- No elements found. Consider changing the search query.
Experience:
5 years required
Skills:
Contracts, Procurement, AutoCAD, English
Job type:
Full-time
Salary:
negotiable
- Serve as the key business partner working directly with service business partners and internal stakeholders (primarily infrastructure, physical security and operations teams).
- Collaborate with engineers, technicians, project managers, and Sr. Leaders to develop your programs.
- Drive process change and improvement across multiple business and program teams.
- Report ad hoc, weekly, and monthly program and operating metrics.
- Run meetings, create and maintain timelines, and keep large, diverse groups informed of progress and obstacles.
- Manage security system integration vendor contracts to deliver projects.
- Communicate the status of programs with customers, stakeholders and conduct program reviews.
- Must be willing to travel 15% of the time as required when launching new locations (Domestically and Internationally).
- A day in the life
- The SPM team in ASEAN is a high performing unit that supports ASEAN Data Center builds now and into the future. The team work at pace and Take Ownership, able to Deliver Results on a daily basis. We are mindful of each others differences and work tirelessly to support each other daily.
- Diverse Experiences
- Amazon values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn t followed a traditional path, or includes alternative experiences, don t let it stop you from applying.
- Why AWS
- Amazon Web Services (AWS) is the world s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating that s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
- Work/Life Balance
- We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there s nothing we can t achieve in the cloud.
- Inclusive Team Culture
- Here at AWS, it s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon conferences, inspire us to never stop embracing our uniqueness.
- Mentorship and Career Growth
- We re continuously raising our performance bar as we strive to become Earth s Best Employer. That s why you ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
- BASIC QUALIFICATIONS.
- 5 years working in Project Management related to construction or physical security.
- Demonstrated ability to manage multiple complex projects and adapt to and control change on a project.
- Fluency/competency in more than one language in Thai and English to communicate with local and overseas stakeholders.
- Experienced in vendor management and procurement processes, to include the establishment of key performance indicators and service level agreements.
- PREFERRED QUALIFICATIONS.
- BA/BS degree or higher in related field of architecture, engineering, or project management. PSP, CPP, PMP Certification will be an added advantage.
- Subject Matter Expertise with Access Control, Intrusion Detection, and Video Surveillance Systems.
- Demonstrated ability to use AutoCad/Desk, BIM, Bluebeam.
- Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit https://amazon.jobs/content/en/how-we-hire/accommodations for more information. If the country/region you re applying in isn t listed, please contact your Recruiting Partner.
Skills:
ISO 27001, DevOps, Swift
Job type:
Full-time
Salary:
negotiable
- Manage end-to-end cryptographic key lifecycle (generation, distribution, rotation, backup, archival, destruction).
- Administer and operate Hardware Security Modules (HSMs), preferably Thales Luna HSM.
- Define and enforce key management policies and procedures aligned with banking regulations and industry standards (e.g., PCI DSS, ISO 27001).
- Support encryption key integration across banking applications, core systems, payment systems, and digital channels.
- Conduct key ceremonies and maintain audit logs.
- Vault & Secrets Management.
- Administer enterprise vault platforms (e.g., HashiCorp Vault or similar).
- Manage secrets lifecycle (API keys, certificates, tokens, database credentials).
- Configure access control policies, role-based access, and segregation of duties.
- Integrate vault solutions with applications, DevOps pipelines, and cloud/on-prem infrastructure.
- Monitor vault security posture and perform regular health checks.
- Security & Compliance.
- Ensure compliance with regulatory requirements (BOT, PCI DSS, SWIFT CSP, etc.).
- Perform risk assessments related to cryptographic controls.
- Support audit activities and provide evidence for internal/external auditors.
- Participate in incident response related to key compromise or vault breaches.
- Architecture & Improvement.
- Contribute to cryptographic architecture design and secure key management framework.
- Support post-quantum cryptography transition planning (if applicable).
- Recommend best practices and continuous improvements for key and secrets management.
- Apply now if you have these advantages.
- Bachelor s degree or higher in computer science/ data science or any related field.
- Minimum of 3-7 years of experience in Information Security or Cryptography (Banking Financial industries are advantage).
- 3-7+ years of experience in Information Security or Cryptography.
- Hands-on experience with HSM (Thales Luna preferred).
