- No elements found. Consider changing the search query.


āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
1 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Network Administration
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Installing and configuring computer hardware operating systems and applications.
- Providing operational support and maintaining computer systems, internet systems and networks.
- Inspecting and maintaining IT equipment according to the plan to reduce the damage.
- Talking staff or clients through a series of actions, either face-to-face or over the telephone, to help set up systems or resolve issues.
- Monitoring and operating computer and telecommunications systems, including hardware and software.
- Preparing and operating service requests from customers by scope of the service categories and IT policies.
- Perform additional tasks as needed.
- QualificationsBachelor s degree or higher in area of Information Technology, Computer Science, Computer Engineering or related fields.
- Minimum of 1-5 years experience in IT Support.
- Experience withWindow10-11, MS Active Directory, O365, PC/Notebook Hardware installation and troubleshooting.
- Experience in healthcare industry would be advantage.
- Hands-on experience with computer networks, network administration, network installation and database.
- Good verbal and written communication, technical and consultative skills.
- Eager to learning new things and keep IT knowledge up to date.
āļāļąāļāļĐāļ°:
Network Infrastructure
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Monitor and maintain the hotel s computer systems and network infrastructure.
- Enhance IT and network security as needed to ensure safe operations.
- Coordinate with system owners or vendors when necessary.
- Troubleshoot and repair or replace equipment to minimize operational downtime.
- Provide remote support as needed for issue resolution.
- Respond swiftly to urgent and critical service issues.
- Submit monthly reports summarizing work performed.
āļāļąāļāļĐāļ°:
Compliance, Legal, Risk Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Establish and maintain appropriate security measures for personal data protection to prevent unauthorized access, loss, alteration, or disclosure..
- Regularly review and update security measures to align with technological advancements and PDPA requirements..
- Ensure third-party vendors handling personal data comply with data protection regulations..
- Implement and oversee data retention and deletion processes per legal requirements..
- Develop a risk management system for PDPA compliance..
- Assess risks related to personal data processing, evaluate mitigation strategies, and audit IT systems for security compliance..
- Conduct periodic assessments of IT systems handling personal data..
- Evaluate the effectiveness of data protection measures in databases, applications, and information security frameworks..
- Bachelor s degree in Computer Science, IT Security, Management Information Systems, or a related field.
- 5-10 years of experience in Database Management, IT Security, or Data Privacy Compliance.
- Proficiency in database management (SQL Server, MySQL).
- Understanding of IT security, data governance or compliance frameworks.
- Location: BTS Ekkamai
- Working Day: Mon-Fri.
āļāļąāļāļĐāļ°:
Procurement, Contracts, Market Research, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Manage the full lifecycle of sourcing and procurement for IT requirements, including hardware, software, services, and IT Outsource Turnkey solutions.
- Identify, evaluate, and onboard new potential suppliers to meet organizational needs.
- Negotiate contracts, pricing agreements, and terms with suppliers, ensuring favorable and sustainable conditions.
- Monitor supplier performance and ensure adherence to contractual obligations, addressing any discrepancies as they arise.
- Collaborate with internal stakeholders to understand their requirements and ensure alignment with procurement strategies.
- Proactively identify and resolve procurement-related challenges to avoid operational disruptions.
- Conduct market research and competitor analysis to identify cost-effective, high-quality suppliers that meet the company's needs.
- Educational Background: Bachelor's degree in Supply Chain Management, Business Administration, Information Technology, or a related field. A master's degree or relevant certifications are a plus..
- Experience: Proven experience in IT procurement, sourcing, or vendor management, ideally within a technology-driven environment..
- Technical Knowledge: Strong understanding of IT hardware, software, services, and outsourcing models..
- Negotiation Skills: Demonstrated ability to negotiate contracts and pricing agreements that deliver favorable outcomes for the organization..
- Supplier Management: Experience in identifying, qualifying, and nurturing long-term relationships with suppliers..
- Problem-Solving Abilities: A proactive approach to resolving procurement challenges and driving solutions that support organizational objectives..
- Market Awareness: Ability to conduct comprehensive market research and competitor analysis to identify high-quality, cost-effective suppliers..
- English Communication Skills: Strong verbal and written communication skills in English..
āļāļąāļāļĐāļ°:
Project Management, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Bridge IT and Business - Understand business strategies and translate them into IT requirements to ensure technology supports organizational goals.
- Manage Demand Effectively - Screen and prioritize IT projects based on business value and feasibility, aligning with the company s strategic direction.(Lead the Demand Management process, including reviewing business scope and value, coordinating with development teams for cost-effective solutions, conducting feasibility studies, and refining requirements to align with existing capabilities ensuring deliverables stil ...
- Oversee Requirements and Change Management - Assist Business Users in defining clear requirements and managing change requests to keep projects on track.
- Facilitate Communication Between Business and IT - Collaborate with Business Users, IT teams, and vendors to ensure solutions are developed efficiently and meet business needs.
- Support Technology Decision-Making - Provide guidance on IT solutions by considering cost, risks, and benefits to maximize organizational value.
- Track and Evaluate Project Outcomes - Monitor project progress and conduct post-evaluation to ensure the delivered solutions generate real business impact.
- Develop and Empower Teams - Strengthen collaboration between ITBP and Business Users through training, knowledge sharing, and capability-building sessions..
