- No elements found. Consider changing the search query.


Skills:
Compliance, Analytical Thinking, Automation
Job type:
Full-time
Salary:
negotiable
- Design, implement, and manage security controls for cloud environments (AWS, Azure, Google Cloud).
- Perform risk assessments and vulnerability management for cloud-based assets.
- Monitor cloud resources to detect and respond to security incidents.
- Collaborate with IT and development teams to integrate security into the SDLC and DevSecOps.
- Ensure compliance with industry regulations and internal security policies.
- Provide expertise in identity and access management (IAM) within cloud platforms.
- Continuously evaluate and recommend security improvements for cloud operations.
- Strong understanding of network security, encryption, and cloud infrastructure.
- Analytical thinking and problem-solving abilities.
- Ability to work collaboratively in cross-functional teams.
- Excellent communication skills to present security risks and solutions to non-technical stakeholders.
- Bachelor s degree in Computer Science, Information Security, or related field.
- Proven experience in cloud security, with a focus on AWS, Azure, or Google Cloud.
- Experience with cloud security automation and monitoring tools.
- Certifications such as AWS Certified Security Specialty, CISSP, or CCSP are an advantage.
Skills:
Risk Management, English
Job type:
Full-time
Salary:
negotiable
- Plan and support internal audit strategies in Cyber Security part (Cyber Security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks).
- Lead a Cyber Security Audit team to ensure output through implementation of work standards and report to top management.
- Identify potential Cyber Security Risk and convince others in the organization to accept complete proposals and recommendation.
- Master s degree in Computer Engineering, Computer Science, Information Technology.
- Experience At least 7 years such as Information Security Management, Information Risk Management, IT Audit Management, ICT Security, Cloud Security, or in a related field.
- Professional certificates of CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) are advantage.
- Background in technical knowledge of Cyber Security Audit.
- Good command in English.
Skills:
Compliance, Automation, Risk Management
Job type:
Full-time
Salary:
negotiable
- Lead and enhance security operations, mentoring team members and implementing advanced security strategies.
- Architect and enforce security frameworks for IT systems, networks, and cloud environments.
- Monitor, detect, and respond to cyber threats, conducting forensic investigations and post-incident analysis.
- Oversee vulnerability management, system hardening, and security compliance.
- Manage identity and access controls, privileged accounts, and authentication mechanisms.
- Drive security automation, process improvements, and adoption of emerging technologies.
- Conduct security awareness training and ensure best practices across the organization.
- Minimum 5+ years of experience in security operations, with a strong focus on incident response, vulnerability management, and risk assessment.
- Proven experience leading incident response efforts and conducting root cause investigations.
- Experience with vulnerability management, and overseeing the security pipeline.
- Experience with security standardization and IT compliance certification and audit.
- Experience with risk management frameworks and methodologies.
- Expert knowledge of security tools, including SIEM, EDR, vulnerability scanners, and penetration testing tools.
- Strong understanding of network protocols, cloud operating systems, and security concepts.
- Strong understanding of security frameworks such as NIST, ISO 27001, and MITRE ATT&CK.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis is a plus.
- Exceptional analytical and problem-solving skills.
- Strong communication and interpersonal skills.
- Ability to work independently and as part of a team.
- Strong attention to detail and a commitment to accuracy.
- Strong documentation and reporting skills.
- Ability to effectively communicate technical risks to non-technical stakeholders.
- Understanding of the 3 lines of defense model is a significant advantage.
- Remark: Given the nature of the mentioned position, where employees are involved with customer data and asset values, and/or the company, to comply with legal and regulatory standards established by the Securities and Exchange Commission, as well as to align with laws and overseeing agencies, the company requires a criminal background check as part of the post-interview process before joining the company. Your criminal history information will be retained for a period of 6 months from the start date..
- Important: Candidate Privacy Policy.
- สำคัญ:โปรดอ่านและทำความเข้าใจ: นโยบายความเป็นส่วนตัวด้านทรัพยากรบุคคล สำหรับผู้สมัครงาน และผู้สมัครเข้าฝึกงาน*.