- Experience in Vault or Secrets Management platforms (e.g., HashiCorp Vault).
- Experience in banking or financial services environment is highly preferred..
- Strong understanding of cryptographic principles (PKI, symmetric/asymmetric encryption, TLS, key wrapping, key derivation).
- Experience with key lifecycle management processes.
- Knowledge of PKI, certificate management, and CA integration.
- Familiarity with PCI DSS encryption requirements.
- Scripting skills (e.g., Bash, Python, PowerShell) are a plus.
- Why join Krungsri?.
- As a part of MUFG (Mitsubishi UFJ Financial Group), we a truly a global bank with networks all over the world.
- We offer a striking work-life balance culture with hybrid work policies (3 days in office per week).
- Unbelievable benefits such as attractive bonuses, employee loan with special rates and many more..
- Apply now before this role is close. **.
- FB: Krungsri Career(http://bit.ly/FacebookKrungsriCareer [link removed]).
- LINE: Krungsri Career (http://bit.ly/LineKrungsriCareer [link removed]).
- Talent Acquisition Department
- Bank of Ayudhya Public Company Limited
- 1222 Rama III Rd., Bangpongpang, Yannawa, Bangkok 10120.
- āļŦāļĄāļēāļĒāđāļŦāļāļļ āļāļāļēāļāļēāļĢāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāđāļĨāļ°āļāļ°āļĄāļĩāļāļąāđāļāļāļāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāļđāđāļŠāļĄāļąāļāļĢ āļāđāļāļāļāļĩāđāļāļđāđāļŠāļĄāļąāļāļĢāļāļ°āđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāđāļāđāļēāļĢāđāļ§āļĄāļāļēāļāļāļąāļāļāļāļēāļāļēāļĢāļāļĢāļļāļāļĻāļĢāļĩāļŊ.
- Remark: The bank needs to and will have a process for verifying personal information related to the criminal history of applicants before they are considered for employment with the bank..
- Applicants can read the Personal Data Protection Announcement of the Bank's Human Resources Function by typing the link from the image that stated below.
- EN (https://krungsri.com/b/privacynoticeen).
- āļāļđāđāļŠāļĄāļąāļāļĢāļŠāļēāļĄāļēāļĢāļāļāđāļēāļāļāļĢāļ°āļāļēāļĻāļāļēāļĢāļāļļāđāļĄāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļŠāđāļ§āļāļāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨāļāļāļāļāļāļēāļāļēāļĢāđāļāđāđāļāļĒāļāļēāļĢāļāļīāļĄāļāđāļĨāļīāļāļāđāļāļēāļāļĢāļđāļāļ āļēāļāļāļĩāđāļāļĢāļēāļāļāļāđāļēāļāļĨāđāļēāļ.
- āļ āļēāļĐāļēāđāļāļĒ (https://krungsri.com/b/privacynoticeth).
Skills:
ISO 27001, Python, PowerShell
Job type:
Full-time
Salary:
āļŋ60,000 - āļŋ80,000, negotiable
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5 years of experience in IT security and governance.
- Strong understanding of IT security principles, practices, and technologies.
- Knowledge of relevant security standards and regulations (e.g., ISO 27001, NIST, GDPR, HIPAA, PCI DSS).
- Experience with risk assessment and vulnerability management.
- Experience with security incident response and management.
- Strong analytical and problem-solving skills.
- Excellent communication and interpersonal skills.
- Ability to work independently and as part of a team..
- Relevant certifications (e.g., CISSP, CISM, CISA, Security+).
- Experience with cloud security (AWS, Azure, GCP) and On-Premises.
- Experience with security information and event management (SIEM) systems.
- Experience with scripting languages (e.g., Python, PowerShell).
- Experience with penetration testing.
- Ability to maintain confidentiality and handle sensitive information.
- Ability to adapt to changing technologies and security threats.
- Strong attention to detail and organizational skills.
- Ability to create and maintain clear and concise documentation..
- āđāļāļāļąāļŠāļāļĢāļ°āļāļģāļāļĩ.
- āļĨāļēāļāļąāļāļĢāđāļāļ āđāļĄāļ·āđāļāļāđāļāļāļāļĨāļāļāļāļēāļ.
- āļĨāļē Workcation.