- 3 - 5 years experiences in Project Management,Business Analyst.
- Bachelor degree in Business, Information Systems, Information Technology or related disciplines.
- Extensive knowledge in software application project and program coordination & management.
- Practical experience in organizing and motivating large cross-functional and cross-vendor teams, controlling different interests between teams and stakeholders.
- Excellent commercial sense with business management principles, methods, and techniques.
- Fast-paced, self-motivated with ability to work independently.
- English communication skills (reading, writing and speaking) with a proven track record engaging and leading clients.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļģāđāļŦāļāđāļ āļĢāļāļāļāļđāđāļāļģāļāļ§āļĒāļāļēāļĢāļāđāļēāļĒ (VP) āđāļĨāļ° āļŦāļąāļ§āļŦāļāđāļēāļŠāđāļ§āļ (AVP).
- āļāļąāļāļāļģāļāđāļĒāļāļēāļĒāļāļĢāļīāļŦāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ.
- āļāļąāļāļāļģāļāđāļĒāļāļēāļĒāļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāļēāļāļāļļāļāļāļĨāļ āļēāļĒāļāļāļ (Third Party Risk Management Policy).
- āļāļĢāļīāļŦāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻāđāļāļāļēāļāļ° 2 nd Line of Defense (āļāļĢāļāļāļāļĨāļļāļĄāļāļąāđāļāļāļĢāļąāļāļĒāđāļŠāļīāļ āļāļēāļĢāļāļąāļāļŦāļē āđāļĨāļ°āļāļąāļāļāļēāļĢāļ°āļāļ āļāļēāļĢāļĢāļąāļāļĐāļēāļāļ§āļēāļĄāļĄāļąāđāļāļāļāļāļĨāļāļāļ āļąāļĒāļāļāļ Information, Operation, Physical & Environmental, Communications, Access Control, Incident & Problem Management, Third Party, IT Project, Disaster Recovery Plan, Data Protection) āđāļāļĒāļāļēāļĢāļĢāļ°āļāļļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļ āļ§āļīāđāļāļĢāļēāļ°āļŦāđāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļ āļāļĢāļ°āđāļĄāļīāļāļāđāļēāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāļķāđāļāļĢāļ§āļĄāļāļķāļāļāļēāļĢāļāļģāļŦāļāļāļĢāļ°āļāļąāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļāļĩāđāļĒāļāļĄāļĢāļąāļāđāļāđ (IT Risk Appetite)āļāļģāļŦāļāļ āđāļāļ§āļāļēāļāđāļāļāļēāļĢāļāļąāļāļāļēāļĢ āļāļ§āļāļāļļāļĄ āđāļĨāļ°āļāđāļāļāļāļąāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāļīāļāļāļēāļĄāđāļĨāļ°āļāļāļāļ§āļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļĢāļ§āļĄāļāļąāđāļ āļĢāļēāļĒāļāļēāļāļāļĨāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāđāļĨāļ°āđāļāļ§āđāļāđāļĄāļāđāļāļāļāļ°āļāļĢāļĢāļĄāļāļēāļĢāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļ Cyber Security āđāļĨāļ°āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļŦāļāđāļ§āļĒāļāļēāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļģāļŦāļāļāđāļāļ§āļāļēāļāđāļāđāđāļ āđāļĨāļ°āļāđāļāļāļāļąāļ.
- āļŠāđāļāđāļŠāļĢāļīāļĄāđāļŦāđāļāļāļąāļāļāļēāļāļāļĢāļ°āļŦāļāļąāļāļāļķāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ (IT Risk awareness) āđāļĨāļ°āļ āļąāļĒāļāļļāļāļāļēāļĄ āļāļēāļāđāļāđāļāļāļĢāđ.
- āļāļĢāļ°āļŠāļģāļāļāļēāļāļāļĢāļīāļĐāļąāļāđāļāđāļāļĢāļ·āļāđāļāļāļēāļĢāļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ.
- āļāļāļīāļāļąāļāļīāļŦāļāđāļēāļāļĩāđāļāļ·āđāļāđāļāļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒ.
