- No elements found. Consider changing the search query.
Experience:
2 years required
Job type:
Full-time
Salary:
negotiable
- Coordinate with the Operations team and handle staff who can be a threat to become destructive.
- Manage general CCTV surveillance.
- Keep track of lost property via CCTV.
- Identify current and future threats to SPX assists and implement countermeasures.
- Handle cases in direction of Security Operations with assistance of Police and other Law Enforcement Officers.
- Conduct SPX s security checks.
- Coordinate security methods and practices with other appropriate agencies then foster good working relationships.
- Manage other assigned tasks.
- Requirements: Bachelor's degree in related fields.
- 2 years of experience in a physical security or fresh grade is welcome.
- Experience and knowledge of investigation tactics, as well as apprehending subjects is advantage.
- Ability to effectively perform both face-to-face and telephone contact.
- Be able to work in shift.
- Strong interpersonal skills.
Experience:
5 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Security Risk Management: Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Establishment of Policies, Standards, and Procedures:Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Communication and Collaboration with Technology Team:Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Essential Skills & PrerequisitesA positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as the expert in project teams. PERSONAL SKILLS: Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
Job type:
Full-time
Salary:
negotiable
- Define, review, and integrate application security requirements across applications and platforms..
- Review and provide input into application security technical architecture, ensuring security considerations are embedded into final design decisions..
- Act as a security architecture lead, owning security decisions across multiple teams and workstreams..
- Collaborate with cross functional teams (architecture, development, infrastructure, and delivery) to ensure security is integrated throughout the SDLC..
- Conduct application security risk assessments, identify vulnerabilities, and recommend appropriate mitigation strategies..
- Provide solutions to cross team security challenges, addressing both technical and business risks..
- Develop and maintain application security standards, policies, and procedures..
- Stay up to date with emerging security threats, technologies, and best practices to continuously improve application security posture..
- Provide guidance, mentoring, and training to team members on application security principles and best practices..
- Act as a trusted advisor to stakeholders, providing security recommendations and influencing key architectural decisions..
- Required Skills & ExperienceStrong experience in Application Security Architecture or Application Security Lead roles..
- Expert proficiency in Application Security, including secure design, threat modeling, and vulnerability management..
- Experience performing application security assessments and translating findings into actionable remediation plans..
- Strong understanding of enterprise application architectures and system integration..
- Proven ability to work across multiple teams and influence architectural and security decisions.
- Strong analytical, problem solving, and communication skills.
- Nice to HaveExperience in enterprise or financial services environments..
- Exposure to digital transformation or large scale platform initiatives..
- Knowledge of secure integration patterns, APIs, and modern application platforms.
- Background in consulting or project based delivery environments..
Skills:
ISO 27001
Job type:
Full-time
Salary:
negotiable
- āļ§āļēāļāđāļāļāđāļĨāļ°āļāļąāļāļāļēāļāđāļĒāļāļēāļĒ āļĄāļēāļāļĢāļāļēāļ āđāļĨāļ°āđāļāļ§āļāļēāļāļāđāļēāļ Cyber Security āđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļąāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļĄāļēāļāļĢāļāļēāļāļŠāļēāļāļĨ.
- āļāļĢāļīāļŦāļēāļĢāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļēāļāđāļāđāļāļāļĢāđ (Cyber Risk Assessment) āļĢāļ§āļĄāļāļķāļāļāļđāđāļĨāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļĄāļĄāļēāļāļĢāļāļēāļ āđāļāđāļ ISO 27001, PDPA, NIST.
- āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāđāļŦāļāļļāļāļēāļĢāļāđāļāđāļēāļ Cyber Security (Incident Response) āđāļāđāļ āļāļēāļĢāđāļāļĄāļāļĩāļāļēāļāđāļŪāļāđāļāļāļĢāđ, Ransomware, Data Breach.
- āļāļĢāļ§āļāļāļąāļ āļāđāļāļāļāļąāļ āđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāļ āļąāļĒāļāļļāļāļāļēāļĄāļāļēāļāđāļāđāļāļāļĢāđ āļāđāļēāļāļĢāļ°āļāļ āđāļāđāļ Firewall, IDS/IPS, SIEM, Endpoint Security.
- āļ§āļīāđāļāļĢāļēāļ°āļŦāđāļ āļąāļĒāļāļļāļāļāļēāļĄāđāļāļīāļāļĢāļļāļ āļāļīāļāļāļēāļĄāđāļāļāđāļāđāļĨāļĒāļĩāđāļŦāļĄāđ āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāļāļ Third-Party Vendors.
- āļāļđāđāļĨāđāļĨāļ°āļŠāļāļąāļāļŠāļāļļāļāļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāļāđāļēāļ Cyber Security āļĢāļ§āļĄāļāļķāļāļāļēāļĢāļāļąāļāļāļģāđāļāļāļŠāļēāļĢ āļĢāļēāļĒāļāļēāļ āđāļĨāļ°āļāļ°āđāļāļĩāļĒāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļ.
- āļ§āļēāļāđāļāļāđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāđāļāļĢāļāļāļēāļĢāļāļīāļāļāļąāđāļāļĢāļ°āļāļ Cyber Security āļĢāļ§āļĄāļāļķāļāđāļāļāļāļēāļĢāļĨāļāļāļļāļāđāļāļ·āđāļāļĢāļāļāļĢāļąāļāļ āļąāļĒāļāļļāļāļāļēāļĄ.
- āļāļąāļāļāļēāļāļąāļāļĐāļ°āļāļĩāļĄāļāļēāļ āļĄāļāļāļŦāļĄāļēāļĒ āļāļīāļāļāļēāļĄ āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāļēāļĢāļāļģāļāļēāļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāļāļĨāļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāđāļĨāļ°āļāļ§āļēāļĄāļāļ·āļāļŦāļāđāļēāđāļāļĢāļāļāļēāļĢāļāđāļēāļ Cyber Security.