- āļāļāļāļāļļāļāļŠāļģāļĢāļāļāđāļĨāļĩāđāļĒāļāļāļĩāļ.
- āļāļĢāļ°āļāļąāļāļŠāļąāļāļāļĄ / āļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ / āļāļĢāļ°āļāļąāļāļāļĩāļ§āļīāļ / āļāļĢāļ°āļāļąāļāļāļļāļāļąāļāļīāđāļŦāļāļļ.
- āļ§āļąāļāļŦāļĒāļļāļāļāļēāļĄāļāļāļŦāļĄāļēāļĒ (āđāļĄāđāļāđāļāļĒāļāļ§āđāļē 13āļ§āļąāļ).
- āļĨāļēāļŦāļĒāļļāļāđāļāđāļāļ·āļāļāđāļāļīāļ.
- āļāļĢāļ§āļāļŠāļļāļāļ āļēāļāļāļĢāļ°āļāļģāļāļĩ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļŠāļĄāļĢāļŠ.
- āļŠāļīāļāļāļīāļāļļāļāļāđāļāļĨāļēāđāļĨāļĩāđāļĒāļāļāļļāļāļĢ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāļēāļāļāļāļīāļ.
- Co working Space.
- āļāļīāļāđāļāļ.
- Point āđāļĨāļāļāļāļāļĢāļēāļāļ§āļąāļĨ.
- āļāļĢāļīāļāļēāļĢāļāļĢāļķāļāļĐāļēāļāļąāļāļāļīāļāļ§āļīāļāļĒāļēāļāļāļāđāļĨāļāđ..
- āļāļēāļĢāđāļāļīāļāļāļēāļ.
- BTS: āļŠāļāļēāļāļĩāļŦāļĄāļāļāļīāļ, āļŦāđāļēāđāļĒāļāļĨāļēāļāļāļĢāđāļēāļ§.
- MRT: āļŠāļāļēāļāļĩāļāļŦāļĨāđāļĒāļāļīāļ.
- āļāļĢāļīāļāļēāļĢāđāļĢāļĩāļĒāļāļĢāļāļāđāļēāļ App MuvMi..
- āļāļīāļāļāļēāļĄāļāđāļēāļ§āļŠāļēāļĢāļāļēāļ SC ASSET āđāļāđāļāļĩāđ.
- http://insidesc.scasset.com/..
Skills:
Linux
Job type:
Full-time
Salary:
negotiable
- āļ§āļļāļāļīāļāļēāļĢāļĻāļķāļāļĐāļēāļāļĢāļīāļāļāļēāļāļĢāļĩ āļŠāļēāļāļēāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļāļĒāļēāļāļēāļĢāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļāļāđāļēāļ IT Support, Network Operation Center (NOC) āļŦāļĢāļ·āļ Security Operations Center (SOC) āļāļĒāđāļēāļāļāđāļāļĒ 2 āļāļĩ.
- āļĄāļĩāļāļ§āļēāļĄāđāļāļĩāđāļĒāļ§āļāļēāļāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļŠāļāļēāļāļ°āđāļāļĢāļ·āļāļāđāļēāļĒ (Traffic Load) āđāļĨāļ°āļāļēāļĢāļāļąāļāļāļēāļĢāļĢāļ°āļāļ Network āđāļāđāļ VLAN, VPN, Firewall.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļ Cyber Security āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāđāļāđāđāļāļĢāļ·āđāļāļāļĄāļ·āļ SIEM (āđāļāđāļ Splunk) āļŦāļĢāļ·āļāđāļāļĢāđāļāļĢāļĄ Monitor āļāļ·āđāļāđ āđāļāļ·āđāļāđāļāđāļēāļĢāļ°āļ§āļąāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļāļāļĢāļ°āļāļ.
