- No elements found. Consider changing the search query.
Skills:
Compliance
Job type:
Full-time
Salary:
negotiable
- Validates, classifies, priorities and opens ticket.
- Acting as focal contact point for report security incidents.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of security incidents.
- Responds to security alerts generate within the SLA time window.
- Follow-up and tracking security incidents base on team process.
- Examine network topologies to understand data flows through the network.
- Validate security incidents alerts against network traffic using packet analysis tools.
- Isolate or remove malware.
- Identify applications and operating systems of a network device based on network traffic.
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
- Notify cybersecurity service provider team members of suspected cyber incidents, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Who are we looking for?.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Analytical and problem-solving skills are required.
- Knowledge of network traffic analysis methods.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Experience in IT Security, Network Security or Security Compliance.
- Knowledge of common security tools such as anti-virus, firewall and intrusion detection system.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Able to work in shift.
- Location: Head Office: Chatuchak, SJ Infinite One Business Complex
Experience:
1 year required
Skills:
Express
Job type:
Full-time
Salary:
negotiable
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
- Minimum years experience required.
- 1-2 years of experiences in Cyber - Penetration tester.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
Job type:
Full-time
Salary:
negotiable
- Respond effectively to the diverse perspectives, needs, and feelings of others.
- Use a broad range of tools, methodologies and techniques to generate new ideas and solve problems.
- Use critical thinking to break down complex concepts.
- Understand the broader objectives of your project or role and how your work fits into the overall strategy.
- Develop a deeper understanding of the business context and how it is changing.
- Use reflection to develop self awareness, enhance strengths and address development areas.
- Interpret data to inform insights and recommendations.
- Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements.
- Minimum years experience required.
- n/a.
- Additional application instructions.
- n/a.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture {+ 8 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
- Job Posting End Date.
Experience:
5 years required
Job type:
Full-time
Salary:
negotiable
- Liaise with business application owners and system owners to gather requirements and support the implementation of Role-Based Access Control (RBAC) projects.
- Analyze identity lifecycle processes, defining roles and access rights aligned with business and security requirements.
- Apply documented security frameworks, methods, and best practices to support project delivery and operational efficiency.
- Contribute to ISO 27001 implementation and follow up on cybersecurity non-compliance issues.
- Prepare project status reports and security documentation to support management decision-making.
- Support and lead security awareness initiatives for internal stakeholders.
- Coordinate with business users, internal IT teams, and regional stakeholders to enhance cybersecurity and compliance.
- ABOUT YOU
- Bachelor's or Master's degree in IT, Cybersecurity, MIS, or a related field.
- 5+ years of experience in Cybersecurity, Identity and Access Management, or related domains.
- Strong knowledge of IAM concepts, including RBAC and identity lifecycle management.
- Experience with ISO 27001 standards and cybersecurity compliance.
- Exposure to security awareness or training programs.
- Structured and analytical mindset with strong project management skills.
- Good command of Microsoft tools (Office, Project, Visio).
- Strong communication and interpersonal skills; ability to work under time constraints.
- Professional proficiency in English.
- WHY AMARIS?
- Global Diversity: Be part of an international team of 110+ nationalities, celebrating diverse perspectives and collaboration.
- Trust and Growth: With 70% of our leaders starting at entry-level, we're committed to nurturing talent and empowering you to reach new heights.
- Continuous Learning: Unlock your full potential with our internal Academy and over 250 training modules designed for your professional growth.
- Vibrant Culture: Enjoy a workplace where energy, fun, and camaraderie come together through afterworks, networking events, and more.
- Meaningful Impact: Join us in making a difference through our CSR initiatives, including the WeCare Together program, and be part of something bigger.
- Equal Opportunity
- At our company, we are committed to creating an inclusive workplace that promotes and values diversity. All qualified applicants will be considered for employment without regard to gender, sexual orientation, race, ethnicity, beliefs, age, marital status, disability, or any other characteristic protected by applicable laws.
- Who are we?
