- No elements found. Consider changing the search query.


Skills:
ISO 27001
Job type:
Full-time
Salary:
negotiable
- Protect the organization's computer networks and systems against a range of cyber threats, such as hacking attempts, data breaches, and different types of cyber attacks. The
- responsibilities of this role include creating, deploying, and overseeing security strategies and technologies to defend the organization IT security.
- Lead the strategic direction, development, and implementation of cybersecurity solutions and practices to protect the organization from sophisticated cyber threats and ...
- Serve as the foremost cybersecurity expert within the organization, providing deep technical expertise and leadership in the design, evaluation, and optimization of complex security architectures.
- Develop comprehensive cybersecurity frameworks that align with industry best practices and regulatory standards, ensuring the organization's resilience against cyber attacks.
- Conduct sophisticated risk assessments and threat modeling exercises to identify potential security gaps and develop advanced strategies for mitigation and prevention.
- Lead the incident response and crisis management efforts for high-impact security breaches, coordinating with cross-functional teams to ensure rapid containment and recovery.
- Drive the adoption of cutting-edge security technologies and methodologies, including artificial intelligence and machine learning, to enhance detection and response capabilities.
- Establish and maintain strong relationships with external cybersecurity agencies, industry groups, and technology partners to stay abreast of emerging threats and trends.
- Develop and manage the cybersecurity budget, ensuring strategic allocation of resources to high-priority projects and initiatives.
- Advanced degree in Computer Science, Information Security, or a related field, with specialized knowledge in cybersecurity.
- A minimum of 5 years of experience in Infrastructure, 3 years of cybersecurity, with at least 2 years in a strategic leadership or management role overseeing cybersecurity functions.
- Professional cybersecurity certifications, such as CISSP, CISM, CCSP, or similar, are required.
- Proven expertise in developing and implementing cybersecurity strategies and architectures to protect complex enterprise environments.
- Other: Deep knowledge of the cybersecurity landscape, including emerging threats, advanced persistent threats (APT), regulatory requirements, and industry best practices.
- Other: ISO 27001.
Skills:
Research, System Administration, Android
Job type:
Full-time
Salary:
negotiable
- Implements IT security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Protects IT system by defining access privileges, control structures, and required resources.
- Process & analyze to gain insights on past IT areas on, current or potential attacks and threats that pose a risk to the organization.
- Primary point of contact with Internal Audit. Periodically review, update, implement and communicate changes to IT policies and procedures and General IT Controls. Facilitate internal and external audit processes by participating in scoping discussions and walk-throughs, delivering evidence that controls are operating as defined, remediating deficiencies, and acting on recommendations.
- Safeguards IT infrastructure and system as well as information system assets by identifying and solving potential and actual security problems.
- Research cyber security topics and promote Cyber security awareness throughout Thaioil.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Relevant experience, especially in IT working environment.
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g., Netflow, FPC), and other attack artifacts in support of incident investigations.
- Experience with vulnerability scanning solutions.
- Familiarity with Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Have knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform.
- Understanding of mobile technology and OS (i.e., Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
- OTHER REQUIREMENTS.
Skills:
ISO 27001, Compliance, Assurance, English
Job type:
Full-time
Salary:
negotiable
- Develop and support internal audit strategies within the cyber security domain, which involves protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
- Implement work standards to achieve desired outcomes and report findings to top management as a Cyber Security Auditor.
- Identify potential cyber security risks and convince organizational stakeholders to adopt comprehensive actionable recommendations.
- Act as a liaison with internal auditors, external auditors, Bank of Thailand auditors, Electronic Transactions Development Agency auditors, and other regulatory bodies (e.g., ISO 27001, PCI DSS, etc.) to ensure documentation and information compliance.
- Provide assurance and advisory services to ensure that IT Management plans, organizes, and directs appropriate IT governance, risk management, and control processes.
- Liaise with IT risk owners to develop risk-based assessments and establish risk response programs and reporting processes according to the Risk Management Policy and Framework.
- Bachelor's or master s degree in Computer Engineering, Computer Science, Information Technology, or related fields.
- Experience in relevant local and international security standards and best practices such as ISO 27001, NIST, COBIT, COSO, PCI DSS, and ITIL.
- Experience in IT Governance, Risk Management, and Control Processes (IT GRC), Project Management, Lead Auditor/Lead Implementer, or similar roles is preferred.
- Professional certifications such as CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional), and CRISC (Certified in Risk and Information Systems Control) are advantageous.
- Technical expertise in cyber security auditing.
- Proficiency in English.
- At least 3 years of experience in information security management, information risk management, IT audit management, ICT security, cloud security, or related fields.
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
2 years required
Skills:
Network Infrastructure, Security Design, Big Data, English
Job type:
Full-time
Salary:
negotiable
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Shape The Future with Confidence.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Experience:
1 year required
Skills:
DevOps, Automation, Electrical Engineering
Job type:
Full-time
Salary:
negotiable
- Equipped with security knowledge and done related projects in technical IT domains such as operating systems, networks, databases, cloud or solution development etc.