- āļŠāļēāļĄāļēāļĢāļāđāļāđāđāļāļāļąāļāļŦāļē Software āđāļāļ·āđāļāļāļāđāļ (1st Tier Support) āđāļĨāļ°āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāļĩāļĄāđāļāļāļāļīāļāđāļāļāļēāļ°āļāļēāļāļŦāļĢāļ·āļ Vendor āļ āļēāļĒāļāļāļāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļĄāļĩāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļąāļāļāļēāļĢ Server (Windows/Linux Server), āļāļēāļĢāļāļīāļāļāļąāđāļ Patch Software āđāļĨāļ°āļāļēāļĢāļāļģāļĢāļļāļāļĢāļąāļāļĐāļēāļāļēāļĄāđāļāļāļāļĩāđāļāļģāļŦāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāđāļāļāļĢāļ°āļāļ§āļāļāļēāļĢāļŠāļģāļĢāļāļāļāđāļāļĄāļđāļĨ (Data Backup) āđāļĨāļ°āļĄāļĩāļāļąāļāļĐāļ°āđāļāļāļēāļĢāļāļāļŠāļāļāļāļēāļĢāļāļđāđāļāļ·āļāļāđāļāļĄāļđāļĨ (Recovery).
- āļĄāļĩāļāļ§āļēāļĄāļĨāļ°āđāļāļĩāļĒāļāļĢāļāļāļāļāļāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āļāļ§āļāļāļļāļĄāļāļēāļĢāđāļāđāļēāļāļķāļāļĢāļ°āļāļāļāļāļāļāļļāļāļāļĨāļ āļēāļĒāļāļāļ.
- āļāļđāđāļĨāđāļĨāļ°āđāļāđāđāļāļāļąāļāļŦāļēāļāļēāļĢāđāļāđāļāļēāļ Software āđāļāļ·āđāļāļāļāđāļ (1st Tier) āļāļāļāđāļĢāļāļāļĨāļąāđāļ PKN āđāļĨāļ° BSRC.
- āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāļĩāļĄ Support āđāļāļĢāļ°āļāļąāļāļāļąāļāđāļ (ATD) āđāļāļ·āđāļāđāļāđāđāļāļāļąāļāļŦāļēāļāļēāļāđāļāļāļāļīāļ.
- āļāļĢāļ§āļāļŠāļāļāļŠāļāļēāļāļ°āļāļēāļĢāļāļģāļāļēāļāļāļāļāļĢāļ°āļāļāđāļāļĢāļ·āļāļāđāļēāļĒāļāđāļāļĄāļđāļĨ (Traffic Load).
- āļāļĢāļ§āļāļŠāļāļāļāļĨāļāļēāļĢāļŠāļģāļĢāļāļāļāđāļāļĄāļđāļĨ āđāļĨāļ°āļāļāļŠāļāļāļāļēāļĢāļāļđāđāļāļ·āļāļāđāļāļĄāļđāļĨ.
- āļāļģāđāļāļīāļāļāļēāļĢāļāļģāļĢāļļāļāļĢāļąāļāļĐāļē Server āļāļēāļĄāđāļāļāļāļĩāļāļģāļŦāļāļ āđāļĨāļ°āđāļāđāļāđāļāļ·āļāļāļāļēāļĢ Update Patch āļāļāļ Software āļāđāļēāļāđ.
- āļāļĢāļ§āļāļŠāļāļāļāļēāļĢāđāļāđāļē-āļāļāļ āļāļāļ Licensor āļāļĩāđāđāļāđāļēāļĄāļēāļāļĢāļąāļāļāļĢāļļāļ Application āđāļ Server āļāļāļāđāļĢāļāļāļĨāļąāđāļ.
Skills:
Automation, Power BI, Tableau
Job type:
Full-time
Salary:
negotiable
- Review major claims for fraud indicators, conduct investigations, and gather evidence for resolution including engaging key stakeholders to manage red flag and termination dialogue.
- Use analytics tools to identify patterns, anomalies, and emerging fraud risks.
- Design and maintain dashboards, generate accurate and insightful reports on fraud, trends, case outcomes, and KPIs for leadership.
- Identify inefficiencies in fraud and claims processes; propose and implement solutions leveraging Lean Six Sigma and automation.
- Ensure all investigations adhere to regulatory and internal standards.
- Partner with cross-functional teams to implement fraud prevention measures and share insights.
- Recommend process enhancements and leverage technology for efficiency.
- Explore technology, AI and automation opportunities to enhance fraud detection and reporting capabilities.
- Monitor emerging fraud trends within the insurance industry and update internal controls accordingly.
- Degree in data science, engineering, business administration or equivalent combination of education and experience.
