 1. Security Architecture & Engineering • Design and implement enterprise-wide... .... Threat Detection & Response • Implement and manage threat intelligence tools and solutions. • Monitor networks and systems for security breaches or intrusions....