- āļāļĢāļīāļāļāļēāļāļĢāļĩāļāđāļēāļāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļŦāļĢāļ·āļāļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđ āļŠāļēāļāļēāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāđāļāļĩāļĒāļāđāļāđāļē.
- āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļāļāļĒāđāļēāļāļāđāļāļĒ 10 āļāļĩ āđāļĨāļ°āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāđāļēāļ Cyber Security āļāļĒāđāļēāļāļāđāļāļĒ 6 āļāļĩ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĢāļīāļŦāļēāļĢāđāļĨāļ°āļāļđāđāļĨāļāļĩāļĄāļāļēāļ.
- āļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļ Cyber Security āđāļāđāļ Network Security, Endpoint Security, Cloud & Application Security, Incident Response.
- āļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļĄāļēāļāļĢāļāļēāļāļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ āđāļāđāļ PDPA, GDPR, ISO/IEC 27001, NIST.
- āļāļąāļāļĐāļ°āļāđāļēāļ Risk Management, Policy Development, Communication āđāļĨāļ° Training.
- Contact Information:-.
- K. Sawarin.
- Office of Human Capital.
- DIGITAL AND TECHNOLOGY SERVICES CO., LTD.
- F.Y.I Center 2525 Rama IV Rd, Khlong Tan, Khlong Toei, Bangkok 10110.
- MRT QSNCC Station Exit 1.
Job type:
Full-time
Salary:
negotiable
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāļąāļāļāļāļąāļāļāļēāļāļāļļāļāļāļāļāļĒāđāļēāļāđāļāđāļēāđāļāļĩāļĒāļĄ āļāļĨāļđāļāļāļąāļāđāļŦāđāļāļļāļāļāļāļĒāļķāļāļĄāļąāđāļāđāļāļāļēāļĢāļāļĢāļ°āļāļāļāļŠāļąāļĄāļĄāļēāļāļĩāļ āļāļĒāđāļēāļāļĄāļĩāļāļĢāļĢāļĐāļąāļāļ āļīāļāļēāļĨāļāļĩāđāļāļĩ.
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāđāļāļāļēāļĢāļāļąāļāļāļēāļĻāļąāļāļĒāļ āļēāļāļāļāļąāļāļāļēāļāđāļāļāļļāļāđ āļāđāļēāļ āļāđāļ§āļĒāđāļāļĢāđāļāļĢāļĄāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāļļāļāļ āļēāļāđāļŦāđāđāļŦāļĄāļēāļ°āļŠāļĄāļāļąāļāđāļāđāļĨāļ°āļāļ āđāļāļ·āđāļāļĒāļāļĢāļ°āļāļąāļāļāļēāļĢāļāļģāļāļēāļāļāļāļāļāļāļąāļāļāļēāļāļāļĒāđāļēāļāļĄāļ·āļāļāļēāļāļĩāļ.
- āļŠāļģāļāļąāļāļāļēāļāđāļŦāļāđāļāļāļāļāļēāļāļāļēāļ āļāļđāļāļāļāļāđāļāļāđāļŦāđāđāļāđāļ Smart Office and Smart Display Solution āļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļŦāļĢāļđāļŦāļĢāļē āļāļąāļāļŠāļĄāļąāļĒ āđāļĨāļ°āļāļĢāļ°āļŦāļĒāļąāļāļāļĨāļąāļāļāļēāļ.
- āļāļ§āļēāļĄāļāļāļāļļāđāļāđāļāļāļāļĩāđāļāđāļāļ āļāļ·āļāļŦāļąāļ§āđāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļāļąāļāļāļēāļāđāļŦāļĄāđāļāļĩāđāļāđāļēāļ§āđāļāđāļēāļĄāļēāđāļāļāļĢāļāļāļāļĢāļąāļ§āļāļāļāđāļĢāļē.
- āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļāļāļēāļĢāļāļģāļāļēāļāļĒāļąāļāđāļāđāļāļāļĩāļāļŦāļāļķāđāļāļŠāļīāđāļāļāļĩāđāļŠāļģāļāļąāļāļŠāļđāļāļŠāļļāļāļāļāļāļāļļāļĢāļāļīāļāļāļīāđāļāļĢāđāļĨāļĩāļĒāļĄ āļāļąāļāļāļąāđāļāļāļāļąāļāļāļēāļāļāļēāļāļāļēāļāļāļļāļāļāļāļāļķāļāļāđāļāļāļāđāļēāļāļāļēāļĢāļāļāļĢāļĄāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļĨāļ°āļāļēāļāļĩāļ§āļāļāļēāļĄāļąāļĒāļāļĒāđāļēāļāđāļāđāļĄāļāđāļ.
- āļāļāļąāļāļāļēāļāļŠāļāļēāļĒāđāļāđāļāđāļāļąāļāđāļāļĢāđāļāļĢāļĄāļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ OPD/IPD āđāļĨāļ°āđāļĢāļēāļĒāļąāļāđāļŦāđāđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāđāļēāļĢāļąāļāļĐāļēāļāļĒāļēāļāļēāļĨāļŠāļģāļŦāļĢāļąāļāļāļļāļāļāļēāļĢāļĩ.
- Work life balance āļāļ·āļāļŠāļīāđāļāļŠāļģāļāļąāļ āđāļ§āļĨāļēāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāļĒāļ·āļāļŦāļĒāļļāđāļāļāļģāđāļŦāđāļāļļāļāļāļąāļāļŠāļĢāļĢāđāļ§āļĨāļēāđāļāđāļāļĒāđāļēāļāļĨāļāļāļąāļ§.