Experience:
1 year required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Penetration Tester (Manual & Automate).
- Minimum years experience required.
- Over 1 years of Experience in related fields.
- Additional application instructions.
- Good Communication in English.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Experience:
1 year required
Skills:
Risk Management, Compliance
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
Experience:
2 years required
Skills:
Network Infrastructure, Security Design, Big Data, English
Job type:
Full-time
Salary:
negotiable
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Shape The Future with Confidence.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Experience:
2 years required
Skills:
Compliance, Excel
Job type:
Full-time
Salary:
negotiable
- Assist in the planning, execution, and monitoring of projects.
- Utilise strong critical thinking and problem solving skills day to day.
- Collaborate with team members to ensure project deliverables are met on time and within scope.
- Prepare and maintain project documentation, including reports, presentations, and meeting minutes.
- Quickly adapt to changing priorities and project requirements.
- Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment.
- Proactively identify and address potential issues or roadblocks to ensure smooth project execution.
- Work with other NIS teams both locally, regionally and globally to deliver the security needs specific to the firm.
- Support work in vulnerability management and compliance activities.
- Handles BAU activities such as managing security exceptions.
- Help the business comply with the Information Security Policy by leveraging your cyber security knowledge and expertise.
- Collaborate with PwC IT and global team to align security process and tools.
- Guide and support the business team to complete all required security reviews.
- Build knowledge on application security to effectively support security assessments.
- Align with different global and local teams to identify and fix gaps or risk found.
- Other.
- Help with daily security incident handling.
- Help to manage junior staff, eg. interns.
- An effective CISO pillar candidate will also possess the following skills/ Requirements.
- Able to work in a fast-paced environment, can upskill quickly and learn proactively.
- Analytical: Inquisitive nature and intuition regarding what questions to ask, when, and their relative significance.
- Technical: Broad understanding of security technology.
- Business: High level understanding of PwC s business model, service offerings, and business operating environment as it pertains to the firm s threat landscape. Ability to frame threats and exposures in a business context recognized by non-technical staff and executives.
- Individuals selected for this role are expected to have both extensive knowledge and managerial know-how related to the following aspects: Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment.
- Understanding of technical and non-technical information security risks.
- Have skills to analyse data and visualise data (good to have knowledge of Excel, PowerPoint etc.).
- Good written and effective communicator to deal with various stakeholders.
- Meticulous and possesses an eye for details.
- Proactive, keen to learn, enjoys solving challenging problems, thinking outside of the box.
- Diligent and open to feedback.
- Experience in a role balanced between business stakeholders and a central service organization.
- Possess knowledge about application security to effectively support security assessments.
- Time and Task Management: Ability to prioritise risk, manage a variety of take, take ownership to drive completion of activities and deliver on time.
- Interest in Information Security.
- Bachelor s or master s degree (technical degree) or equivalent Industry certification.
- Desired Certifications: (Certifications aren t a prerequisite however are well regarded).
- Education Level: Undergraduate Degree (e.g. BIT, BSc) STEM or equivalent work experience: 1-2 years of progressive professional roles involving information security, computer science and/or other technical background.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Communication, Computer Engineering, Computer Program Installation, Computer Programming, Computer Technical Support, Emotional Regulation, Empathy, Enterprise Architecture, Incident Management and Resolution (IMR), Inclusion, Information and Communications Technology (ICT), Intellectual Curiosity, IT Infrastructure Upgrades, IT Operations, IT Operations Management, IT Project Lifecycle, IT Support, IT Troubleshooting, Object-Oriented Programming (OOP), Optimism, Scripting Languages, Security Protocol Analysis {+ 6 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- 0%
- Available for Work Visa Sponsorship?.
- No
- Government Clearance Required?.
- No
Experience:
5 years required
Skills:
Risk Management, Project Management, English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
1 year required
Skills:
DevOps, Automation, Electrical Engineering
Job type:
Full-time
Salary:
negotiable
- Equipped with security knowledge and done related projects in technical IT domains such as operating systems, networks, databases, cloud or solution development etc.
- Possess knowledge in assessing solution architectures at the planning and design level for security issues and vulnerabilities.