- āļ§āļļāļāļīāļāļēāļĢāļĻāļķāļāļĐāļēāļĢāļ°āļāļąāļāļāļĢāļīāļāļāļēāļāļĢāļĩāļāļķāđāļāđāļ āļāđāļēāļāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđ āļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļāļĢāļīāļŦāļēāļĢāļāļļāļĢāļāļīāļ āđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļ·āđāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļāļāļēāļĢāļāļīāļāļāļēāļĄ āļāļ§āļāļāļļāļĄ āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļ āļŦāļĢāļ·āļāļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļāļāļĢāļđāđāđāļāļāļļāļĢāļāļīāļāļāļāļēāļāļēāļĢ āļāļĨāļīāļāļ āļąāļāļāđāđāļĨāļ°āļāļĢāļīāļāļēāļĢ āļĢāļ§āļĄāļāļķāļāļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāļĩāđāļāļĒāļđāđāđāļāļāļ§āļēāļĄāļĢāļąāļāļāļīāļāļāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļĨāļ°āļĄāļĩāļāļąāļāļĐāļ°āđāļāļāļēāļĢāļ§āļīāđāļāļĢāļēāļ°āļŦāđāļāļąāļāļŦāļē āļāļēāļĢāļŠāļ·āļāļāđāļ (Investigation) āļāļĨāļāļāļāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāđāļāļĄāļđāļĨāđāļĨāļ°āļāđāļāļŦāļēāļāđāļāļĄāļđāļĨāļāļēāļ Database āđāļĨāļ°āđāļāļāļŠāļēāļĢ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđ āļāļ§āļēāļĄāđāļāđāļēāđāļāļāļĢāļ°āļāļ§āļāļāļēāļĢ āļāļąāļāļāļēāļĢāļ°āļāļāļāļēāļāļŠāļēāļĢāļŠāļāđāļāļĻ (System Development Life Cycle), āļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļĻāļđāļāļĒāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ (Data Center Management), āļāļĢāļ°āļāļ§āļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāđāļēāļāļĢāļ°āļāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļŠāļēāļĢāļŠāļāđāļāļĻ (Data Center Security) āļāļēāļĢāļāļąāļāļāļēāļĢāļāļđāđāđāļŦāđāļāļĢāļīāļāļēāļĢāļĢāļ°āļāļāļŠāļēāļĢāļŠāļāđāļāļĻ āđāļĨāļ° āļāļđāđāđāļŦāđāļāļĢāļīāļāļēāļĢāļ āļēāļĒāļāļāļāđāļĨāļ°āļāļļāļāļāļĨāļ āļēāļĒāļāļāļ (IT Third Party Management).
- āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļāđāļēāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļ§āļāļāļļāļĄ āļāđāļēāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāđāļŠāļĩāđāļĒāļ āļŦāļĢāļ·āļ āļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļ āļēāļĒāđāļ āļāļāļ āļĢāļ°āļāļāļŠāļēāļĢāļŠāļāđāļāļĻ, āļĻāļđāļāļĒāđāļāļĢāļ°āļĄāļ§āļĨāļāļĨāļŠāļēāļĢāļŠāļāđāļāļĻ āļŦāļĢāļ·āļ āļāļĢāļ°āļāļ§āļāļāļēāļĢāļāļąāļāļāļēāļĢāļ°āļāļāļāļēāļ.
- āļĄāļĩāļĄāļāļļāļĐāļĒāđāļŠāļąāļĄāļāļąāļāļāđāļāļĩāđāļāļĩ āļĄāļĩāļāļąāļāļĐāļ° āđāļĨāļ°āļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļāļāļēāļĢāļŠāļ·āđāļāļŠāļēāļĢāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļāļĨ.
- āļŠāļēāļĄāļēāļĢāļāļ§āļēāļāđāļāļ āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢ āļ§āļīāđāļāļĢāļēāļ°āļŦāđāđāļĨāļ°āđāļāđāđāļāļāļąāļāļŦāļēāđāļāļāļēāļ°āļŦāļāđāļēāđāļāđāļāļĩ.
- āļĄāļĩāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļāļāļēāļĢāđāļāđāļ āļēāļĐāļēāļāļąāļāļāļĪāļĐāļāļĒāļđāđāđāļāļĢāļ°āļāļąāļāļāļĩ
- āļāđāļēāļāđāļāđāļāđāļēāļāđāļĨāļ°āļĻāļķāļāļĐāļēāļāđāļĒāļāļēāļĒāļāļ§āļēāļĄāđāļāđāļāļŠāđāļ§āļāļāļąāļ§āļāļāļāļāļāļēāļāļēāļĢāļāļĢāļļāļāđāļāļĒ āļāļģāļāļąāļ (āļĄāļŦāļēāļāļ) āļāļĩāđ https://krungthai.com/th/content/privacy-policy āļāļąāđāļāļāļĩāđ āļāļāļēāļāļēāļĢāđāļĄāđāļĄāļĩāđāļāļāļāļēāļŦāļĢāļ·āļāļāļ§āļēāļĄāļāļģāđāļāđāļāđāļāđ āļāļĩāđāļāļ°āļāļĢāļ°āļĄāļ§āļĨāļāļĨāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļāđāļāļāđāļŦāļ§ āļĢāļ§āļĄāļāļķāļāļāđāļāļĄāļđāļĨāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļĻāļēāļŠāļāļēāđāļĨāļ°/āļŦāļĢāļ·āļāļŦāļĄāļđāđāđāļĨāļŦāļīāļ āļāļķāđāļāļāļēāļāļāļĢāļēāļāļāļāļĒāļđāđāđāļāļŠāļģāđāļāļēāļāļąāļāļĢāļāļĢāļ°āļāļģāļāļąāļ§āļāļĢāļ°āļāļēāļāļāļāļāļāļāđāļēāļāđāļāđāļāļĒāđāļēāļāđāļ āļāļąāļāļāļąāđāļ āļāļĢāļļāļāļēāļāļĒāđāļēāļāļąāļāđāļŦāļĨāļāđāļāļāļŠāļēāļĢāđāļāđ āļĢāļ§āļĄāļāļķāļāļŠāļģāđāļāļēāļāļąāļāļĢāļāļĢāļ°āļāļģāļāļąāļ§āļāļĢāļ°āļāļēāļāļ āļŦāļĢāļ·āļāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļāđāļāļāđāļŦāļ§āļŦāļĢāļ·āļāļāđāļāļĄāļđāļĨāļāļ·āđāļāđāļ āļāļķāđāļāđāļĄāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļŦāļĢāļ·āļāđāļĄāđāļāļģāđāļāđāļāļŠāļģāļŦāļĢāļąāļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāđāļāļāļēāļĢāļŠāļĄāļąāļāļĢāļāļēāļāđāļ§āđāļāļāđāļ§āđāļāđāļāļāđ āļāļāļāļāļēāļāļāļĩāđ āļāļĢāļļāļāļēāļāļģāđāļāļīāļāļāļēāļĢāđāļŦāđāđāļāđāđāļāļ§āđāļēāđāļāđāļāļģāđāļāļīāļāļāļēāļĢāļĨāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļāđāļāļāđāļŦāļ§ (āļāđāļēāļĄāļĩ) āļāļāļāļāļēāļāđāļĢāļāļđāđāļĄāđāđāļĨāļ°āđāļāļāļŠāļēāļĢāļāļ·āđāļāđāļāļāđāļāļāļāļĩāđāļāļ°āļāļąāļāđāļŦāļĨāļāđāļāļāļŠāļēāļĢāļāļąāļāļāļĨāđāļēāļ§āđāļ§āđāļāļāđāļ§āđāļāđāļāļāđāđāļĨāđāļ§āļāđāļ§āļĒ āļāļąāđāļāļāļĩāđ āļāļāļēāļāļēāļĢāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāļāđāļāļāđāļāđāļāļĢāļ§āļāļĢāļ§āļĄāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāđāļēāļāđāļāļ·āđāļāļāļĢāļĢāļĨāļļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāđāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāļĢāļąāļāļāļļāļāļāļĨāđāļāđāļēāļāļģāļāļēāļ āļŦāļĢāļ·āļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļļāļāļŠāļĄāļāļąāļāļī āļĨāļąāļāļĐāļāļ°āļāđāļāļāļŦāđāļēāļĄ āļŦāļĢāļ·āļāļāļīāļāļēāļĢāļāļēāļāļ§āļēāļĄāđāļŦāļĄāļēāļ°āļŠāļĄāļāļāļāļāļļāļāļāļĨāļāļĩāđāļāļ°āđāļŦāđāļāļģāļĢāļāļāļģāđāļŦāļāđāļ āļāļķāđāļāļāļēāļĢāđāļŦāđāļāļ§āļēāļĄāļĒāļīāļāļĒāļāļĄāđāļāļ·āđāļāđāļāđāļāļĢāļ§āļāļĢāļ§āļĄ āđāļāđ āļŦāļĢāļ·āļāđāļāļīāļāđāļāļĒāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāđāļēāļāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāļŠāļģāļŦāļĢāļąāļāļāļēāļĢāđāļāđāļēāļāļģāļŠāļąāļāļāļēāđāļĨāļ°āļāļēāļĢāđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāļāļēāļĄāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāļāļąāļāļāļĨāđāļēāļ§āļāđāļēāļāļāđāļ āđāļāļāļĢāļāļĩāļāļĩāđāļāđāļēāļāđāļĄāđāđāļŦāđāļāļ§āļēāļĄāļĒāļīāļāļĒāļāļĄāđāļāļāļēāļĢāđāļāđāļāļĢāļ§āļāļĢāļ§āļĄ āđāļāđ āļŦāļĢāļ·āļāđāļāļīāļāđāļāļĒāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄ āļŦāļĢāļ·āļāļĄāļĩāļāļēāļĢāļāļāļāļāļ§āļēāļĄāļĒāļīāļāļĒāļāļĄāđāļāļ āļēāļĒāļŦāļĨāļąāļ āļāļāļēāļāļēāļĢāļāļēāļāđāļĄāđāļŠāļēāļĄāļēāļĢāļāļāļģāđāļāļīāļāļāļēāļĢāđāļāļ·āđāļāļāļĢāļĢāļĨāļļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāļāļąāļāļāļĨāđāļēāļ§āļāđāļēāļāļāđāļāđāļāđ āđāļĨāļ°āļāļēāļ āļāļģāđāļŦāđāļāđāļēāļāļŠāļđāļāđāļŠāļĩāļĒāđāļāļāļēāļŠāđāļāļāļēāļĢāđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāļĢāļąāļāđāļāđāļēāļāļģāļāļēāļāļāļąāļāļāļāļēāļāļēāļĢ.
āļāļąāļāļĐāļ°:
Risk Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Support process in IT audits. Prepare audit reports for review by Senior and Head of Internal Audit. Communicate findings and areas for improvement to the Executive Committee in weekly status update meetings and exit meetings.
- Plan and execute IT audit projects in accordance with audit methodology and departmental standards to ensure quality of work completed.
- Conduct follow up reviews to ensure effective remediation of audit findings and positive improvement and impact to the control environment.
- Manage/ assist in IT projects within time budgets, target dates and escalate any timing problems or budget over.
- Understand and agree with management the risks being managed by business unit.
- Prepared IT audit reports, including executive summary and rating of adequacy of risk management, making practical and value-added recommendations to improve risk management practices and the efficiency and effectiveness of operations, audit reports are to be clear, concise and well-organized, and issued within departmental service standards.