- Data Analyst Professional certificates preferred. Power BI, Tableau Desktop Specialist, Lean Six Sigma or equivalent certification.
- Minimum 5 years data analytics experiences..
Skills:
Network Infrastructure, SAP, Assurance
Job type:
Full-time
Salary:
negotiable
- Participate in the development of IT Audit Programs within assigned areas, covering IT security, applications, and IT processes (e.g., network infrastructure, operating systems, data centers, SAP, and retail systems). Assess whether security risks and vulnerabilities are properly identified and mitigated. Coordinate audit scope and effectiveness with business units and external IT/security specialists..
- Contribute to the design of detailed audit testing procedures in alignment with the approved Audit Program, including the definition of audit scope, sample sizes, audit ...
- Execute audit assignments as assigned by supervisors, performing detailed testing in accordance with established audit methodologies and procedures..
- Review and consolidate audit results, working papers, and supporting evidence prepared by team members in order to analyze audit findings and determine whether further audit procedures or expanded testing are required..
- Evaluate and analyze audit findings, including root causes and risks, and provide recommendations for improvement. Prepare and consolidate audit reports for submission to management for review and consideration..
- Bachelor s degree or higher in Management Information Systems, Information Technology, Computer Science, or other related fields..
- At least 5 years of experience in internal auditing, with a focus on IT audit, IT security controls, or IT-related assurance functions, or other relevant experience (e.g., information security, IT risk and control, IT governance, or IT quality assurance)..
- Strong leadership skills, with the ability to work effectively as part of a team and adapt to changing work environments..
- Strong analytical and systematic thinking skills..
- Proactive and innovative mindset, with the ability to initiate improvements..
- Effective communication and coordination skills..
- Proficiency in computer applications, including MS Office and SAP ERP..
- Professional certifications such as CISA, CISSP, CISM, or other relevant technical certifications will be considered an advantage..
- Working location: The Mall Ramkhamhaeng (Headquarter).
Experience:
3 years required
Skills:
Legal, Financial Analysis, Project Management, English
Job type:
Full-time
Salary:
negotiable
- Direct and manage contract guard force to run daily data center operations.
- Handle site security incidents, escalations or any other security related issues.
- Provide after-hours on-call management support and participate in emergent, large scale event response when needed.
- Participate in re-occurring data center security audits and reviews.
- Executes established compliance processes with AWS policies, standards, guidelines and relevant legal and regulatory requirements.
- Provides input on, and may develop security methodologies, policies and procedures.
- Write reports and communicate with management on the status of physical security operations.
- Oversee new security construction or retrofit projects.
- Manage the security P&L for assigned site(s), assist management with financial analysis and contribute to financial decisions for security requirements.
- Collaborate with other teams to protect AWS Data Center personnel, information and assets.
- A day in the life
- Mission: Deliver pioneering physical security by working vigorously to earn and keep customer trust; providing a safe and secure environment for our people, assets, and customer data.
- Vision: Develop exceptional security professionals, consistently apply security processes, and pioneer new technologies that effectively balance security requirements with operational needs.
- Diverse Experiences
- AWS values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn t followed a traditional path, or includes alternative experiences, don t let it stop you from applying.
- Why AWS?
- Amazon Web Services (AWS) is the world s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating that s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
- Inclusive Team Culture
- AWS values curiosity and connection. Our employee-led and company-sponsored affinity groups promote inclusion and empower our people to take pride in what makes us unique. Our inclusion events foster stronger, more collaborative teams. Our continual innovation is fueled by the bold ideas, fresh perspectives, and passionate voices our teams bring to everything we do.
- Mentorship & Career Growth
- We re continuously raising our performance bar as we strive to become Earth s Best Employer. That s why you ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
- Work/Life Balance
- We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there s nothing we can t achieve.
- BASIC QUALIFICATIONS.
- 3+ year s experience managing contract security and physical security operation programs such as Access Control/Intrusion Detection and CCTV Surveillance systems.
- 3+ years in Project Management experience and creating process improvement procedure.
- Experience in managing vendors/vendor teams.
- PREFERRED QUALIFICATIONS.
- Bachelor s degree and or equivalent professional experience in corporate or government security environment.
- 3+ years experience creating and implementing emergency planning programs, physical security countermeasures.