- Experience in practical security vulnerability remediation.
- Information Security domains - in particular one or more of the following: Cyber Program Management, Cyber Threat Management, Identity & Access Management, Data Protection, Privacy, Organisational Resilience. This experience should include both advisory, implementation and operation experience.
- Strong technical security skills in assessment, design, implementation, architecture, and program / project delivery and work across various delivery models, (Waterfall, Agile, DevOps).
- Implementation skill set for identity and access management platforms, security information and event management platforms, security automation and orchestration platforms, advance threat detection systems, endpoint protection systems, data leak prevention systems or network security devices.
- To qualify for the role you must have.
- A recognized university degree in Computer Science, Computer/Electrical Engineering, Information Technology or equivalent.
- Experience with a leading Security technology like Microsoft Security, Crowdstrike, Splunk and others would be a strong advantage.
- Creative, independent with good problem solving skills.
- Excellent communicator with strong analytical, interpersonal and writing skills.
- Candidates with minimum 10-15 years of relevant experience, including managing a team, will be considered for a Leadership role.
- Ideally, you ll also have.
- Industry related certification preferred (e.g. CISSP, CISA, CISM, SABSA, PRINCE2, TOGAF, ITIL).
- Solution Level Certifications, OSCP, CREST, GIAC would be advantageous, as well as penetration testing experience.
- Highly motivated individuals with excellent problem-solving skills and the ability to prioritize shifting workloads in a rapidly changing industry. An effective communicator, you ll be a confident team player that collaborates with people from various teams while looking to develop your career in a dynamic organization.
- What we offer.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Building a better working world.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Skills:
Sharepoint, English
Job type:
Full-time
Salary:
negotiable
- Could have experience to develop information in Microsoft SharePoint 3-5 Years.
- Could have experience quality-control would be more assist.
- Have experience in Thai Oil Service would be more assist.
- EDUCATION.
- Bachelor Degree in Computer Science, Computer Engineering, Information Technology or any equivalent fields of study.
- OTHER REQUIREMENTS.
- Good command of English and computer literacy.
- Work @ Sriracha, Chonburi.
- ROLE & RESPONSIBILITY.
- Be able to communicate and manage Safety and Security information by Standard Program of Thai Oil as well. Thus could be reference and apply to all staff implement.
- สามารถสื่อสารสื่อความและควบคุมจัดการงานข้อมูลเรื่องความมั่นคงปลอดภัยผ่านมาตรฐานโปรแกรมที่มีใช้ในองค์กรได้เป็นอย่างดีเพื่อให้ทุกคนในองค์กรสามารถอ้างอิงและนำไปใช้ได้อย่างถูกต้อง.
- Be able to collect, store, create and update documents of the organization's internal and external security management system standards correctly and able to evaluate according to the standards set
- สามารถรวบรวมจัดเก็บ สร้างและอัพเดทเอกสารของมาตรฐานระบบการจัดการความมั่นคงและปลอดภัยขององค์กรทั้งภายในและภายนอกได้อย่างถูกต้อง และสามารถประเมินผลได้ตามมาตรฐานที่ได้กำหนดไว้.
- Be able to practice Security skill to supervise the team contractor working correctly and effectiveness
- สามารถฝึกฝนเพื่อให้สามารถปฏิบัติการบังคับบัญชาหรือแนะนำงานในด้านความมั่นคงให้กับทีมงานผู้รับเหมาที่ปฏิบัติงานภายใต้บังคับบัญชาปฏิบัติงานได้อย่างถูกต้องและมีประสิทธิภาพได้ในอนาคต.
Skills:
Research, System Administration, Android
Job type:
Full-time
Salary:
negotiable
- Implements IT security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Protects IT system by defining access privileges, control structures, and required resources.
- Process & analyze to gain insights on past IT areas on, current or potential attacks and threats that pose a risk to the organization.
- Primary point of contact with Internal Audit. Periodically review, update, implement and communicate changes to IT policies and procedures and General IT Controls. Facilitate internal and external audit processes by participating in scoping discussions and walk-throughs, delivering evidence that controls are operating as defined, remediating deficiencies, and acting on recommendations.