Skills:
Industry trends, Cloud Computing, English
Job type:
Full-time
Salary:
negotiable
- Provide consultancy advice to business and project teams to ensure security standards and requirements are considered and implemented.
- Perform deep dive reviews focused on Cybersecurity Risk, Technology Risk, and Emerging Risk.
- Effective management of all technology risk and cybersecurity framework including technology policies and standards based on the Group's risk appetite.
- Closely monitor technology and cyber related KPIs, KRIs, KCIs and drive remediation actions as Group perspective.
- Timely update on all material technology risk and cybersecurity topics including a set of risk indicators to the relevant Group Risk Committees and forums.
- Oversight the result of control testing from subsidiaries to ensure Cybersecurity and technology controls meet internal and external compliance requirements.
- Conduct technology risk assessments: Identify and evaluate potential risks Management with the organization's technology systems, infrastructure, and processes. Assess the adequacy of controls, identify vulnerabilities, and recommend risk mitigation strategies.
- Develop and implement risk management strategies: Collaborate with stakeholders to develop comprehensive risk management strategies that align with business objectives and regulatory requirements. Implement controls and procedures to mitigate identified risks effectively.
- Monitor technology risk exposure: Continuously monitor technology systems, networks, and processes to identify emerging risks, vulnerabilities, and trends. Stay up-to-date with industry developments, emerging technologies, and regulatory changes to proactively address potential risks.
- Perform risk analysis and reporting: Analyze risk assessment findings, internal control evaluations, and audit reports to identify trends, root causes, and areas of improvement. Prepare detailed reports on risk exposure, mitigation strategies, and recommendations for management and relevant stakeholders.
- Collaborate with cross-functional teams: Work closely with IT teams, compliance officers, cybersecurity professionals, and other stakeholders to develop and implement risk management frameworks, policies, and procedures. Provide guidance and recommendations on technology-related risk management activities.
- Conduct technology risk training and awareness programs: Develop and deliver training programs to educate employees on technology risk management best practices, policies, and procedures. Raise awareness about emerging threats and provide guidance on incident response protocols.
- Assist in incident response and recovery: Support the organization in managing technology-related incidents, including data breaches, system failures, and cybersecurity threats. Coordinate response efforts, assist in recovery measures, and contribute to post-incident reviews and lessons learned.
- Stay updated on industry standards and regulations: Keep abreast of industry trends, emerging technologies, and regulatory requirements related to technology risk management. Provide recommendations on incorporating best practices into the organization's risk management framework.
- Minimum of 5 years experience in Technology and Cyber Risk.
- Bachelor s degree or above in related discipline.
- Working experience or familiar in a group public company.
- Understanding of regulatory requirements such as BOT, OIC, and SEC; industry standards such as COBIT, NIST, ISO27001, ITIL, and PCIDSS.
- Experience in one or more emerging technologies such as Artificial Intelligence, Machine Learning, Distributed Ledger Technology, Robotic Process Automation, Cloud computing.
- Excellent communication and relationship building skills; proven ability to influence senior management.
- Good command of written and spoken in English is preferable.
Skills:
ISO 27001, DevOps, Swift
Job type:
Full-time
Salary:
negotiable
- Manage end-to-end cryptographic key lifecycle (generation, distribution, rotation, backup, archival, destruction).
- Administer and operate Hardware Security Modules (HSMs), preferably Thales Luna HSM.
- Define and enforce key management policies and procedures aligned with banking regulations and industry standards (e.g., PCI DSS, ISO 27001).
- Support encryption key integration across banking applications, core systems, payment systems, and digital channels.
- Conduct key ceremonies and maintain audit logs.
- Vault & Secrets Management.
- Administer enterprise vault platforms (e.g., HashiCorp Vault or similar).
- Manage secrets lifecycle (API keys, certificates, tokens, database credentials).
- Configure access control policies, role-based access, and segregation of duties.
- Integrate vault solutions with applications, DevOps pipelines, and cloud/on-prem infrastructure.
- Monitor vault security posture and perform regular health checks.
- Security & Compliance.
- Ensure compliance with regulatory requirements (BOT, PCI DSS, SWIFT CSP, etc.).
- Perform risk assessments related to cryptographic controls.
- Support audit activities and provide evidence for internal/external auditors.
- Participate in incident response related to key compromise or vault breaches.
- Architecture & Improvement.
- Contribute to cryptographic architecture design and secure key management framework.
- Support post-quantum cryptography transition planning (if applicable).
- Recommend best practices and continuous improvements for key and secrets management.
- Apply now if you have these advantages.
- Bachelor s degree or higher in computer science/ data science or any related field.
- Minimum of 3-7 years of experience in Information Security or Cryptography (Banking Financial industries are advantage).
- 3-7+ years of experience in Information Security or Cryptography.
- Hands-on experience with HSM (Thales Luna preferred).
- Experience in Vault or Secrets Management platforms (e.g., HashiCorp Vault).
- Experience in banking or financial services environment is highly preferred..
- Strong understanding of cryptographic principles (PKI, symmetric/asymmetric encryption, TLS, key wrapping, key derivation).
- Experience with key lifecycle management processes.
- Knowledge of PKI, certificate management, and CA integration.
- Familiarity with PCI DSS encryption requirements.
- Scripting skills (e.g., Bash, Python, PowerShell) are a plus.
- Why join Krungsri?.
- As a part of MUFG (Mitsubishi UFJ Financial Group), we a truly a global bank with networks all over the world.
- We offer a striking work-life balance culture with hybrid work policies (3 days in office per week).
- Unbelievable benefits such as attractive bonuses, employee loan with special rates and many more..
- Apply now before this role is close. **.
- FB: Krungsri Career(http://bit.ly/FacebookKrungsriCareer [link removed]).