- Excellent oral and written communication skills.
- Proficiency in both Thai and English language.
- Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit https://amazon.jobs/content/en/how-we-hire/accommodations for more information. If the country/region you re applying in isn t listed, please contact your Recruiting Partner.
Skills:
Network Infrastructure, Analytical Thinking, Teamwork
Job type:
Full-time
Salary:
negotiable
- Install, configure, and maintain network infrastructure tools (proxies and reverse-proxies), to ensure a secure and reliable access to corporate resources while following the security policies.
- Implement configuration changes.
- Provide timely subject matter expertise for incidents and requests related to remote access tools.
- Maintain the procedures for these tools.
- Collaborate with internal technical teams, customers, and external strategic partners to deliver and improve high-quality secure networks supporting Accor s global Information System.
- Engage with the whole Cyber Security team to develop security policies, protocols, and procedures.
- Qualifications Bachelor's degree or higher in technology field.
- At least 5 years as a security engineer or architect (if run activities where part of the position), or network engineer - with hands on experience in security solutions.
- Security industry certifications and/or security vendors specific trainings are a plus.
- Mandatory experience with Zscaler, McAfee,.
- Mandatory experience with Imperva, F5.
- Strong knowledge of networking technologies, network security, and network monitoring solutions as well as Zero Trust approach.
- In-depth knowledge of security protocols and principles.
- Knowledge of cloud security principles, such as AWS or Azure.
- Knowledge of security systems, including EPP and EDR, content filtering, authentication systems, and reverse proxies.
- Analytical Thinking: Ability to analyze complex issues and quickly devise effective solutions fitting the business context. Attention to details.
- Communication: Excellent communication skills to convey technical information to both technical and non-technical stakeholders.
- Proactive Approach: A problem-solving mindset with a proactive approach to identify and address security challenges.
- Collaboration: Strong teamwork and collaboration skills to work effectively across departments.
- Continuous Learning: Eagerness to stay updated with the latest security trends and technologies.
- Additional Information This position is based in Bangkok reporting to management in France.
- Worldwide interaction with time zone difference to manage.
Skills:
Teamwork, Compliance, Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Work in Shift.
- We are looking for a highly proficient Cyber Security Consultant who has the professional knowledge and skill to drive and enhance our security solutions in any field at MFEC Cyber Security Operation Center (CSOC) for our large enterprise customers.
- What we want?.
- To find the most efficient way to create and to manage every cyber security solution for multiple clients.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Work in Shift.
- Who are we looking for?.
- 1-3 Years or experience in Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Strong knowledge and experience with various IT security such as Incident Handler, Forensic Examiner, Forensic Analyst is a plus.
- Excellent knowledge in Security Product (Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Proficiency in English both written and spoken.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak, Lao Peng Nguan Building
Skills:
Teamwork, Compliance, Problem Solving
Job type:
Full-time
Salary:
negotiable
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Grow up in Career path.
- We are looking for talented Cyber Security Engineer to find the most efficient way to create and to manage every cyber security solution for multiple clients.
- What we want?.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Who are we looking for?.
- Experience in IT infrastructure or Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Knowledge in Security Management is advantage. Excellent knowledge in Security Product (Antivirus/Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution is a plus.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak
Skills:
Compliance
Job type:
Full-time
Salary:
negotiable
- Validates, classifies, priorities and opens ticket.
- Acting as focal contact point for report security incidents.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of security incidents.
- Responds to security alerts generate within the SLA time window.
- Follow-up and tracking security incidents base on team process.
- Examine network topologies to understand data flows through the network.
- Validate security incidents alerts against network traffic using packet analysis tools.
- Isolate or remove malware.
- Identify applications and operating systems of a network device based on network traffic.
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
- Notify cybersecurity service provider team members of suspected cyber incidents, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Who are we looking for?.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Analytical and problem-solving skills are required.
- Knowledge of network traffic analysis methods.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Experience in IT Security, Network Security or Security Compliance.
- Knowledge of common security tools such as anti-virus, firewall and intrusion detection system.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Able to work in shift.
- Location: Head Office: Chatuchak, SJ Infinite One Business Complex
Experience:
2 years required
Skills:
Risk Management, Microsoft Office
Job type:
Full-time
Salary:
negotiable
- Serve as the main point of contact for gathering evidence, CCTV footage, and relevant information for assigned fraud cases.