- Safeguards IT infrastructure and system as well as information system assets by identifying and solving potential and actual security problems.
- Research cyber security topics and promote Cyber security awareness throughout Thaioil.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Relevant experience, especially in IT working environment.
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g., Netflow, FPC), and other attack artifacts in support of incident investigations.
- Experience with vulnerability scanning solutions.
- Familiarity with Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Have knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform.
- Understanding of mobile technology and OS (i.e., Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
- OTHER REQUIREMENTS.
Skills:
Express
Job type:
Full-time
Salary:
negotiable
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
Experience:
3 years required
Skills:
Compliance, Legal, Risk Management
Job type:
Full-time
Salary:
negotiable
- Develop data security policy review, data security policy exceptions, and control risk mitigation processes.
- Define the security controls for access management lifecycle (i.e., requirement for creation, deletion, transfer and review).
- Operate:Advice on technology relating to Data Privacy and Protection (i.e., PDPA) related security controls implementation.
- Drive and support data security controls such as Data Loss Prevention (DLP), Data Masking, Data Encryption capabilities to protect sensitive data.
- Drive compliance (or collaborate with compliance team) to organization security policies, standards, metrics, and legal requirements.
- Communicate and enforce security policies, rules, and standards.
- Conduct impact assessment of data initiatives from a security point of view.
- Ensure the cryptographic keys and related components are safety and protection of confidential information.
- Resolve data security audit and risk findings.
- Review and develop security controls to current access controls policies and procedures.
- Provide requirements for create and manage roles, access rights (includes privileged access), authentication and identity within the environment.
- Conduct periodic review of user access.
- Review, approve and monitor the usage of privileged access.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Work experience in privacy, compliance, information security, auditing or a related field may also be an accepted alternative, according to Cybersecurity.
- Minimum 3 years of experience in and strong knowledge of privacy, data, operational risk management, information security, or related areas in IT.
- OTHER REQUIREMENTS.
Experience:
5 years required
Skills:
Compliance, ISO 27001, Legal
Job type:
Full-time
Salary:
negotiable
- Design and implement a cybersecurity strategy that aligns with the organization's overall business objectives.
- Conduct regular security risk assessments, vulnerability assessments, and penetration testing to evaluate the organization s cyber defenses; subsequently, develop and implement security risk mitigation strategies and programs.
- Lead and coordinate response efforts in the event of security incidents, overseeing investigation, mitigation, and post-incident analysis.
- Compliance & Regulatory Management.
- Ensure adherence to relevant laws, regulations, and standards (e.g., PDPA).
- Implement and lead initiatives for security and compliance audit certifications, including ISO 27001, NIST, the Cyber Resilience Assessment Framework (C-RAF), and other applicable standards and best practices.
- Recommend, implement, and manage continuous monitoring of IT security systems and tools.
- Collaborate with legal and data protection teams to establish policies and safeguards for sensitive and personal data.
- IT Governance.
- Establish and maintain an IT governance framework, policies, and processes that align with the organization s business goals while ensuring compliance with legal, regulatory, corporate, and industry requirements.
- Work in partnership with management, legal, finance, and external auditors to promote transparency and alignment in governance practices.
- Generate and present reports on IT governance performance, compliance status, and the risk landscape to stakeholders.
- Data Governance.
- Develop and implement data governance policies that ensure data quality, security, and compliance.
- Manage the data lifecycle, align data strategies with business objectives, and collaborate with cross-functional teams to enhance data integrity.
- Oversee data stewardship, regulatory compliance, and provide best practices for data management to support effective decision-making.
- Team Leadership and Development.
- Lead and mentor a small team of IT governance, compliance, and security professionals.
- Foster a culture of continuous improvement and knowledge sharing within the team and across business units.
- Bachelor s or Master s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- A minimum of 5 years of experience in IT governance, cybersecurity, and compliance, with at least 2 years in a managerial role.
- Strong understanding of IT governance frameworks (e.g., ITIL, COBIT), cybersecurity standards (e.g., ISO 27001, NIST), and regulatory requirements (e.g., PDPA).
