Get new jobs by email
- Requirements: 1)Experience: - Minimum of 5 years in the security service industry. - Proven track record in marketing within the security sector. 2) Marketing Skills: - Strong understanding of marketing strategies and tactics specific to security services. - Experience...
- ...already have a Candidate Account, please Sign-In before you apply. Job Description: Primary Responsibilities Manage physical security for Broadcom sites in Penang * be responsible for the overall physical security for the Broadcom sites in Penang which currently...
- ...dreams are bigger than ever. The opportunity to improve health on a global scale stands before us. About Us At Dexcom, our Security team is the cornerstone of a safe, secure, and efficient workplace. As a global leader in innovative health technology, we’re committed...
- ...Security Operations Manager, Asia We're hiring! We are looking for a Security Operations Manager, Asia to join our People Safety and Security Services team. This role is to be based either in our Kuala Lumpur or Penang office in Malaysia. Aon is in the business...
- ...Cyber security is one of the most important risks facing businesses today. Systems, applications, and processes are becoming increasingly... ...Cyber Security service both internally to our wider network of colleagues and to our clients and the wider market Contributing...
- ...Build and maintain long-term relationships with key customers to secure repeat business and explore upselling opportunities. Analyze... ...and handling key customer accounts and expanding distribution networks. Excellent communication, interpersonal, and strategic discussion...Remote job
- ...Monitor performance, create reports, and ensure infrastructure security Participate in system upgrades and infrastructure planning... ...systems ~ Scripting (PowerShell, Java, C++, etc.) ~ Basic networking (Cisco CCENT/CCNA) ~ Familiarity with cloud licensing and...
- ...CI/CD pipelines. Ensure the availability, reliability, and security of engineering infrastructure. Collaboration & Communication... ...exciting start-up spirit; Fast-growing company with the chance to network with industrial pioneers and enthusiasts; Ability to...
- ...main circuit diagram design (single busbar sectionalized, ring network configurations), short-circuit current calculations, equipment... ...Design for Smart Systems (e.g., fire alarm, building automation, security monitoring), ensuring: # Reliability of power supply for low-...
- ...workload management. Troubleshoot and resolve complex system issues, ensuring high availability and performance. Apply networking and security best practices, including firewall configurations and access controls. Maintain documentation of system configurations,...
- ...market share. ~Conduct client meetings, sales presentations, and networking events to build strong relationships. ~Evaluate customer needs, develop tailored proposals, and negotiate contracts to secure new business. ~Maintain a structured and rigorous follow-up process...
- ...providing technical information and training Conduct Negotiation to secure a win-win agreement with customers 3. Service Standards and... ...inspection, and retailing applications. Our sales and service network is one of the most extensive in the industry. Our products are...
- ...calls, outdoor sourcing, inbound leads, direct mail, email and networking events -To oversee and manage the entire corporate onboarding... ...the Head of B2B Acquisition -To assist Compliance Team to secure proper due-diligence documentations from the client -To...
- ...and technical constraints. Designing and implementing cloud infrastructure components such as virtual machines, storage, networking, and security. Automating infrastructure provisioning and management using tools. Assessing existing IT infrastructure for...
- ...effective data backup and recovery strategies to safeguard data security and integrity. Develop and maintain automation scripts (... ...with proficiency in ONTAP OS. ~ Strong understanding of storage network protocols (NFS, CIFS, iSCSI, FC) and related hardware. ~ Hands...
- ...Verification) Product Manager & UI/UX Design Information Security IT Operations Commercial & Corporate Sales, Marketing... ...projects. Interact with senior management teams and our alumni GTT network. What you will experience working with us: A culture...
- ...customers worldwide with 500 sites in 27 markets, and a forwarding network spanning 150 countries. We are proudly part of Japan Post —... ...address issues to maintain solution integrity and availability. Security & Governance: Ensure data security, compliance, and adherence...
- ...business, but lack the infrastructure, investment, or support network to make it happen? Mercury Hampton, a multi-award-winning UK-based... ..., onboarding, and recruitment methodology. Financial Security : Enjoy a competitive salary, equity in your region/vertical,...
- ...technical support to end-users, resolving hardware, software, and network issues promptly Diagnose and troubleshoot system and... ...maintenance and updates on IT systems to ensure optimal performance and security Educate and train users on best practices for using IT...
- ...for recommended policy/process changes. Design and deliver security awareness training modules and campaigns to enhance the organization... ...serves customers in Europe, Asia, and the US through a global network of operating subsidiaries. The Group offers a comprehensive...
- ...developing and supporting critical market infrastructure, our combined network connects thousands of market participants to streamline end to... ...and learn valuable new skills. Invest in Your Future: Secure your financial future through competitive pay, retirement...
- ...analysis and benchmarking to identify alternative suppliers and secure a competitive advantage. •Perform supplier audits and... ...exciting start-up spirit; Fast-growing company with the chance to network with industrial pioneers and enthusiasts; Ability to contribute...
- ...Collaborate effectively to build productive relationships and networks. Understand and lead the execution of key objectives and priorities... ...sectors you serve. ~ BA/BS Degree in Computer Science, Cyber Security, Information Security, Engineering, Information Technology,...
- ...skills with the ability to troubleshoot hardware, software, and network issues. Ability to work independently as well as... ...project-related tasks as needed. Ensure adherence to IT policies, security protocols, and compliance standards. Collaborate with cross-...
- ...technology teams on data strategy, architecture, privacy, and security. · Monitor, cleanse, and validate customer and vendor data, and... ...Collaborate effectively to build productive relationships and networks. Understand and lead the execution of key objectives and priorities...
- ...performance, and cost-efficiency. ~ Build and maintain scalable, secure, and cost-effective Data Lake architecture using services such... ...start-up spirit; Fast-growing company with the chance to network with industrial pioneers and enthusiasts; Ability to contribute...
- ...administration, payroll processing, talent initiatives, social security registration, insurance enrollment, etc Collaborates / work... ...Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website. #J-18808-...
- ...conditions for the company. # Manage the contract renewal process to secure long-term commitments from key accounts. # Ensure all... ...of growth and expansion. We are committed to growing our global network by pursuing exciting opportunities in existing and new...
- ...knowledge, good to have Hybrid cloud and On-Prem set ups. Networking, connectivity and MQTT Broker set up for data publish and subscription... ...scenarios predictions and preventive maintenance. Data security and privacy. Protection from leakages and hacking. Willing...
- ...winning team now! Identifies and mitigates cyber risks by assessing systems, networks, and applications for vulnerabilities. They simulate real-world attacks, document findings, and provide security improvement recommendations. Staying updated on cybersecurity trends, they...