- Assist the development of the three- year audit plan and the annual plan by performing IT risk assessments with 2nd line, 1st line Executive Management and other key stakeholders.
- Utilize technology to improve effectiveness and efficiency of audit process.
- Assist business unit management by providing risk management consulting and risk management education and training.
- Actively participates in departmental initiatives.
- Perform integrated audits to add more value on business audit emphasizing on IT areas such as digital processes, digital distribution, technology risks.
- People Management.
- Support the team of IT audit professionals or technical specialists to ensure that audit activities are conducted to high standards of accuracy, rigor, and credibility and according to relevant regulations and industry standards.
āļāļąāļāļĐāļ°:
Compliance, Industry trends, DevOps, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement, and manage IT infrastructure solutions in the ADMS environment.
- Collaborate with cross-functional teams to ensure seamless integration of infrastructure with software applications.
- Monitor system performance, troubleshoot issues, and implement necessary fine tuning to optimize performance.
- Ensure the security and integrity of the infrastructure, adhering to best practices and compliance requirements.
- Incident, problem & change management.
- Develop and maintain documentation for systems, processes, and procedures.
- Provide technical support and training to team members and end-users when required.
- Stay updated with emerging technologies and industry trends to enhance infrastructure capabilities.
- Bachelor's degree in Computer Science, Information Technology, Computer Networks, or a related field.
- More than 5 years' experience working as an IT Infrastructure Engineer or similar role.
- Strong knowledge of network protocols, server management, and virtualization technologies.
- Excellent problem-solving skills and the ability to work under pressure.
- Good command in English, strong communication and interpersonal skills to collaborate effectively with team members and stakeholders from different parts of the APAC region.
- Proficiency in cloud services (e.g., AWS, Azure) and experience with DevOps practices is a plus.
- Relevant certifications (e.g., Cisco Certification, Microsoft Certification, Azure, AWS) are a plus.
- Experience in implementing or working in ITIL processes and methodologies environment.
- Knowledge of cybersecurity best practices.
- Competitive salary and performance-based bonuses.
- Opportunities for professional development and certification.
- Primary Location: TH-10-Bangkok.
- Schedule: Full-time Unposting Date: Ongoing
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and manage implementation / enhancement of add-on applications having interface with SAP S4 HANA.
- Manage scope, time and cost within plan and budget.
- Develop project plan (to align with program master plan) and lead the execution to meet the goal.
- Coordinate with project team members and develop schedules and individual responsibilities.
- Organize and/or Participate in project workshop to gather business requirement.
- Organize / Facilitate meetings to discuss and make progress of project activities with project team members.
- Actively monitor and track project status, performance and schedule adherence.
- Maintain project timeframes, budgeting estimates, and status reports.
- Manage project risk, mitigation plan and issue resolution.
- A bachelor's degree in Computer Science, Information Technology, or a related field.
- Proven experience in leading IT projects.
- Strong knowledge of project management methodologies and tools.
- Excellent analytical and problem-solving skills.
- Strong communication and leadership abilities..
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ.
- āđāļĄāļ·āļāļāļāļļāļĢāļĩāļĢāļąāļĄāļĒāđ, āļāļļāļĢāļĩāļĢāļąāļĄāļĒāđ, āđāļāļĒ.
- Job Responsibility.
- āļāļĢāļ§āļāđāļāđāļāļāļ§āļēāļĄāļāļĢāđāļāļĄāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āđāļĨāļ°āļāļļāļāļāļĢāļāđāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ- āđāļāļ°āļāļģāļāļēāļĢāđāļāđāļāļēāļāđāļāļĢāđāļāļĢāļĄ B Plus āđāļĨāļ°āļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāđāļāļĄāļđāļĨ- āđāļāđāđāļāļāļąāļāļŦāļēāđāļŦāđāļāļģāļāļĢāļķāļāļĐāļē āļāļēāļĢāđāļāđāļāļēāļāđāļāļĢāđāļāļĢāļĄ āđāļĨāļ°āļāļļāļāļāļĢāļāđ āļāļāļĄāļāļīāļ§āđāļāļāļĢāđ Tablet- āđāļāļ°āļāļģāļāļēāļĢāđāļāđāļāļēāļāđāļāļĢāđāļāļĢāļĄāđāļāļāļēāļĢāļāļģāļāļēāļāđāļŦāđāļāļąāļāđāļāđāļĒāđāļāļāđ- āļāļīāļāļāļēāļĄ āļāļĢāļ°āļŠāļēāļāļāļēāļ āđāļĨāļ°āđāļāđāđāļāļāļąāļāļŦāļēāļāļāļāđāļāļĢāļāļāļēāļĢāđāļāļāļ·āđāļāļāļĩāđāļāļĩāđāļāļāļĢāļąāļāļāļīāļāļāļāļ- āļŠāļ·āđāļāļŠāļēāļĢāļāļąāļāļāļđāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļļāļāļāđāļēāļĒ āđāļĨāļ°āļāļđāđāļāļąāļāļāļąāļāļāļąāļāļāļē āđāļāļ·āđāļāđāļŦāđāļāļēāļāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒāļāļĢāļ°āļŠāļāļāļ§āļēāļĄāļŠāļģāđāļĢāđāļāļāļēāļĄāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđ.
- Job Qualification.