- LINE: Krungsri Career (http://bit.ly/LineKrungsriCareer [link removed]).
- Talent Acquisition Department
- Bank of Ayudhya Public Company Limited
- 1222 Rama III Rd., Bangpongpang, Yannawa, Bangkok 10120.
- āļŦāļĄāļēāļĒāđāļŦāļāļļ āļāļāļēāļāļēāļĢāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāđāļĨāļ°āļāļ°āļĄāļĩāļāļąāđāļāļāļāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāļđāđāļŠāļĄāļąāļāļĢ āļāđāļāļāļāļĩāđāļāļđāđāļŠāļĄāļąāļāļĢāļāļ°āđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāđāļāđāļēāļĢāđāļ§āļĄāļāļēāļāļāļąāļāļāļāļēāļāļēāļĢāļāļĢāļļāļāļĻāļĢāļĩāļŊ.
- Remark: The bank needs to and will have a process for verifying personal information related to the criminal history of applicants before they are considered for employment with the bank..
- Applicants can read the Personal Data Protection Announcement of the Bank's Human Resources Function by typing the link from the image that stated below.
- EN (https://krungsri.com/b/privacynoticeen).
- āļāļđāđāļŠāļĄāļąāļāļĢāļŠāļēāļĄāļēāļĢāļāļāđāļēāļāļāļĢāļ°āļāļēāļĻāļāļēāļĢāļāļļāđāļĄāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļŠāđāļ§āļāļāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨāļāļāļāļāļāļēāļāļēāļĢāđāļāđāđāļāļĒāļāļēāļĢāļāļīāļĄāļāđāļĨāļīāļāļāđāļāļēāļāļĢāļđāļāļ āļēāļāļāļĩāđāļāļĢāļēāļāļāļāđāļēāļāļĨāđāļēāļ.
- āļ āļēāļĐāļēāđāļāļĒ (https://krungsri.com/b/privacynoticeth).
Experience:
5 years required
Skills:
Contracts, Procurement, AutoCAD, English
Job type:
Full-time
Salary:
negotiable
- Serve as the key business partner working directly with service business partners and internal stakeholders (primarily infrastructure, physical security and operations teams).
- Collaborate with engineers, technicians, project managers, and Sr. Leaders to develop your programs.
- Drive process change and improvement across multiple business and program teams.
- Report ad hoc, weekly, and monthly program and operating metrics.
- Run meetings, create and maintain timelines, and keep large, diverse groups informed of progress and obstacles.
- Manage security system integration vendor contracts to deliver projects.
- Communicate the status of programs with customers, stakeholders and conduct program reviews.
- Must be willing to travel 15% of the time as required when launching new locations (Domestically and Internationally).
- A day in the life
- The SPM team in ASEAN is a high performing unit that supports ASEAN Data Center builds now and into the future. The team work at pace and Take Ownership, able to Deliver Results on a daily basis. We are mindful of each others differences and work tirelessly to support each other daily.
- Diverse Experiences
- Amazon values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn t followed a traditional path, or includes alternative experiences, don t let it stop you from applying.
- Why AWS
- Amazon Web Services (AWS) is the world s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating that s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
- Work/Life Balance
- We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there s nothing we can t achieve in the cloud.
- Inclusive Team Culture
- Here at AWS, it s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon conferences, inspire us to never stop embracing our uniqueness.
- Mentorship and Career Growth
- We re continuously raising our performance bar as we strive to become Earth s Best Employer. That s why you ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
- BASIC QUALIFICATIONS.
- 5 years working in Project Management related to construction or physical security.
- Demonstrated ability to manage multiple complex projects and adapt to and control change on a project.
- Fluency/competency in more than one language in Thai and English to communicate with local and overseas stakeholders.
- Experienced in vendor management and procurement processes, to include the establishment of key performance indicators and service level agreements.
- PREFERRED QUALIFICATIONS.
- BA/BS degree or higher in related field of architecture, engineering, or project management. PSP, CPP, PMP Certification will be an added advantage.
- Subject Matter Expertise with Access Control, Intrusion Detection, and Video Surveillance Systems.
- Demonstrated ability to use AutoCad/Desk, BIM, Bluebeam.
- Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit https://amazon.jobs/content/en/how-we-hire/accommodations for more information. If the country/region you re applying in isn t listed, please contact your Recruiting Partner.
Skills:
Internal Audit
Job type:
Full-time
Salary:
negotiable
- āļāļĢāļ§āļāļāļēāļĄ internal control āļāļđāđāļĨāļāļļāļāļŦāļāđāļ§āļĒāļāļēāļāđāļāļĩāđāļĒāļ§āļāļąāļāļĢāļ°āļāļ Application āļ āļēāļāļĢāļ§āļĄāļĄāļĩāļāļąāđāļ Cyber security + Application control (asset control).
- āļĢāđāļ§āļĄāļāļąāļāļāļģāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ (Audit Program) āļŦāļāđāļ§āļĒāļĢāļąāļāļāļĢāļ§āļāļāļĩāđāļĢāļąāļāļāļīāļāļāļāļāđāļĨāļ°āļāļģāļŦāļāļāļ§āļīāļāļĩāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļāļ·āđāļāđāļŦāđāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāļĢāļĨāļļāļāļēāļĄāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđ.
- āļāļāļīāļāļąāļāļīāļāļēāļāļāļĢāļ§āļāļŠāļāļāļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒāđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļēāļĄāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļŠāļāļāļāļĩāđāđāļāđāļĢāļąāļāļāļēāļĢāđāļŦāđāļāļāļāļ āđāļĨāļ°āļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļ āļēāļĒāđāļ.
- āļĢāļ§āļāļĢāļ§āļĄ āļ§āļīāđāļāļĢāļēāļ°āļŦāđ āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāđāļāļĄāļđāļĨāļāļĩāđāđāļāđāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ āļāļķāļāļāļ§āļēāļĄāđāļāļĩāļĒāļāļāļāđāļĨāļ°āļāļ§āļēāļĄāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļāļāļāļāļĢāļ°āļāļāļāļ§āļāļāļļāļĄāļ āļēāļĒāđāļ.
- āļāđāļ§āļĒāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļĢāļ°āļāļ IT āđāļāļ·āđāļāļāđāļāļŦāļēāļāļąāļāļŦāļēāđāļĨāļ°āļāđāļāļāļāļāļĢāđāļāļ āļāļĢāđāļāļĄāļāļģāđāļŠāļāļāđāļāļ§āļāļēāļāđāļāļāļēāļĢāļāļĢāļąāļāļāļĢāļļāļāđāļĨāļ°āļāļąāļāļāļēāļĢāļ°āļāļ IT.
- āļ§āļēāļāđāļāļāļāļēāļĢāļāđāļēāđāļāļīāļāļāļēāļĢāļāļēāļĄāļāļĢāļ°āļāļ§āļāļāļēāļĢāđāļĨāļ°āļāļąāđāļāļāļāļāđāļāļāļēāļĢāļĢāļ°āļāļļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāđāļāļĢāļ°āļāļāļŠāļēāļĢāļŠāļāđāļāļĻāļāļāļāļāļāļāđāļāļĢ.
- āļāļĢāļīāļāļāļēāļāļĢāļĩ āđāļāļŠāļēāļāļē āđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ, āļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđ.
- Computer Engineer, Computer Science, Information Technology.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļāđāļāļāļāļīāļāđāļāļĩāđāļĒāļ§āļāļąāļāļŠāļ āļēāļāđāļ§āļāļĨāđāļāļĄāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļŦāļĢāļ·āļ IT Security.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļāļĢāļ°āđāļĄāļīāļ/āļāļĢāļ§āļāļŠāļāļ āļĢāļ°āļāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻāļŦāļĢāļ·āļāļĢāļ°āļāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ 2-3 āļāļĩ.
- āļāđāļēāļāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāđāļēāļ IT Governance āļŦāļĢāļ·āļ IT Best Practice āļŦāļĢāļ·āļāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļŠāļēāļĢāļŠāļāđāļāļĻ (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ).
- āđāļāđāļĢāļąāļāđāļāļĢāļąāļāļĢāļāļāļāļļāļāļ§āļļāļāļīāļāđāļēāļ IT Audit āļŦāļĢāļ·āļāļāđāļēāļ Security (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ)..
- āļ§āļąāļ-āđāļ§āļĨāļē āļāļģāļāļēāļ: 8.30 - 17.00 āļ-āļĻ.
- āļŠāļāļēāļāļāļĩāđāļāļģāļāļēāļ: āļāļēāļāļēāļĢāđāļŠāļāđāļŠāļĄ āļāļāļļāļāļąāļāļĢ.
Skills:
Network Infrastructure, SAP, Assurance
Job type:
Full-time
Salary:
negotiable
- Participate in the development of IT Audit Programs within assigned areas, covering IT security, applications, and IT processes (e.g., network infrastructure, operating systems, data centers, SAP, and retail systems). Assess whether security risks and vulnerabilities are properly identified and mitigated. Coordinate audit scope and effectiveness with business units and external IT/security specialists..
- Contribute to the design of detailed audit testing procedures in alignment with the approved Audit Program, including the definition of audit scope, sample sizes, audit ...
- Execute audit assignments as assigned by supervisors, performing detailed testing in accordance with established audit methodologies and procedures..
- Review and consolidate audit results, working papers, and supporting evidence prepared by team members in order to analyze audit findings and determine whether further audit procedures or expanded testing are required..
- Evaluate and analyze audit findings, including root causes and risks, and provide recommendations for improvement. Prepare and consolidate audit reports for submission to management for review and consideration..
- Bachelor s degree or higher in Management Information Systems, Information Technology, Computer Science, or other related fields..
- At least 5 years of experience in internal auditing, with a focus on IT audit, IT security controls, or IT-related assurance functions, or other relevant experience (e.g., information security, IT risk and control, IT governance, or IT quality assurance)..
- Strong leadership skills, with the ability to work effectively as part of a team and adapt to changing work environments..
- Strong analytical and systematic thinking skills..
- Proactive and innovative mindset, with the ability to initiate improvements..
- Effective communication and coordination skills..
- Proficiency in computer applications, including MS Office and SAP ERP..
- Professional certifications such as CISA, CISSP, CISM, or other relevant technical certifications will be considered an advantage..
- Working location: The Mall Ramkhamhaeng (Headquarter).
Skills:
ISO 27001, Python, PowerShell
Job type:
Full-time
Salary:
āļŋ60,000 - āļŋ80,000, negotiable
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5 years of experience in IT security and governance.
- Strong understanding of IT security principles, practices, and technologies.
- Knowledge of relevant security standards and regulations (e.g., ISO 27001, NIST, GDPR, HIPAA, PCI DSS).
- Experience with risk assessment and vulnerability management.
- Experience with security incident response and management.
- Strong analytical and problem-solving skills.
- Excellent communication and interpersonal skills.
- Ability to work independently and as part of a team..
- Relevant certifications (e.g., CISSP, CISM, CISA, Security+).
- Experience with cloud security (AWS, Azure, GCP) and On-Premises.
- Experience with security information and event management (SIEM) systems.
- Experience with scripting languages (e.g., Python, PowerShell).
- Experience with penetration testing.
- Ability to maintain confidentiality and handle sensitive information.
- Ability to adapt to changing technologies and security threats.
- Strong attention to detail and organizational skills.
- Ability to create and maintain clear and concise documentation..