- Amaris Consulting is an independent technology consulting firm providing guidance and solutions to businesses. With more than 1000 clients across the globe, we have been rolling out solutions in major projects for over a decade - this is made possible by an international team of 7,600 people spread across 5 continents and more than 60 countries. Our solutions focus on four different Business Lines: Information System & Digital, Telecom, Life Sciences and Engineering. We're focused on building and nurturing a top talent community where all our team members can achieve their full potential. Amaris is your steppingstone to cross rivers of change, meet challenges and achieve all your projects with success.
- Brief Call: Our process typically begins with a brief virtual/phone conversation to get to know you! The objective? Learn about you, understand your motivations, and make sure we have the right job for you!
- Interviews (the average number of interviews is 3 - the number may vary depending on the level of seniority required for the position). During the interviews, you will meet people from our team: your line manager of course, but also other people related to your future role. We will talk in depth about you, your experience, and skills, but also about the position and what will be expected of you. Of course, you will also get to know Amaris: our culture, our roots, our teams, and your career opportunities!
- Case study: Depending on the position, we may ask you to take a test. This could be a role play, a technical assessment, a problem-solving scenario, etc.
- As you know, every person is different and so is every role in a company. That is why we have to adapt accordingly, and the process may differ slightly at times. However, please know that we always put ourselves in the candidate's shoes to ensure they have the best possible experience.
- We look forward to meeting you!
Skills:
Teamwork, Compliance, Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Work in Shift.
- We are looking for a highly proficient Cyber Security Consultant who has the professional knowledge and skill to drive and enhance our security solutions in any field at MFEC Cyber Security Operation Center (CSOC) for our large enterprise customers.
- What we want?.
- To find the most efficient way to create and to manage every cyber security solution for multiple clients.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Work in Shift.
- Who are we looking for?.
- 1-3 Years or experience in Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Strong knowledge and experience with various IT security such as Incident Handler, Forensic Examiner, Forensic Analyst is a plus.
- Excellent knowledge in Security Product (Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Proficiency in English both written and spoken.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak, Lao Peng Nguan Building
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
2 years required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and give in the moment feedback in a constructive manner.
- Share and collaborate effectively with others.
- Identify and make suggestions for improvements when problems and/or opportunities arise.
- Handle, manipulate and analyse data and information responsibly.
- Follow risk management and compliance procedures.
- Keep up-to-date with developments in area of specialism.
- Communicate confidently in a clear, concise and articulate manner - verbally and in the materials I produce.
- Build and maintain an internal and external network.
- Seek opportunities to learn about how PwC works as a global network of firms.
- Uphold the firm's code of ethics and business conduct.
- Bachelor s degree in Computer Engineering, Computer Science, Information Systems or a related field.
- 0-2 years of experience.
- Be able to utilize your well-rounded skills and experience related to industries to steer your projects to a successful outcome.
- Team player with strong interpersonal, communication skills.
- Be able to work both independently and as part of a team with professionals at all levels.
- Proficiency in spoken and written English & Thai.
- We thank all applicants. Please note that only short-listed candidates will be contacted for interviews.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
- Job Posting End Date.
Experience:
2 years required
Skills:
Public Relations, Legal, ISO 27001, English
Job type:
Full-time
Salary:
negotiable
- Executes cybersecurity engineer tasks including, but not limited to, security patch management, security vulnerability management, and security configuration management.
- Tests, implements, deploys, maintains, reviews, and administers the cybersecurity tools.
- Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
- Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
- Identify potential conflicts with the implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
- Operates and maintains production information security systems.
- Ensures proper cybersecurity documentation is in place regarding standard operating procedures.
- Monitors the industry and external environment for emerging threats and advises relevant stakeholders on appropriate courses of action.
- Oversees incident response planning and the investigation of security breaches and assists with any associated disciplinary, public relations, and legal matters.
- Applies expert knowledge and skills to resolve problems, including support concepts and methods, problem isolation and troubleshooting procedures, system and file recovery processes, and operating system and network configurations.
- Prepares and presents cogent and cohesive analyses and briefings advising management on new technological developments, techniques, and enhancements that result in increased time and cost efficiencies.