- āļāļĢāļīāļāļāļēāļāļĢāļĩāļāđāļēāļāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļāļāļĒāđāļēāļāļāđāļāļĒāļāļēāļāļāđāļēāļāļāļļāļĢāļāļēāļĢ/āđāļāļĢāļāļāļēāļĢāļāļĒāđāļēāļāļāđāļāļĒ 1 āļāļĩāļĄāļĩāļāļ§āļēāļĄāļāļīāļāļŠāļĢāđāļēāļāļŠāļĢāļĢāļāđ āļŠāļēāļĄāļēāļĢāļāļāļĢāļ°āļĒāļļāļāļāđāđāļĨāļ°āļāļąāļāđāļāļĨāļāļāļ§āļēāļĄāļĢāļđāđāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāļāļēāļāļāđāļēāļāđāļāļĢāđāļĢāļāļĄāļāļāļĄāļāļīāļ§āđāļāļāļĢāđāđāļāđāđāļāđāļāļāļĒāđāļēāļāļāļĩāļĄāļĩāļāļąāļāļĐāļ°āļāđāļēāļāļāļēāļĢāļŠāļ·āđāļāļŠāļēāļĢāļāļĩāđāļāļĩāļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļĄāļąāļĒāđāļŦāļĄāđāļĄāļĩāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļāļāļēāļĢāļŠāļāļāļāļēāļāļāđāļāđāļāđāļĄāļĩāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļāļāļēāļĢāđāļāđāļāļąāļāļŦāļēāđāļāđāđāļāđāļāļāļĒāđāļēāļāļāļĩāļāļąāļāļĢāļāļĒāļāļāđāđāļāļĩāļĒāļĢāđāļāļāđāļāđāđāļāđ āļĄāļĩāđāļāļāļąāļāļāļĩāđ āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāđāļāļīāļāļāļēāļāđāļāļāļāļīāļāļąāļāļīāļāļēāļāļāđāļēāļāļāļąāļāļŦāļ§āļąāļāđāļāđ.
- Contact Information.
āļāļąāļāļĐāļ°:
Oracle, SAP, Compliance, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Handle IT Internal audit work assigned by the audit managers to achieve the AAP.
- Carry out special / investigation audit assigned by the audit manager.
- Identify and allocate tasks, co-ordinate, monitor and consolidate the work of the audit team.
- Ensure conformity with Internal Audit Manual in all phases of the audit process.
- Document, evaluate and test systems and controls to assess the adequacy and effectiveness of internal controls, compliance with policies and procedures, reliability, and integrity of information, safeguarding of assets and etc.
- Attend entry conference with auditee s management to discuss on the audit process and audit work.
- Develop and discuss findings, recommendations, and timelines for corrective action with responsible personnel of auditee.
- Attend exit meeting with auditee s management to discuss on the audit findings identified during audit.
- Prepare and finalize the draft audit report after audit work and submit to audit manager for review.
- Discuss with GCAE and Audit Managers for major risks or audit findings identified during audit.
- Track the follow up process to ensure timely dispatch of audit reports to auditee and obtaining reply from auditee on the implementation status of recommendations.
- Prepare and preserve the various documentations for audit work such as working papers, audit program, supporting evidence, permanent file, current file, circulars, minutes, office memo and etc. for audit manager s review.
- Bachelor s degree or higher in IT, or related fields.
- More than 3 years experience in external or internal "IT audit" and related.
- Preferably proficient in Oracle or any other related Accounting System. Working knowledge in Auditor; highly proficient with ERP configurations e.g. SAP and Oracle. Ability to apply best practices of one ERP system in other ERP systems.
- Able to work to upcountry or overseas.
- Certifications such as CISA or CIA or CPA or CPIAT will be advantage.
- Good command of English and computer software (MS word, Excel, Power point).
- Good analytical, problem-solving and consulting skill.
- Ability to work independently with high responsibility.
- Knowledge of IT auditing policies, standards, and procedures, and financial recordkeeping procedures, laws, regulations, and standards.
- Understand complex operations from a broad perspective.
- Ability to work effectively with any others, to supervise and train employees, to include organizing, prioritizing, and scheduling work assignments.
- Working independently without closely supervisor.
- Ability to provide technical guidance, training, and coaching to end users.
- Ability to persuade and influence others, to motivate others and promote teamwork and mentor any others, and to provide effective feedback.
- CP AXTRA | Lotus's
- CP AXTRA Public Company Limited.
- Nawamin Office: Buengkum, Bangkok 10230, Thailand.
- By applying for this position, you consent to the collection, use and disclosure of your personal data to us, our recruitment firms and all relevant third parties for the purpose of processing your application for this job position (or any other suitable positions within Lotus's and its subsidiaries, if any). You understand and acknowledge that your personal data will be processed in accordance with the law and our policy. .
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
1 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Assurance, Finance, Quality Assurance, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Perform IT Audit and Advisory services for various industries/sectors (e.g., Financial Services, Manufacturing, Automotive, Telecommunication, Life Science & Hospitality, Energy, Consumer Product, etc.).
- Participate in significant meetings with client's management to communicate detailed audit findings and recommendations, as assigned.
- Perform any other tasks or assignments.
- Your role as a leader:At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We connect our purpose and shared values to identify issues as well as to make an impact that matters to our clients, people and the communities. Additionally, Analyst, Consultant, Senior Consultant across our Firm are expected to:Actively seek out developmental opportunities for growth, act as strong brand ambassadors for the firm as well as share their knowledge and experience with others.