- āđāļāļāļąāļŠāļāļĢāļ°āļāļģāļāļĩ.
- āļĨāļēāļāļąāļāļĢāđāļāļ āđāļĄāļ·āđāļāļāđāļāļāļāļĨāļāļāļāļēāļ.
- āļĨāļē Workcation.
- āļāļāļāļāļļāļāļŠāļģāļĢāļāļāđāļĨāļĩāđāļĒāļāļāļĩāļ.
- āļāļĢāļ°āļāļąāļāļŠāļąāļāļāļĄ / āļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ / āļāļĢāļ°āļāļąāļāļāļĩāļ§āļīāļ / āļāļĢāļ°āļāļąāļāļāļļāļāļąāļāļīāđāļŦāļāļļ.
- āļ§āļąāļāļŦāļĒāļļāļāļāļēāļĄāļāļāļŦāļĄāļēāļĒ (āđāļĄāđāļāđāļāļĒāļāļ§āđāļē 13āļ§āļąāļ).
- āļĨāļēāļŦāļĒāļļāļāđāļāđāļāļ·āļāļāđāļāļīāļ.
- āļāļĢāļ§āļāļŠāļļāļāļ āļēāļāļāļĢāļ°āļāļģāļāļĩ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļŠāļĄāļĢāļŠ.
- āļŠāļīāļāļāļīāļāļļāļāļāđāļāļĨāļēāđāļĨāļĩāđāļĒāļāļāļļāļāļĢ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāļēāļāļāļāļīāļ.
- Co working Space.
- āļāļīāļāđāļāļ.
- Point āđāļĨāļāļāļāļāļĢāļēāļāļ§āļąāļĨ.
- āļāļĢāļīāļāļēāļĢāļāļĢāļķāļāļĐāļēāļāļąāļāļāļīāļāļ§āļīāļāļĒāļēāļāļāļāđāļĨāļāđ..
- āļāļēāļĢāđāļāļīāļāļāļēāļ.
- BTS: āļŠāļāļēāļāļĩāļŦāļĄāļāļāļīāļ, āļŦāđāļēāđāļĒāļāļĨāļēāļāļāļĢāđāļēāļ§.
- MRT: āļŠāļāļēāļāļĩāļāļŦāļĨāđāļĒāļāļīāļ.
- āļāļĢāļīāļāļēāļĢāđāļĢāļĩāļĒāļāļĢāļāļāđāļēāļ App MuvMi..
- āļāļīāļāļāļēāļĄāļāđāļēāļ§āļŠāļēāļĢāļāļēāļ SC ASSET āđāļāđāļāļĩāđ.
- http://insidesc.scasset.com/..
Job type:
Full-time
Salary:
negotiable
- Lead and oversee Security Operations Center (SOC) activities.
- Manage and coordinate incident response processes across the organization.
- Develop and maintain incident response playbooks and procedures.
- Perform threat intelligence analysis and monitor evolving cyber threat landscapes.
- Conduct security risk analysis and recommend mitigation strategies.
- Collaborate with IT, Risk, Compliance, and Business Units to enhance cybersecurity posture.
- Provide strategic cybersecurity guidance and recommendations to management.
- Mentor and coach SOC and Incident Response team members.
- Support internal and external security audits and compliance activities..
- Bachelor s degree or higher in Cybersecurity, Information Technology, or related field.
- Minimum 7 years of experience in cybersecurity roles.
- Proven experience managing SOC or Incident Response teams.
- Strong knowledge of threat detection, incident handling, and digital forensics.
- Strong understanding of security frameworks and standards such as ISO 27001, NIST, and MITRE ATT&CK.
- Strong analytical, investigative, and problem-solving skills.
- Leadership and team management capabilities.
Skills:
Teamwork, Compliance, Problem Solving
Job type:
Full-time
Salary:
negotiable
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Grow up in Career path.
- We are looking for talented Cyber Security Engineer to find the most efficient way to create and to manage every cyber security solution for multiple clients.
- What we want?.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Who are we looking for?.
- Experience in IT infrastructure or Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Knowledge in Security Management is advantage. Excellent knowledge in Security Product (Antivirus/Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution is a plus.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak
Skills:
Linux
Job type:
Full-time
Salary:
negotiable
- āļ§āļļāļāļīāļāļēāļĢāļĻāļķāļāļĐāļēāļāļĢāļīāļāļāļēāļāļĢāļĩ āļŠāļēāļāļēāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļāļĒāļēāļāļēāļĢāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļāļāđāļēāļ IT Support, Network Operation Center (NOC) āļŦāļĢāļ·āļ Security Operations Center (SOC) āļāļĒāđāļēāļāļāđāļāļĒ 2 āļāļĩ.
- āļĄāļĩāļāļ§āļēāļĄāđāļāļĩāđāļĒāļ§āļāļēāļāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļŠāļāļēāļāļ°āđāļāļĢāļ·āļāļāđāļēāļĒ (Traffic Load) āđāļĨāļ°āļāļēāļĢāļāļąāļāļāļēāļĢāļĢāļ°āļāļ Network āđāļāđāļ VLAN, VPN, Firewall.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļ Cyber Security āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāđāļāđāđāļāļĢāļ·āđāļāļāļĄāļ·āļ SIEM (āđāļāđāļ Splunk) āļŦāļĢāļ·āļāđāļāļĢāđāļāļĢāļĄ Monitor āļāļ·āđāļāđ āđāļāļ·āđāļāđāļāđāļēāļĢāļ°āļ§āļąāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļāļāļĢāļ°āļāļ.