- Possession of basic IT governance and cybersecurity certifications (e.g., CISSP, CISM) is advantageous.
- Proficient in common technical team/project management tools (e.g., JIRA, Asana, Github). Collaborative team player with strong interpersonal skills, capable of working effectively with both internal and external teams.
- Working-level fluency in English and Thai. Proficient in English equivalent to IELTS 5.5, CEFR B2, or TOEFL 72; excellent spoken and written communication to effectively work with a global management team.
- Familiarity with local regulatory bodies (e.g., OIC, SEC, BOT) is a plus.
- Experience in the insurance industry will be an added advantage.
Experience:
5 years required
Skills:
DevOps, Automation, Compliance
Job type:
Full-time
Salary:
negotiable
- Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
- A dedicated DevSecOps or security engineering team is responsible for embedding security practices into the DevOps pipeline. They build and maintain the security tools and automation required for integrating security checks into the development process.
- Implement security tools in CI/CD pipelines (e.g., code scanning, vulnerability assessments).
- Automate security testing, monitoring, and compliance checks.
- Collaborate with development and operations teams to ensure security is applied at every stage.
- Designing, supervising, and validating holistic Banking application/infrastructure security architecture, to ensure that they are aligned with cybersecurity strategy, security requirement principle and generally cybersecurity best practices (through threat modelling or similar methods).
- Designing and Implementing CI/CD (DevSecOps) Technology integration through own teams and virtual team (with the members of Digital Technology Security team) to always tighten security architecture fabrics, and to support cybersecurity transformation, lean and automation process.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 5 years of experience in security advisory, security architecture, CI/CD security, Vulnerability Assessment, Penetration test or a related field.
- Good communication skills, with the ability to communicate complex security issues.
- Strong Knowledge in new Banking Technology and associated security controls.
- Knowledge of security best practices in software development.
- Knowledge of SDLC framework.
- Familiarity with CI/CD tools & DevOps tools.
- Experience with Code/Library/Image scanning tools (Dynamic/Static Code Scan).
- Expertise in cloud security (AWS, Azure, GCP, HWC).
- Experience with cloud security and compliance tools (CSPM).
- Knowledge of Securing Cloud Environments to ensure that security practices are tailored for cloud-native and hybrid environments, including container security, infrastructure as code, and microservices security.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
7 years required
Skills:
Sales, Procurement, Legal, English
Job type:
Full-time
Salary:
negotiable
- Bachelor's degree or equivalent practical experience.
- 7 years of experience in a business role in the enterprise software or cloud space.
- Experience promoting to the clients in the enterprise cybersecurity or IT field.
- Ability to communicate in English and Thai fluently to interact with regional customers.
- Ability to travel for business and trainings.
- Preferred qualifications:Experience in supporting executive relationships, and developing territories/accounts from scratch, while ensuring customer success, adoption and expansion.
- Experience in prioritizing, planning, and organizing solution-based business activity within business cycles, including qualifying high value accounts and leveraging our partner ecosystem.
- Experience working with internal/external teams, including account, technical leads, procurement, and legal, to inventory existing software estate, build business cases for transformation with implementation plans, and close agreements.
- Experience in carrying and exceeding business goals in a business role.
- Knowledge of market trends, products, and solutions in Cloud and cybersecurity.
- Excellent negotiation, problem-solving, communication and presentation skills.
- In this role, you will help us grow our cybersecurity business by building and expanding relationships with new and existing customers. You will work with customers to deliver business value, demonstrate product functionality, and provide an overview of business use cases. You will lead day-to-day relationships with cross-functional team members and external customers, leading with empathy, while identifying ways to multiply the impact and the impact of the team as a whole to motivate overall value for Google Cloud.
- Google Cloud accelerates every organization's ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google's cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
- ResponsibilitiesBuild relationships with customers as a subject matter expert and trusted advisor, managing business cycles, identifying solution use cases, and influencing direction of accounts.
- Deliver against quota and achieve business and growth goals while forecasting and reporting your territory's business.