- Respect the needs of their colleagues and build up cooperative relationships.
- Understand the goals of our internal and external stakeholder to set personal priorities as well as align their teams work to achieve the objectives.
- Constantly challenge themselves, collaborate with others to deliver on tasks and take accountability for the results.
- Build productive relationships and communicate effectively in order to positively influence teams and other stakeholders.
- Offer insights based on a solid understanding of what makes Deloitte successful.
- Project integrity and confidence while motivating others through team collaboration as well as recognising individual strengths, differences, and contributions.
- Understand disruptive trends and promote potential opportunities for improvement.
- RequirementsEducation background in Accounting, Finance, and/or other IT-related fields (eg., AIS/MIS, Computer Engineering, Computer Science, etc).
- At least 1-3 years experience in IT Audit / IT Security / IT Quality Assurance, or Financial Audit with some IT knowledge (e.g., access control, change management).
- Knowledge in Audit concept / technique, and willing to learn more in IT Audit and Advisory services.
- Can do" attitude and able to work either individually or with team under pressure (e.g., quality and timeliness of audit reports).
- Experiences in using CAAT or Data Analytic & Visualization tools (e.g., R, Python, Tableau, PowerBI, etc) would be advantage.
- Verbal and written communication skills in both Thai and English.
- Due to volume of applications, we regret that only shortlisted candidates will be notified.
- Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. Requisition ID: 36464In Thailand, the services are provided by Deloitte Touche Tohmatsu Jaiyos Co., Ltd. and other related entities in Thailand ("Deloitte in Thailand"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website.
āļāļąāļāļĐāļ°:
Data Analysis
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļąāļāļāļģāđāļāļāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļāļāļĢāļ§āļāļŠāļāļ (Audit Schedule) āđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ (Audit Program) āđāļāļ·āđāļāļāļģāļŦāļāļāļāļāļāđāļāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ.
- āļāļāļīāļāļąāļāļīāļāļēāļāļāļĢāļ§āļāļŠāļāļāđāļŦāđāļāļĢāļĢāļĨāļļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āđāļāđāļāđāļāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļŠāļēāļāļĨāļāļēāļĢāļāļĢāļ°āļāļāļāļ§āļīāļāļēāļāļĩāļāļāļĢāļ§āļāļŠāļāļāļ āļēāļĒāđāļ.
- āļĄāļāļāļŦāļĄāļēāļĒ āļāļ§āļāļāļļāļĄāđāļĨāļ°āļŠāļāļāļāļēāļāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļāļāļāļāļāļđāđāđāļāđāļāļąāļāļāļąāļāļāļąāļāļāļē āđāļāļ·āđāļāđāļŦāđāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļāļāļĢāļĢāļĨāļļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āđāļāđāļāđāļāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļŠāļēāļāļĨāļāļēāļĢāļāļĢāļ°āļāļāļāļ§āļīāļāļēāļāļĩāļāļāļĢāļ§āļāļŠāļāļāļ āļēāļĒāđāļ.
- āđāļāđāļēāļĢāđāļ§āļĄāļāļĢāļ°āļāļļāļĄ āļāļĩāđāđāļāļ āļŦāļēāļĢāļ·āļāļāļķāļāļāļĢāļ°āđāļāđāļāļāļĩāđāļāļĢāļ§āļāļāļ āļāļĢāđāļāļĄāļāļģāļŦāļāļāđāļāļ§āļāļēāļāļāļēāļĢāđāļāđāđāļāļāļĢāļąāļāļāļĢāļļāļāļĢāđāļ§āļĄāļāļąāļāļāļđāđāļāļĢāļīāļŦāļēāļĢāļŦāļāđāļ§āļĒāļĢāļąāļāļāļēāļĢāļāļĢāļ§āļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāļāļĨāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāđāļāļĄāļāđāļāđāļŠāļāļāđāļāļ°āđāļāļ·āđāļāđāļŠāļāļāļāļđāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āđāļĨāļ°āļāļīāļāļāļēāļĄāļāļĨāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļĄāļāđāļāđāļŠāļāļāđāļāļ°.
- āđāļŦāđāļāļģāđāļāļ°āļāļģ āļāļĢāļķāļāļĐāļēāđāļāļ·āđāļāđāļāļīāđāļĄāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļāļāļēāļĢāļāļģāļāļēāļāđāļāđāļāļđāđāđāļāđāļāļąāļāļāļąāļāļāļąāļāļāļē āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļāļāļāļāļāļđāđāđāļāđāļāļąāļāļāļąāļāļāļąāļāļāļē.
- āļāļĢāļīāļāļāļēāļāļĢāļĩāļŦāļĢāļ·āļāļŠāļđāļāļāļ§āđāļē āļŠāļēāļāļēāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļĢāļ°āļāļāļŠāļēāļĢāļŠāļāđāļāļĻāļāļēāļāļāļļāļĢāļāļīāļ āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļ§āļīāļāļĒāļēāļāļēāļĢāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĒāđāļēāļāļāđāļāļĒ 5 āļāļĩāđāļāļāđāļēāļ IT Audit.