- āļŠāļēāļĄāļēāļĢāļāđāļāđāđāļāļāļąāļāļŦāļē Software āđāļāļ·āđāļāļāļāđāļ (1st Tier Support) āđāļĨāļ°āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāļĩāļĄāđāļāļāļāļīāļāđāļāļāļēāļ°āļāļēāļāļŦāļĢāļ·āļ Vendor āļ āļēāļĒāļāļāļāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļĄāļĩāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļąāļāļāļēāļĢ Server (Windows/Linux Server), āļāļēāļĢāļāļīāļāļāļąāđāļ Patch Software āđāļĨāļ°āļāļēāļĢāļāļģāļĢāļļāļāļĢāļąāļāļĐāļēāļāļēāļĄāđāļāļāļāļĩāđāļāļģāļŦāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāđāļāļāļĢāļ°āļāļ§āļāļāļēāļĢāļŠāļģāļĢāļāļāļāđāļāļĄāļđāļĨ (Data Backup) āđāļĨāļ°āļĄāļĩāļāļąāļāļĐāļ°āđāļāļāļēāļĢāļāļāļŠāļāļāļāļēāļĢāļāļđāđāļāļ·āļāļāđāļāļĄāļđāļĨ (Recovery).
- āļĄāļĩāļāļ§āļēāļĄāļĨāļ°āđāļāļĩāļĒāļāļĢāļāļāļāļāļāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āļāļ§āļāļāļļāļĄāļāļēāļĢāđāļāđāļēāļāļķāļāļĢāļ°āļāļāļāļāļāļāļļāļāļāļĨāļ āļēāļĒāļāļāļ.
- āļāļđāđāļĨāđāļĨāļ°āđāļāđāđāļāļāļąāļāļŦāļēāļāļēāļĢāđāļāđāļāļēāļ Software āđāļāļ·āđāļāļāļāđāļ (1st Tier) āļāļāļāđāļĢāļāļāļĨāļąāđāļ PKN āđāļĨāļ° BSRC.
- āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāļĩāļĄ Support āđāļāļĢāļ°āļāļąāļāļāļąāļāđāļ (ATD) āđāļāļ·āđāļāđāļāđāđāļāļāļąāļāļŦāļēāļāļēāļāđāļāļāļāļīāļ.
- āļāļĢāļ§āļāļŠāļāļāļŠāļāļēāļāļ°āļāļēāļĢāļāļģāļāļēāļāļāļāļāļĢāļ°āļāļāđāļāļĢāļ·āļāļāđāļēāļĒāļāđāļāļĄāļđāļĨ (Traffic Load).
- āļāļĢāļ§āļāļŠāļāļāļāļĨāļāļēāļĢāļŠāļģāļĢāļāļāļāđāļāļĄāļđāļĨ āđāļĨāļ°āļāļāļŠāļāļāļāļēāļĢāļāļđāđāļāļ·āļāļāđāļāļĄāļđāļĨ.
- āļāļģāđāļāļīāļāļāļēāļĢāļāļģāļĢāļļāļāļĢāļąāļāļĐāļē Server āļāļēāļĄāđāļāļāļāļĩāļāļģāļŦāļāļ āđāļĨāļ°āđāļāđāļāđāļāļ·āļāļāļāļēāļĢ Update Patch āļāļāļ Software āļāđāļēāļāđ.
- āļāļĢāļ§āļāļŠāļāļāļāļēāļĢāđāļāđāļē-āļāļāļ āļāļāļ Licensor āļāļĩāđāđāļāđāļēāļĄāļēāļāļĢāļąāļāļāļĢāļļāļ Application āđāļ Server āļāļāļāđāļĢāļāļāļĨāļąāđāļ.
Skills:
Compliance
Job type:
Full-time
Salary:
negotiable
- Validates, classifies, priorities and opens ticket.
- Acting as focal contact point for report security incidents.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of security incidents.
- Responds to security alerts generate within the SLA time window.
- Follow-up and tracking security incidents base on team process.
- Examine network topologies to understand data flows through the network.
- Validate security incidents alerts against network traffic using packet analysis tools.
- Isolate or remove malware.
- Identify applications and operating systems of a network device based on network traffic.
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
- Notify cybersecurity service provider team members of suspected cyber incidents, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Who are we looking for?.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Analytical and problem-solving skills are required.
- Knowledge of network traffic analysis methods.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Experience in IT Security, Network Security or Security Compliance.
- Knowledge of common security tools such as anti-virus, firewall and intrusion detection system.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Able to work in shift.
- Location: Head Office: Chatuchak, SJ Infinite One Business Complex
Skills:
Teamwork, Compliance, Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Work in Shift.
- We are looking for a highly proficient Cyber Security Consultant who has the professional knowledge and skill to drive and enhance our security solutions in any field at MFEC Cyber Security Operation Center (CSOC) for our large enterprise customers.
- What we want?.
- To find the most efficient way to create and to manage every cyber security solution for multiple clients.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Work in Shift.
- Who are we looking for?.
- 1-3 Years or experience in Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Strong knowledge and experience with various IT security such as Incident Handler, Forensic Examiner, Forensic Analyst is a plus.
- Excellent knowledge in Security Product (Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Proficiency in English both written and spoken.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak, Lao Peng Nguan Building
Job type:
Full-time
Salary:
negotiable
- Develop, implement, and enforce robust Security Policies and procedures to protect company assets, employees, and customers.
- Manage and optimize Access Control (AC) systems across all bank premises.
- Lead Incident Response efforts, including investigation, resolution, and reporting of security breaches or emergencies.
- Conduct regular Threat Assessment to identify potential security vulnerabilities and develop mitigation strategies.
- Ensure full Regulatory Compliance with all relevant security laws, regulations, and industry standards, including Regulatory Compliance Management.
- Oversee and manage the bank's Security Operations, including surveillance, patrols, and security personnel deployment.
- Implement and maintain effective Risk Management strategies to identify, assess, and mitigate security risks.