- Provides advice and assistance to troubleshoot the most complex problems in a manner that minimizes interruptions in the ability to carry out critical business activities.
- Supports rapid response teams in response to customer service problems resulting from catastrophic events such as virus infections or widespread power outages.
- Supports the development of a formal cyber security risk assessment program.
- Supports and assists in maintaining a vulnerability/gap/response assessment program.
- Supports the ongoing maintenance of the cyber-Kill Chain for the company, focusing on phases of cyber-attack and remediation/mitigation for each phase.
- Supports ongoing activities to develop, communicate, and support appropriate standards and risk controls associated with digital data.
- Supports the development and maintenance of a company Data Protection program.
- Responds to cybersecurity alerts.
- Cascade and leverage cybersecurity control and practice to the entire company group.
- Bachelor s or Master s degree in Computer Engineering, MIS, IT, or a related field.
- At least 2 years experience in computer security and 5 years in IT infrastructure.
- Have a foundation in good information security practices.
- Knowledge of International Security frameworks, Standards, and Guidelines, e.g., COBIT, NIST-800, ISO 27001, PCI-DSS, OWASP, etc.
- Experience in Security tools, e.g., EDR, ATP, WAF, IPS/IDS, Deception, TI/TIP, Anti DDoS.
- Experience in Cloud Environments, e.g., Google Cloud, AWS, Microsoft Azure.
- Experience with system and application security management and control.
- Experience with system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
- Experience with facilitating information security risk assessments.
- Technical writing, documentation development, process mapping, and visual communication skills.
- Hands-on experience with computer programming languages and/or scripting languages such as Python, Java, and Shell for automation.
- Professional certificates related to work (e.g., CISSP, CISM, AWS Certified Security, or similar general security certification) are desirable.
- Talent to identify and create a broad vision for a security solution and to execute it;.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- A positive, can-do attitude who naturally expresses a high degree of empathy to others.
- Ability to explain your thoughts or findings also to non-technical professionals.
- Strong problem-solving and analytical abilities Able to work under minimal supervision, detail oriented.
- Excellent English (Spoken and Written).
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
Experience:
3 years required
Skills:
Compliance, Industrial Engineering, Automation, English
Job type:
Full-time
Salary:
negotiable
- Build strong relationships with Reckitt s Manufacturing community (both virtual and in-person), as well as global Health & Hygiene and IT teams.
- Engage at both strategic and operational levels, connecting with factory leadership and shopfloor personnel.
- Confidently guide and challenge leaders using excellent communication and presentation skills.
- Operate in a matrix environment, supporting Solutions Delivery and Demand Management.
- Oversee manufacturing operations, understand processes, and present solutions to business teams while clearly articulating technical issues to delivery teams.
- Develop expertise in key Reckitt applications and leverage their benefits.
- Ensure compliance with global technical and information standards.
- The experience we're looking for.
- Education: Bachelor s degree in IT, Industrial Engineering, or related field (Master s preferred).
- Experience: Minimum 3 years in a relevant industry.
- Skills & Knowledge:Strong understanding of manufacturing processes, IT&D operating models, Industrial Automation, and Industry 4.0.
- Ability to work independently, make decisions, and clarify complex situations.
- Comfortable in fast-paced, dynamic environments; proactive and improvement-focused.
- Excellent communication and presentation skills; adaptable to different styles.
- Strong business acumen and problem-solving ability.
- Fluent in English (reading, writing, speaking).
- The skills for success.
- Product Development, system development, Project Management, Programme Management, Design Thinking, Process Automation, IT Service Management, Innovation Processes, Innovation, User Experience Design, Change Analyst, Change Management, Digital Transformation, Value Analysis, Change Management, Adoption, Technology Adoption Lifecycle, Stakeholder Relationship Management, Vendor Management, Outstanding Communication, stakeholder engagement, Digital Strategy, Product Solution Architecture, Cyber Security Strategy, Cyber Security, Data Privacy, Portfolio Management, Data Governance, Product Compliance, Media Analytics, advertising, Consumer Engagement.