- Work with Google accounts and cross-functional teams (e.g., Customer Engineering, Marketing, Customer Success, Product, Engineering, Channels) to develop go-to-market strategies, motivate pipeline and business growth, close agreements, understand customer, and provide excellent prospect and customer experience.
- Construct and execute a territory development plan.
- Work with multiple customers and opportunities, understand each customer's technology footprint and strategy, growth plans, business motivators, participants, and how they can transform their business using our technologies.
- Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See alsoGoogle's EEO Policy andEEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing ourAccommodations for Applicants form.
Skills:
Compliance, Risk Management, English
Job type:
Full-time
Salary:
negotiable
- Oversees and controls the implementation of the standards, policies and guidelines related to the topics within the scope of HSR and ensure compliance with local regulations. Identify areas of improvements and initiate projects to strengthen these topics in the countries assigned.
- Develops and maintains strategic, sustainable and effective working relationships with the stakeholders in each country, including external and internal stakeholders up to Country Leadership level and Regional functions.
- Oversee the execution of global and regional strategic projects related to Health, Safety (Offices) and Security in each country.
- Coordinates the response to potentially high impact events in each country, i.e. Emergency Management, Crisis Management, Threat Management, Duty of Care.
- Designated SHE Manager for the Bangkok office.
- Professionally represents the HSR department, engaging with each country/site leadership regarding policies, projects, risks and high impact situations.
- What makes you a good fit.
- Bachelor's degree in a related field is required.
- With a minimum of 6 years' work experience in the field of Safety, Security, Health, and Risk Management.
- Knowledgeable in conducting site security assessments and liaising with different businesses.
- Good stakeholder management skills and able to interact with corporate teams, country executive committees, and site managers.
- Regional exposure is preferred.
- Strong proficiency in English and the local language is required.
- Some perks of joining Henkel.
- Flexible work scheme with flexible hours, hybrid work model, and work from anywhere policy for up to 30 days per year.
- Diverse national and international growth opportunities.
- Globally wellbeing standards with health and preventive care programs.
- Gender-neutral parental leave for a minimum of 8 weeks.
- Employee Share Plan with voluntary investment and Henkel matching shares.
- Medical Coverage for employees and eligible dependents.
- Provident Fund.
- Annual Physical Examination for employees.
- Discounts on company products.
- At Henkel, we come from a broad range of backgrounds, perspectives, and life experiences. We believe the uniqueness of all our employees is the power in us. Become part of the team and bring your uniqueness to us! We welcome all applications across different genders, origins, cultures, religions, sexual orientations, disabilities, and generations.
Skills:
Compliance, Legal, English
Job type:
Full-time
Salary:
negotiable
- Driving PSMS (physical security management system) at local level within the framework of C/AUP governance (incl. Site Security Concept process & consulting of local management).
- Monitoring of adequate implementation of local risk mitigation measures (incl. security services delivered by GR/SES).
- Conducting security investigations at local level & support internal investigations (Compliance) on request.
- Implementing security awareness promotion activities along with other security stakeholders at site (e.g. DSO, GR).
- At Regional Level.
- Implementation/monitoring of the C/AUP regulatory framework in the region based on legal conditions.
- Serve as the primary contact point for physical security governance requirements for responsible region.
- Driving the regional int./ext. security network. Raise PSMS awareness among regional managers and employees.
- Support the continuous improvement process and share best practices within the worldwide security organization.
- Qualifications Bachelor s degree in related fields.
- 5-8 years' experience in an industrial/manufacturing company security or facilities experience are preferred.
- Excellent communication and presentation skills; demonstrated ability to interact with all levels of management with excellent analytical skills.
- Work independently and control own work priorities.
- Highly knowledgeable in all aspects of risk analysis.
- General knowledge of systems capability for security systems.
- Basic knowledge of investigation techniques and methods.
- A good understanding of risk and security issues facing office organization in Thailand.
- Good spoken and written English and Thai.
- Able to travel to Rayong province for work assignments as required.
- Additional InformationBy choice, we are committed to a diverse workforce and are an equal opportunity employer. Robert Bosch welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in the selection process.
- 1
- 2