- Plan and execute Emergency Management protocols, including drills and crisis communication.
- Conduct Investigative Skills for security incidents, thefts, and other breaches.
- Develop and deliver comprehensive Security Trainings for all employees, including Health And Safety (H&S) Training.
- Evaluate and implement new Security Technologies to enhance the bank's security posture.
- Demonstrate strong Accountability for the overall security performance and outcomes of the bank.
- Job Qualifications Proven experience in a senior security management role, preferably within the financial services industry.
- Extensive knowledge and practical experience in Access Control (AC) systems.
- Demonstrated ability in Incident Response and crisis management.
- Strong understanding of Regulatory Compliance and Regulatory Compliance Management frameworks.
- Expertise in Risk Management methodologies and threat assessment.
- Proficiency in Security Operations and policy enforcement.
- Excellent Investigative Skills with a keen eye for detail.
- Experience in developing and delivering Security Trainings, including Health And Safety (H&S) Training.
- Familiarity with various Security Technologies and their application.
- Strong leadership, communication, and interpersonal skills.
- High level of Accountability and integrity.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Skills:
Contracts, Network Administration, Project Management
Job type:
Full-time
Salary:
negotiable
- Designs and plans network solutions, including LAN, WAN, data center, and cloud networks.
- Develops network architectures that meet the organization's current and future requirements.
- Configures, deploys, and manages network devices such as routers, switches, firewalls, load balancers, and wireless controllers.
- Implements and maintains network services and protocols.
- Implements and enforces network security measures, including firewalls, intrusion detection/prevention systems, access controls, and VPNs.
- Diagnoses and resolves complex network issues, utilizing advanced troubleshooting techniques and network monitoring tools.
- Analyzes network performance data to identify and address bottlenecks and irregularities.
- Optimizes network performance by analyzing traffic patterns, adjusting configurations, and implementing quality of service (QoS) measures.
- Creates and maintains comprehensive network documentation, including network diagrams, configurations, standard operating procedures, and incident reports.
- Collaborates with cross-functional teams, including systems administrators, security teams, application developers, and business stakeholders.
- Manages/participates in network-related projects, including network upgrades, migrations, and expansions.
- Develops project plans, define objectives, and ensure successful project execution.
- Stays updated with emerging networking technologies and industry trend.
- Works with vendors to evaluate, procure, and manage networking equipment, services, and support contracts.
- Utilizes network monitoring and analysis tools to proactively monitor network health, identify issues, and respond to incidents.
- Erforms any other related task as required.
- To thrive in this role, you need to have: Seasoned understanding of networking concepts, protocols, architectures, and services.
- Seasoned proficiency in configuring and managing network devices such as routers, switches, firewalls, load balancers, and wireless controllers.
- Seasoned knowledge of network protocols and technologies such as BGP, OSPF, VLANs, VPNs, QoS, and security protocols.
- Seasoned experience with network monitoring and analysis tools.
- Strong documentation and communication skills to convey technical information effectively.
- Seasoned proficiency in network administration and configuration tools.
- Analytical problem-solving skills to diagnose and resolve complex network issues.
- Strong project management skills to lead and contribute to network projects.
- Seasoned familiarity with network security principles and best practices.
- Academic qualifications and certifications: Bachelor's degree or equivalent in Information Technology, Computer Science, or a related field.
- Network Administration certification (Azure, Google, Amazon) preferred.
- Relevant certifications such as CompTIA Network+, Cisco Certified Network Associate (CCNA), or Juniper Networks Certified Associate (JNCIA) are beneficial.
- Relevant certifications such as Cisco Certified Internetwork Expert (CCIE), Juniper Networks Certified Internet Expert (JNCIE), or equivalent certifications are preferred.
- Required experience: Seasoned relevant experience in network engineering or a related role.
- Seasoned experience working in a networking environment.
- Seasoned experience with network security.
- Seasoned WAN and LAN experience.
- Seasoned experience in wireless equipment, protocols, standards, and wireless LAN design.
- Seasoned experience with cloud networking (AWS, Azure, etc.).
- Hybrid Working About NTT DATA
- NTT DATA is a $30+ billion business and technology services leader, serving 75% of the Fortune Global 100. We are committed to accelerating client success and positively impacting society through responsible innovation. We are one of the world s leading AI and digital infrastructure providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. Our consulting and industry solutions help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have experts in more than 50 countries. We also offer clients access to a robust ecosystem of innovation centers as well as established and start-up partners. NTT DATA is part of NTT Group, which invests over $3 billion each year in R&D.
- Equal Opportunity Employer
- NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
- Third parties fraudulently posing as NTT DATA recruiters.
- NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters whether in writing or by phone in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an @nttdata.com email address. If you suspect any fraudulent activity, please contact us.
Experience:
2 years required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and give in the moment feedback in a constructive manner.
- Share and collaborate effectively with others.
- Identify and make suggestions for improvements when problems and/or opportunities arise.
- Handle, manipulate and analyse data and information responsibly.
- Follow risk management and compliance procedures.
- Keep up-to-date with developments in area of specialism.
- Communicate confidently in a clear, concise and articulate manner - verbally and in the materials I produce.
- Build and maintain an internal and external network.
- Seek opportunities to learn about how PwC works as a global network of firms.
- Uphold the firm's code of ethics and business conduct.
- Bachelor s degree in Computer Engineering, Computer Science, Information Systems or a related field.
- 0-2 years of experience.
- Be able to utilize your well-rounded skills and experience related to industries to steer your projects to a successful outcome.
- Team player with strong interpersonal, communication skills.
- Be able to work both independently and as part of a team with professionals at all levels.
- Proficiency in spoken and written English & Thai.
- We thank all applicants. Please note that only short-listed candidates will be contacted for interviews.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
- Job Posting End Date.
- 1
- 2