- What we offer.
- With inclusion at the heart of everything we do, working alongside our four global Employee Resource Groups, we support our people at every step of their career journey, helping them to succeed in their own individual way. We invest in the wellbeing of our people through parental benefits, an Employee Assistance Program to promote mental health, and life insurance for all employees globally. We have a range of other benefits in line with the local market. Through our global share plans we offer the opportunity to save and share in Reckitt's potential future successes. For eligible roles, we also offer short-term incentives to recognise, appreciate and reward your work for delivering outstanding results. You will be rewarded in line with Reckitt's pay for performance philosophy.
- Equality.
- We recognise that in real life, great people don't always 'tick all the boxes'. That's why we hire for potential as well as experience. Even if you don't meet every point on the job description, if this role and our company feels like a good fit for you, we still want to hear from you. All qualified applicants will receive consideration for employment without regard to age, disability or medical condition; colour, ethnicity, race, citizenship, and national origin; religion, faith; pregnancy, family status and caring responsibilities; sexual orientation; sex, gender identity, gender expression, and transgender identity; protected veteran status; size or any other basis protected by appropriate law.
Skills:
Software Development, Analytical Thinking, Excel
Job type:
Full-time
Salary:
negotiable
- Extensive understanding of the software development lifecycle, backed by relevant technical certifications.
- Adept in Agile practises, with experience leading cross-functional teams to achieve exceptional results.
- Competence in applying technical frameworks and methodologies, complemented by a foundational grasp of user experience design.
- Familiarity with modern platform engineering technologies and tools.
- Exceptional communication capabilities, paired with strong analytical thinking and a keen eye for detail.
- A self-starter attitude with the ability to excel independently and in collaboration with a team.
- The experience we're looking for.
- Extensive understanding of the software development lifecycle, backed by relevant technical certifications.
- Adept in Agile practises, with experience leading cross-functional teams to achieve exceptional results.
- Competence in applying technical frameworks and methodologies, complemented by a foundational grasp of user experience design.
- Familiarity with modern platform engineering technologies and tools.
- Exceptional communication capabilities, paired with strong analytical thinking and a keen eye for detail.
- A self-starter attitude with the ability to excel independently and in collaboration with a team.
- The skills for success.
- Product Development, system development, Project Management, Programme Management, Design Thinking, Process Automation, IT Service Management, Innovation Processes, Innovation, User Experience Design, Change Analyst, Change Management, Digital Transformation, Value Analysis, Change Management, Adoption, Technology Adoption Lifecycle, Stakeholder Relationship Management, Vendor Management, Outstanding Communication, stakeholder engagement, Digital Strategy, Product Solution Architecture, Cyber Security Strategy, Cyber Security, Data Privacy, Portfolio Management, Data Governance, Product Compliance, Media Analytics, advertising, Consumer Engagement.
- What we offer.
- With inclusion at the heart of everything we do, working alongside our four global Employee Resource Groups, we support our people at every step of their career journey, helping them to succeed in their own individual way. We invest in the wellbeing of our people through parental benefits, an Employee Assistance Program to promote mental health, and life insurance for all employees globally. We have a range of other benefits in line with the local market. Through our global share plans we offer the opportunity to save and share in Reckitt's potential future successes. For eligible roles, we also offer short-term incentives to recognise, appreciate and reward your work for delivering outstanding results. You will be rewarded in line with Reckitt's pay for performance philosophy.
- Equality.
- We recognise that in real life, great people don't always 'tick all the boxes'. That's why we hire for potential as well as experience. Even if you don't meet every point on the job description, if this role and our company feels like a good fit for you, we still want to hear from you. All qualified applicants will receive consideration for employment without regard to age, disability or medical condition; colour, ethnicity, race, citizenship, and national origin; religion, faith; pregnancy, family status and caring responsibilities; sexual orientation; sex, gender identity, gender expression, and transgender identity; protected veteran status; size or any other basis protected by appropriate law.
- 1