- Coordinate with other relevant teams to prepare for interrogation sessions.
- Participate in the interrogation sessions of offenders,witnesses, and/or other relevant parties.
- Draft investigation reports.
- Act as a CCTV real-time monitor as requested or assigned by the supervisor.
- Participate in security-related projects and tasks as assigned.
- Requirements: Bachelor's degree in Laws, Political Science or related field. (Fresh Graduate is welcome.).
- Availability to work in the office 5 days a week and 1 day from home.
- Minimum of 0-2 years of experience in Fraud Investigation, Fraud Prevention, Loss Prevention, Government Affairs, Government Relations, or Risk Management-related positions.
- Experience in the logistics industry is a plus.
- Previous experience as a Police/Military Official or other government official is advantageous.
- Familiarity with reviewing CCTV footage.
- Skills in offender interrogation or interviewing.
- Strong analytical and problem-solving abilities.
- Excellent interpersonal skills.
- Proficient in GSuite or Microsoft Office.
- Must have a private vehicle and a valid driver's license.
- Availability to be on-call for emergency issues.
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up-to-date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
Experience:
5 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Security Risk Management: Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Establishment of Policies, Standards, and Procedures:Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Communication and Collaboration with Technology Team:Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Essential Skills & PrerequisitesA positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as the expert in project teams. PERSONAL SKILLS: Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
Experience:
3 years required
Skills:
System Security
Job type:
Full-time
Salary:
negotiable
- Participate in gathering and analyzing business and technical requirements to develop enterprise-wide Identity and Access Management (IAM) processes and procedures.
- Demonstrate a solid understanding of risk and change management, security policies and controls, user account lifecycle management, onboarding/offboarding, role-based access control (RBAC), access governance, and directory services.
- Translate business requirements into specific system, application, or process designs.
- Collaborate with cross-functional teams, including business units and technical stakeholders, to identify and define functional requirements, and contribute to or lead the design of IAM solutions.
- Engage in a broad range of IAM design activities from requirements analysis to implementation.
- Apply your knowledge of various IAM products and domains, with the ability to quickly adapt to new tools and technologies through self-learning or formal training.
- Provide support for identity provisioning, governance platforms, and privileged access management (PAM) tools.
- Lead and contribute to IAM-related projects to ensure successful delivery of objectives.
- Identify and communicate high-level functional gaps, risks, and potential issues, and propose effective solutions.
- Monitor service delivery against SLAs and escalate exceptions as needed.
- Perform IAM-related risk assessments and consult on project implementations to ensure alignment with RBAC frameworks and internal security policies.
- Drive improvements in RBAC processes, governance policies, and IAM lifecycle workflows.
- Lead or contribute to incident and problem management efforts, ensuring root cause analysis and future incident mitigation.
- Participate in on-call production support rotations and work with vendors to resolve technical issues.
- Influence the IAM strategy by making informed decisions on complex technical challenges.
- Support internal and external audit readiness by preparing and organizing required audit documentation.
- Design and implement key management controls to ensure encryption key security throughout the lifecycle.
- Conduct physical access control reviews and physical security assessments for restricted areas.
- Promote and extend secure access control practices across the organization and its affiliates.
- Essential Skills & PrerequisitesA positive, proactive mindset with strong empathy and team collaboration skills.
- Bachelor s or Master s degree in Computer Engineering, Information Security, MIS, or a related field.
- Minimum of 3 years of experience in cybersecurity or IAM domains.
- Solid foundation in information security principles and best practices.
- Knowledge of international security frameworks and standards, such as COBIT, NIST 800 series, ISO/IEC 27001, PCI-DSS, and OWASP.
- Familiarity with end-to-end security architecture including network, platform, and application layers.
- Experience with application/system security controls, IAM risk assessments, and access governance.
- Strong skills in technical writing, documentation, process mapping, and visual communication.
- Ability to develop and execute a clear vision for IAM and security solutions.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
Experience:
1 year required
Skills:
Express
Job type:
Full-time
Salary:
negotiable
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
- Minimum years experience required.
- 1-2 years of experiences in Cyber - Penetration tester.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- 1
- 2