- Possess knowledge in assessing solution architectures at the planning and design level for security issues and vulnerabilities.
- Experience in practical security vulnerability remediation.
- Information Security domains - in particular one or more of the following: Cyber Program Management, Cyber Threat Management, Identity & Access Management, Data Protection, Privacy, Organisational Resilience. This experience should include both advisory, implementation and operation experience.
- Strong technical security skills in assessment, design, implementation, architecture, and program / project delivery and work across various delivery models, (Waterfall, Agile, DevOps).
- Implementation skill set for identity and access management platforms, security information and event management platforms, security automation and orchestration platforms, advance threat detection systems, endpoint protection systems, data leak prevention systems or network security devices.
- To qualify for the role you must have.
- A recognized university degree in Computer Science, Computer/Electrical Engineering, Information Technology or equivalent.
- Experience with a leading Security technology like Microsoft Security, Crowdstrike, Splunk and others would be a strong advantage.
- Creative, independent with good problem solving skills.
- Excellent communicator with strong analytical, interpersonal and writing skills.
- Candidates with minimum 10-15 years of relevant experience, including managing a team, will be considered for a Leadership role.
- Ideally, you ll also have.
- Industry related certification preferred (e.g. CISSP, CISA, CISM, SABSA, PRINCE2, TOGAF, ITIL).
- Solution Level Certifications, OSCP, CREST, GIAC would be advantageous, as well as penetration testing experience.
- Highly motivated individuals with excellent problem-solving skills and the ability to prioritize shifting workloads in a rapidly changing industry. An effective communicator, you ll be a confident team player that collaborates with people from various teams while looking to develop your career in a dynamic organization.
- What we offer.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Building a better working world.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Experience:
1 year required
Skills:
Risk Management, Compliance
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
Skills:
Express
Job type:
Full-time
Salary:
negotiable
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Skills:
Nutrition, Project Management
Job type:
Full-time
Salary:
negotiable
- Accountable for Nutrition Thailand Commercial IT and ASEAN Manufacturing systems across Plant locations in ASEAN (Chonburi, Tuas, Makati). Works with global product teams, global/regional internal IT teams, and global/regional/local vendors and partners to deliver IT and Digital systems to enable business teams and support the delivery of business priorities.
- Partners with business stakeholders/client to identify Information Technology and Digital priorities, define the Technology roadmap and own the Technology agenda for Nu ...
- Manage IT Business Analyst to identify IT demand, understand the business case / benefit, document and develop detailed requirements, and verify business and user requirements for technology solutions.
- Your responsibilities.
- Supports directly the business units and provides IT&D leadership and support to the Nutrition business unit of Thailand and ASEAN Manufacturing.
- Anticipates needs of supported business areas and works with local, regional and global IT&D partners to leverage Information Technology to achieve business results.
- Translates IT&D strategies into Commercial IT (for Thailand market) and Manufacturing IT roadmap (for ASEAN), operational goals and objectives. Identifies necessary business resources and aligns IT&D strategies/roadmaps with key business/manufacturing priorities.
- Member of Market Leadership Team and Manufacturing Leadership Team, provides functional/IT&D leadership as well as business leadership through deep understanding of the end-to-end market/business as well as Plant/manufacturing operations, processes and business objectives/priorities.
- Communicates effectively with IT&D and business partners as well as with service providers to negotiate, influence and gain alignment on strategies and priorities.
- Develops and maintains a network of credible and productive relationships with global product teams and global/regional IT&D partners inside MJN, as well as with external service providers, to identify the most effective ways to use Information Technology to achieve business outperformance and drive strategy alignment.
- Owns knowledge and understanding of global IT strategy and global programmes / system changes across the Manufacturing and Commercial IT products and drives alignment / focus on high impact/high priority areas for the supported Market and Plants.
- Owns and maintains the technology stack/products for Nutrition Thailand Commercial as and ASEAN Manufacturing, ensures product information relevant to the market/plants are up-to-date and accurately reflecting the status of Tech/IT products deployed to the Market/Plants.
- Develops business case with estimate and effort while gathering high level requirements to enable business capabilities.
- Contributes to the creation of high-performance culture within IT&D team through effective leadership and engagement with internal/external stakeholders, including IT service providers.
- Drives standardization and simplification of business processes to optimize technology-enabled business processes.
- Leads and educates business partners and service providers on IT&D processes and governance while challenging the status quo.
- The experience we're looking for.
- BS degree in Information Technology or equivalent required.
- Minimum of 10 years of IT or relevant experience.
- Experience in working in a high-matrix global IT organization.
- Experience in leading and managing teams/projects across geographic locations.
- Recognized by key business partners as an expert in driving innovative and creative business solutions resulting in increased leverage of information technology.
- Demonstrated mastery of managing solution delivery partners.
- Strong understanding of financial principles, the budgetary process, resource planning and allocation, and the fundamental drivers of sales and profit.
