Get new jobs by email
- A leading technology firm is seeking an experienced Technical Project Manager in Shah Alam, Malaysia. You will manage client relationships, ensure project delivery, and work with cutting-edge blockchain technologies. Ideal candidates will have over 5 years of experience...
- ...the world. Through its business model, Superprof offers an alternative to other market players by offering greater freedom and security to tutors. Want to give private lessons but can't find students? Superprof is your partner in finding the learners who need your...
- ...the world. Through its business model, Superprof offers an alternative to other market players by offering greater freedom and security to tutors. Want to give private lessons but can't find students? Superprof is your partner in finding the learners who need your...
- ...If you are looking to excel and make a difference, take a closer look at us… Functional Meet sales target by securing new quality loans in line with Management decision on the portfolio mix of products and customers Maintain good business relationship with internal...
- ...'s fastest growing global cryptocurrency platform. Our vision is simple: Cryptocurrency in Every Wallet. Built on a foundation of security, privacy, and compliance, Crypto.com is committed to accelerating the adoption of cryptocurrency through innovation and empowering...
- ...requisition id: JR\_046156Global Technology Solutions (GTS) at ResMed is a division dedicated to creating innovative, scalable, and secure platforms and services for patients, providers, and people across ResMed. The primary goal of GTS is to accelerate well-being and...
- ...interpreter needs to be able to process information quickly and with accuracy in a professional manner. It is essential to ensure a quiet & secure environment. Note pads and writing utensils, glossaries, and dictionaries are useful tools. Candidate Qualifications: Fluency...
- ...English speakers. The interpreter must process information quickly and accurately in a professional manner while ensuring a quiet and secure environment. Note pads, writing utensils, glossaries, and dictionaries are useful tools. Candidate Qualifications: Fluency in...
- ...desktop and system support services ~ Understanding and experience of various Windows operating systems, Active Directory, domain security, 3/4/5), and Bomgar. ~ Knowledge of cloud computing, SQL, AD, Windows‑Unix/Linux, Remote access and SQL scripting ~ Minimum...
- ...comes to investing. Ship features like: electronic‑KYC flows, and UX improvements to reduce onboarding friction, and improved account security features. Contribute to core engineering platforms - Drive impact beyond your product domain by working on the shared...
- ...styles, and interests in order to provide the best learning outcomes possible. Regular students also provide teachers with financial security since your weekly schedule will be consistent and reliable. Because of our model of pairing students with teachers, all of our...
- ...sources and prioritize those tasks to meet applicable deadlines Technology aptitude Working knowledge of industry information security and privacy standards including, NIST assessments, ISO audits/certifications, and SOC audits a plus Knowledge of using...
- ...sustainability solutions provider. Key Responsibilities Conduct audits in areas of CSR and Quality Management System audits such as Security C-TPAT, RBA VAP & SVAP, BSCI, SMETA and COC audits Ensure timely completion of audit/ surveillance and submission of audit...
- ...implementing strategy, Discovered resource estimation and assurance, Employee and labour relations, Extract, Global Perspective, Information Security, Leading transformation, Management Reporting, Managing change, Managing strategic partnerships, Measurement and metrics,...
- ...blockchains. By harnessing the power of blockchain technology, Tether enables you to store, send, and receive digital tokens instantly, securely, and globally, all at a fraction of the cost. Transparency is the bedrock of everything we do, ensuring trust in every transaction...
- ...limited to Process Safety & Asset Management, HSSE & SP and Asset Management Foundations Practices, Workplace Health, Safety and Security.This role provides remote operational support to drive production excellence in Oil and Gas facilities. The successful candidate will...
- ...Dayforce’s Code of Conduct, Values and Policies and Procedures. Be aware of and comply with all Dayforce and customer Information Security protocols. Adhere to all Information Security Standards Policies and Procedures. Provide timely and high-quality resolutions...
- ...sales teams to understand customer requirements. Design cloud architectures tailored to enterprise-scale environments. Implement secure, scalable AWS solutions across diverse industries. Act as a trusted technical advisor to clients throughout project delivery....
- ...you are for the purposes of processing in connection with JLL’s recruitment process. We endeavour to keep your personal information secure with appropriate level of security and keep for as long as we need it for legitimate business or legal reasons. We will then delete...
- ...respect of the emoluments payable under this contract. Recruitment principles Our guiding principle in selecting candidates is to secure the highest standards of efficiency, competence and integrity. We do not discriminate on any grounds and are committed to promoting...
- ...conveying messages in the preferred language and ensuring mutual understanding. You will work from your home office, requiring a quiet and secure environment. This position is open to locations within Malaysia, Thailand, Indonesia, Philippines, and Cambodia, and may involve...
- ...edge solutions. Location: Singapore / Kuala Lumpur, Malaysia Key Responsibilities Drive revenue growth by identifying and securing new business opportunities across the Asia Pacific region. Develop and execute sales strategies tailored to the unique needs of...
- ...maintenance of backups and conducting disaster recovery operations in accordance with business requirements and standards. Monitoring security and preventing unauthorized access and follow compliance procedures. Scheduling server maintenance in accordance with business...
- ...Country Manager - Malaysia and Indonesia Proto is bringing secure AI to everyone. We specialise in local languages and end-to-end AI workflows for complex usecases such as anti-scam centres, institutional knowledge advisors, and patient experiences. These deployments...
- ...We are looking for WFH Thai Interpreters Are you fluent in English and Thai? Elevate your language skills and secure a rewarding remote role with competitive pay! Join our diverse team and let's grow together. Responsibilities As a language interpreter, you will...
- ...data whenever and wherever they need it. Veeam provides data resilience through data backup, data recovery, data portability, data security, and data intelligence. Based in Seattle, Veeam protects over 550,000 customers worldwide who trust Veeam to keep their businesses...
- ...medical terms, anatomy, and physiology. Mock Interpretation Session: Successfully pass a live evaluation. Background Check & Security Screening. Sign an Independent Contractor Agreement and confidentiality commitment (including HIPAA compliance). What do you...
- ...patching (copper and fibre cables and site surveys)* Plan and execute cabling, cross connects including testing and labelling.* Perform security CCTV monitoring and tape change based on tape rotation schedule.* Manage the updating and tracking of inventory, cross connect...
- ...Intuition Machines builds enterprise security products with an AI/ML focus. We apply our research to systems that serve hundreds of millions of people, with a team distributed around the world. You are probably familiar with our best-known product, the hCaptcha security...
- ...Architect for End User Computing (EUC) is responsible for leading the design, implementation, and optimization of solutions that enable secure, scalable, and efficient digital workplaces. This role focuses on architecting and integrating endpoint technologies—including...


