...To support our extraordinary teams who build great products and contribute to our growth, we're looking to add a Brand Protection Security Manager will be based in Bukit Minyak, Penang.
What a typical day looks like:
- Development and execution of security programs...
...Security (Information & Communication Technology)
Your role
As a Security Engineer at Deriv, you’ll perform penetration testing... ...security tools and processes for critical infrastructure monitoring, protection, and mitigation.
● Perform regular pentesting of our web...
...company page
Serves as a contact person to users for cyber security issues, mainly engages in real-time (threshold) security... ...detection and response to security events and incidents within the protected environment from the various SOC entry channels (SIEM ,...
...compliance controls assessments as assigned, including Information Security, across all divisions and various technology platforms.. The... ..., military or veteran status, or any other characteristic protected by law. We encourage applications from all qualified candidates...
....
Job Description
Building a comprehensive physical security and asset protection programs and strategy and provide technical advice for all... ...Administration or relevant fields
Experience within the Police Force or Corporate experience
Experience in managing...
...The Xsolla Team is looking for a passionate Application Security Specialist to work in our KL Office. We need a professional who knows... ...during the hiring process. Pursuant to the Personal Data Protection Act 2010 (“PDPA”), Xsolla KL Sdn Bhd is mindful and committed...
...Job Title: IT Security Lead
Reporting To: Chief Information Officer (CIO)
Job Summary: The IT Security Lead will be responsible... ...to develop and implement comprehensive security strategies to protect university assets and data from cyber threats.
Key Responsibilities...
...View company page
NielsenIQ is maturing its Application Security programs and is recruiting an Application Security Engineer who... ...functions in Cloud environments.
Have knowledge of Cloud Workload Protection.
Experience using SAST and DAST tools.
Demonstrated...
...in this role where you’ll safeguard our critical IT and OT environment and be one of our dedicated IT security experts in Detection & Monitoring team. You’ll protect our company assets from security-related incidents by operating and improving security controls and tools...
...candidate to fill this newly created position:
Information Security Manager Be part of our team!
AT&S, a world leading high-tech... ...functions with the ultimate goal to reduce security risks and to protect information assets of AT&S and its business partners.
Your...
...Security (Information & Communication Technology)
As a Cyber Security Engineer, you will be responsible for the following duties:... ...alternatively, you can send in your resume via email:
[email protected]
We regret to inform that only shortlisted candidates will...
...Head, Information Security Officer page is loaded Head, Information Security Officer
Apply locations Kuala Lumpur time type Full... ...implementation of information technology, security and data privacy and protection standards, policies, and procedures within the LBU to ensure...
...Imagine a future where you strive to keep IT secure and resilient in a world that runs entirely on green energy
Join us in this role... ...IT security experts in Detection & Monitoring team. You’ll protect our company assets from security-related incidents by operating...
...and builds enterprise softwares.
Job Description
Network Security product Web Application Firewall, Endpoint Detection and... ...administrative for any network security solution.
To identify, protect, detect, response, recover for any network threat detected accross...
...big enough to compete and small enough to care.
To implement security vulnerabilities code scanning such as CheckMarx and SonarCube... ...orientation, gender identity, and any other characteristic protected by applicable law.
We believe that diversity, equity, and inclusion...
...Southeast Asia.
Job Description
Propose and revise Group IT Security Policies and Standards for Regional & Overseas Units to ensure... ...Detect and address potential and actual security issues to protect information system assets.
The Successful Applicant
Hold...
...Manage overall security operations requirements which include all guard post management, supply chain, security systems, crisis management.
In your new role you will:
Conduct investigations on cases reported or detected and provide conclusion, implement corrective...
...one another’s experience.
Vantage Data Centers powers, cools, protects and connects the technology of the world’s well-known... ...environments that can scale as quickly as the market demands.
Physical Security Department
The Security Department for Vantage Data Centers...
...culture of continuous improvement and career progression.
Relationship Management: Act as the main point of contact for information security for Product Security within ASPAC, building strong partnerships and influencing positive change.
Security Expertise: Provide...
...About Our Client
Our client is a leading provider of comprehensive security solutions, including manned guarding, electronic security, and cash management services. Their offerings are designed to protect businesses, assets, and communities through a range of tailored...
...Description
Responsible for supporting and improving the IT Security Posture of related hardware, software, and configuration to... ...abnormalities and reports violations.
Maintain a proactive approach to protecting the system by defining access privileges, control structures,...
...organisations succeed in a volatile world. Find out more. View company page
Control Risks is currently looking to hire a Country Security Lead to support a global banking client and assume responsibility for the physical security of the client's offices and other...
...intelligence, and commercial applications. We are trusted by our customers to protect their mission-critical information in the face of advanced persistent threats. The mission of the Security Infrastructure team is to build platforms and software to enable our products...
...for all Micron’s labs. This role focuses on assuring ESD, EHS & Security compliance. These three pillars are a major part of our... ...needs and budget. Micron also provides benefit programs that help protect your income if you are unable to work due to illness or injury,...
...provider, Allianz offers worldwide products and solutions in insurance and asset management. View company page
The Information Security Officer (ISO) Malaysia is a key role within the Allianz Technology’s global IS organization. The ISO is accountable for the...
...Join us in this role where you’ll be responsible for the support, maintenance, and development of our global network security products. You'll interface with colleagues across teams and borders where you, with your knowledge and insights, will be an inspiration and anchor...
...Architecture community.
You’ll play an important role in:
devising and overseeing the implementation of technologies that are secure, reliable, maintainable, scalable, and usable, and sharing knowledge within the infrastructure area
ensuring the computing...
...The IT Security Analyst will be responsible for identifying security vulnerabilities and propose remedy for our systems and networks. This will involve conducting penetration tests, vulnerability assessments, and other security assessments. The IT Security Analyst will...
...management
* Vulnerability assessment, penetration testing and incident management
* Analysis and neutralization of all cyber security threats
* Performs continuous security assessment and recommend treatment options
* Security event management
* Maintain awareness...
...EMIT - Industrial Cyber Security Engineer
ExxonMobil
ExxonMobil is one of the world’s largest publicly traded international oil... ...incident and event management
Threat identification and protection in the Operations Technology (“OT”) space
Project resource...