Get new jobs by email
- ...are committed to fostering a diverse and inclusive workplace where creativity, learning, and collaboration drive success. As the QA Manager at Quantios, you will lead the overall quality assurance strategy and function across our development organization. You will lead a...
- ...attend industry exhibitions, expos, and networking events. The ideal candidate will be responsible... ...and revenue. -Client Relationship Management: Develop and maintain relationships with... ...and Supplier Sourcing: Research and secure high-quality vendors and suppliers to enhance...
- ...Job Scope: Senior Network Security Engineer Security Architecture & Design Design and implement secure network architectures for enterprise... ...(e.g., NACSA, PDPA). Incident Response & Threat Management Lead investigation and remediation of security incidents...
- ...services across our corporate estate. You will take ownership of critical areas including device lifecycle management, cloud systems, security tooling, network operations, and service reliability. You will mentor junior team members and ensure IT services are secure,...
- 職位範圍:高級網路安全工程師 安全架構與設計 為企業和雲端環境設計和實施安全的網路架構。 評估並建議安全解決方案和增強功能以改善整體安全態勢。 安全評估與審計 進行風險評估、漏洞掃描和滲透測試。 根據標準和當地法規(例如 NACSA、PDPA)執行合規性檢查和審計。 事件回應和威脅管理 領導安全事件和違規行為的調查和補救。 制定並維護事件回應程序和劇本。 解決方案部署與集成 規劃並執行防火牆、SIEM、IDS/IPS、VPN、端點保護和 DLP 等安全解決方案的部署。 將安全...
- ...Our Mission At Palo Alto Networks® everything starts and ends with our mission: Being the cybersecurity partner of choice, protecting... .... Our vision is a world where each day is safer and more secure than the one before. We are a company built on the foundation...
- ...and services. You will play a key role in device management, cloud administration, user support, and technical security operations, ensuring the smooth and secure... ...monitoring and response. ~ Assist in maintaining network infrastructure, VPN, and firewalls under the...
- ...delivering solutions that align with their goals across cloud, network, and cybersecurity environments. The ideal candidate will have... ...understanding of network architecture, including private/public cloud and security solutions. Act as a technical lead during requirement...
- ...We are currently looking for a Network Development Manager to join one of the leading MNC players in the direct-selling (MLM) space. This position requires your urgent attention. Reporting to: Senior Network Development Manager Location: Petaling Jaya Join a...
- ...outdoor pool, set amidst stunning surroundings, encourages guests to linger and unwind. Job Description Safety & Security Manager you are responsible for the conformity with all corporate, federal and local regulations related to Occupational Health and Safety...
MYR 120,000 per year
...committed to excellence in customer service by leveraging people, processes, and technology. seeking an IT Operations Manager to oversee Infrastructure & Network Technology initiatives. This role involves managing specific projects or multiple projects while ensuring...- ...Set up the governance framework and drive security programs as per regulatory requirements.... .../KRIs and report performance to senior management. Prepare documentation and coordinate... ...of cyber security architecture, IAM, Network Security, Segmentation, cloud security,...
- ...Job Responsibilities: Recruit, sign, train, and manage hosts, and establish efficient operation workflows. Leverage the company proprietary AI tools to craft livestream content strategies for hosts that align with overall corporate strategy. Monitor and analyze...
- ...Were Hiring: Project Manager Microsoft 365 E5 Security Workloads Location: Kuala Lumpur, Malaysia (Onsite) About Us: Oxydata Software Sdn Bhd is a 100% Malaysian-owned IT company established in 2006. As a trusted technology partner, we specialize in...
- .... Quantios leverages AI, automation, and advanced technology to manage data with precision, supporting growth, compliance, and operational... ...health monitoring and alerting for managed services Secure system by establishing and enforcing policies; defining, monitoring...
- ...Strong knowledge and hands-on experience with routing protocols (OSPF, BGP, EIGRP, etc.). Good understanding of cloud networking and related security concepts on AWS/Azure/GCP. Ability to independently implement and troubleshoot network and firewall issues. CCNP certification...
- ...Cyber security is one of the most important risks facing businesses today. Systems, applications, and processes are becoming increasingly... ...of cyber engagements with our clients, reporting to a Manager or Senior Manager, responsible for the day to day completion of...
- ...to Zero, a global campaign led by the United Nations to achieve net-zero greenhouse gas emissions by 2050. JOB DESCRIPTIONS: Secure premises and personnel by patrolling property; monitoring surveillance equipment; inspecting the building, equipment, and access points...
- ...Key Responsibilities: 1. Security Architecture & Engineering • Design and implement enterprise-wide... .... Threat Detection & Response • Implement and manage threat intelligence tools and solutions. • Monitor networks and systems for security breaches or intrusions....
- ...Responsibilities: The application of Security Expertise to assist our customers in implementing... ...their IT infrastructure. Respond on Network and Security alerts discovered via... ...configure, implement or perform change management on security equipment. This is a...
- Service and maintenance of Ricoh copier. Conduct regular preventive maintenance and inspections. Support in setting up printer/scanner and network connections. Troubleshooting printing and scanning issues for customers. *Salary base on working experienced.
- ...Security Executive As a FC Security Executive you will support the FC EHS & Security Manager based in our Cluster Fulfillment Center . You are the focal person who is responsible to maintain order and safety throughout the premises and protect FC facilities , valuable...
- -Lead and participate in assigned project management tasks. Serve as an in-house subject matter expert to analyze and provide... ..., implement, and configure scalable infrastructure and network systems. -Design secure infrastructure architecture, plan for security and...
- ...local and internet We are seeking a highly motivated and knowledgeable individual to join our academic team as a Lecturer in Cyber Security. The successful candidate will deliver high-quality teaching, contribute to curriculum development, engage in scholarly research...
- ...to investment banks and high net worth individuals. Our management team have significant experience in the Forex, CFD and... ...across a broad range of technologies from server, storage, networking, security, audio/visual, as well as cloud and on-premise infrastructure...
- ...Role: Were looking for a proactive and skilled IT Network Specialist to support and manage our critical network and voice infrastructure. This is... ...a collaborative team environment focused on delivering secure, resilient, and scalable network solutions that support...
- ...Role: Lead Cloud Security Engineers Location: KL, Malaysia We are partnering with... ...implement security controls across cloud, network, and endpoint environments Lead the development... ..., alerting pipelines, and automation Manage vulnerability assessments and drive...
- Requirement: -To perform security screening. i.e people, baggage, vehicle -To perform security patrolling and airline sealing -Response to emergency and incidents [Apply now at ; JOB REQUIREMENTS: -Sijil Pelajaran Malaysia (SPM) or equivalent...
MYR 10,500 - 19,500 per month
...Security Operations Center (SOC) Manager Petaling Jaya, Selangor, Malaysia Recruit Hero helps talents to connect with best companies and jobs in Malaysia. We're currently looking for Security Operations Center (SOC) Manager for a company hiring in Petaling Jaya,...- ...support. Act as a focal point for large account network problem resolution and provide technical leadership. Manage the current and future requirements for Cisco... ...protocols (OSPF, RIP, BGP, Static), and security protocols (ACL, NAT, VPN IPsec Tunnel, SSL VPN...