- Demonstrated ability to educate key business partners on key IT processes such as SDLC, IT Portfolio and enhancement governance, and project management principles.
- In-depth understanding of business/technical processes, interdependencies, and potential ramifications of future change within them.
- Broad up-to-date awareness of technology architecture and future direction and awareness of technology tools and trends with potential impact to business processes.
- Experience working in global consumer products/FMCG/Nutrition industry environment.
- The skills for success.
- Digital Strategy, Product Solution Architecture, Cyber Security Strategy, Cyber Security, Data Privacy, Portfilio Management, Data Governance, Product Compliance, Digital Transformation, Stakeholder Relationship Management, Outstanding Communication, stakeholder engagement.
- What we offer.
- With inclusion at the heart of everything we do, working alongside our four global Employee Resource Groups, we support our people at every step of their career journey, helping them to succeed in their own individual way. We invest in the wellbeing of our people through parental benefits, an Employee Assistance Program to promote mental health, and life insurance for all employees globally. We have a range of other benefits in line with the local market. Through our global share plans we offer the opportunity to save and share in Reckitt's potential future successes. For eligible roles, we also offer short-term incentives to recognise, appreciate and reward your work for delivering outstanding results. You will be rewarded in line with Reckitt's pay for performance philosophy.
- Equality.
- We recognise that in real life, great people don't always 'tick all the boxes'. That's why we hire for potential as well as experience. Even if you don't meet every point on the job description, if this role and our company feels like a good fit for you, we still want to hear from you. All qualified applicants will receive consideration for employment without regard to age, disability or medical condition; colour, ethnicity, race, citizenship, and national origin; religion, faith; pregnancy, family status and caring responsibilities; sexual orientation; sex, gender identity, gender expression, and transgender identity; protected veteran status; size or any other basis protected by appropriate law.
Experience:
2 years required
Skills:
Public Relations, Legal, Computer Security, English
Job type:
Full-time
Salary:
negotiable
- Executes cybersecurity engineer tasks including, but not limited to, security patch management, security vulnerability management, and security configuration management.
- Tests, implements, deploys, maintains, reviews, and administers the cybersecurity tools.
- Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
- Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
- Identify potential conflicts with the implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
- Operates and maintains production information security systems.
- Ensures proper cybersecurity documentation is in place regarding standard operating procedures.
- Monitors the industry and external environment for emerging threats and advises relevant stakeholders on appropriate courses of action.
- Oversees incident response planning and the investigation of security breaches and assists with any associated disciplinary, public relations, and legal matters.
- Applies expert knowledge and skills to resolve problems, including support concepts and methods, problem isolation and troubleshooting procedures, system and file recovery processes, and operating system and network configurations.
- Prepares and presents cogent and cohesive analyses and briefings advising management on new technological developments, techniques, and enhancements that result in increased time and cost efficiencies.
- Provides advice and assistance to troubleshoot the most complex problems in a manner that minimizes interruptions in the ability to carry out critical business activities.
- Supports rapid response teams in response to customer service problems resulting from catastrophic events such as virus infections or widespread power outages.
- Supports the development of a formal cyber security risk assessment program.
- Supports and assists in maintaining a vulnerability/gap/response assessment program.
- Supports the ongoing maintenance of the cyber-Kill Chain for the company, focusing on phases of cyber-attack and remediation/mitigation for each phase.
- Supports ongoing activities to develop, communicate, and support appropriate standards and risk controls associated with digital data.
- Supports the development and maintenance of a company Data Protection program.
- Responds to cybersecurity alerts.
- Cascade and leverage cybersecurity control and practice to the entire company group.
- Bachelor s or Master s degree in Computer Engineering, MIS, IT, or a related field.
- At least 2 years experience in computer security and 5 years in IT infrastructure.
- Have a foundation in good information security practices.
- Knowledge of International Security frameworks, Standards, and Guidelines, e.g., COBIT, NIST-800, ISO 27001, PCI-DSS, OWASP, etc.
- Experience in Security tools, e.g., EDR, ATP, WAF, IPS/IDS, Deception, TI/TIP, Anti DDoS.
- Experience in Cloud Environments, e.g., Google Cloud, AWS, Microsoft Azure.
- Experience with system and application security management and control.
- Experience with system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
- Experience with facilitating information security risk assessments.
- Technical writing, documentation development, process mapping, and visual communication skills.
- Hands-on experience with computer programming languages and/or scripting languages such as Python, Java, and Shell for automation.
- Professional certificates related to work (e.g., CISSP, CISM, AWS Certified Security, or similar general security certification) are desirable.
- Talent to identify and create a broad vision for a security solution and to execute it;.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- A positive, can-do attitude who naturally expresses a high degree of empathy to others.
- Ability to explain your thoughts or findings also to non-technical professionals.
- Strong problem-solving and analytical abilities Able to work under minimal supervision, detail oriented.
- Excellent English (Spoken and Written).
- Location: True Digital Park, Punnawithi.
- 1