- āļāļ§āļēāļĄāđāļāđāļēāđāļāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļāļāļāļēāļĢāļāļģāļāļąāļāļāļđāđāļĨ IT (IT Governance frameworks).
- āļĄāļĩāđāļāļĢāļąāļāļĢāļāļāļāļļāļāļŠāļĄāļāļąāļāļīāđāļāļāđāļēāļ IT Audit āļŦāļĢāļ·āļ Security.
- āļāļąāļāļĐāļ°āļāļēāļāđāļāļāļāļīāļ: āļāļēāļĢāļ§āļīāđāļāļĢāļēāļ°āļŦāđāđāļĨāļ°āļāļĩāļāļ§āļēāļĄāļāđāļāļĄāļđāļĨ / āļāļąāđāļāļāļāļāđāļĨāļ°āļ§āļīāļāļĩāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ IT (Data analysis and interpretation / IT audit procedures and methodologies).
- āļŠāļāļēāļāļāļĩāđāļāļāļīāļāļąāļāļīāļāļēāļ: āļāļēāļāļēāļĢāđāļĨāđāļēāđāļāđāļāļāđāļ§āļ 1 āļāļāļāļ§āļīāļ āļēāļ§āļāļĩāļĢāļąāļāļŠāļīāļ āļāļāļļāļāļąāļāļĢ.
- āļ§āļąāļāļāļģāļāļēāļ: āļāļąāļāļāļĢāđ-āļĻāļļāļāļĢāđ.
- āđāļ§āļĨāļē: 8.30 āļ. - 17.00 āļ..
- āļāđāļāļĄāļđāļĨāļāļīāļāļāđāļ: āļāļļāļāļāļ āļīāļāļāļē.
- Email: [email protected].
- āļŠāļģāļāļąāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨ āļāļĢāļīāļĐāļąāļ āđāļāļĒāđāļāļāđāļ§āļāđāļĢāļ āļāļģāļāļąāļ (āļĄāļŦāļēāļāļ).
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Responsible in troubleshooting basic end-user issues related to workstation, server, network, voice, assets and mobile.
- Workstation installations, movement, upgrades, back-up, monitoring, and related workstation tasks based on agreed targets.
- Application of break-fix analysis on workstation operating systems, applications, utilities, Internet/Intranet tools, and related workstation services.
- Performing/assisting with the troubleshooting on managed active directory and other related services.
- Performing/assisting with the network/connectivity related tasks, and preventive maintenance
- Proactive monitoring of voice systems to ensure maximum availability and optimal operation of office phone systems including phone handsets, MDF/ IDF wiring, VoIP systems and voice circuits.
- Responsible in coordinating workstation hardware related issues to vendor.
- Responsible in providing timely and accurate update and information on assigned incidents and service request.
- Responsible on the timely escalation of incidents which cannot be resolved on time or would need vendor/third party support.
- Coordinates with concerned teams, vendors, and/or appropriate third party as part of operations escalation as necessary. Ensures that all escalation information is accurate and periodically updated, and that all relevant members of the team are regularly informed on the status of the operations escalation process
- Work closely with service providers to resolve workstation related issues and/or in provisioning new services.
- Responsible in performing workstation installation, upgrade, preventive maintenance, back-up, monitoring, access administration and other related communication and server infrastructure tasks.
- Maintains data integrity and ensures the security of workstations in accordance to standards and best practices (e.g., standards implementation/configuration hardening, secure access control, patch updates, etc.)
- Act as endpoint process expert.
- May be tasked as a Dedicated Support Engineer where required.
- May be tasked to coordinate or be a member of various continuous improvement initiatives of the organization.
- Responsible for Network Load Conversions for troubleshooting and training room set-ups. 14. Performs assigned activities or tasks which are aligned to the set objectives by the management.
- New graduate and candidate 1 year experience as L1 /L2 IT Support are welcome
āļāļąāļāļĐāļ°:
Procurement, Contracts, Multitasking, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Monitoring, negotiating, managing, and coordinating technology and IT sourcing activities, contracts, and suppliers.
- Creating, comparing, and analyzing competitive bids to ensure optimal pricing and terms.
- Executing new contracts, amendments, and renewals, particularly for cloud and software sourcing (Perpetual licenses, SaaS, subscription licenses, etc.).
- Collaborating with internal teams to develop and implement effective vendor sourcing strategies, focusing on standardization and vendor qualification.
- Serving as the point of contact and building strong relationships with internal and external stakeholders.
- Identifying and implementing cost improvement opportunities to achieve significant savings, aligned with company policies and budget.
- Minimum of 3-5 years of experience in IT procurement, supplier management, or contract management, preferably within the financial services industry.
- Experience in Cloud and/or Software sourcing & procurement categories is highly preferred.
- A strong understanding of corporate governance and ethics in procurement.
- Detail-oriented with strong organizational and multitasking abilities, excellent negotiation, communication, and interpersonal skills.
- Fluency in English, both spoken and written.
- Remark: Given the nature of the mentioned position, where employees are involved with customer data and asset values, and/or the company, to comply with legal and regulatory standards established by the Securities and Exchange Commission, as well as to align with laws and overseeing agencies, the company requires a criminal background check as part of the post-interview process before joining the company. Your criminal history information will be retained for a period of 6 months from the start date..
- Important: Candidate Privacy Policy.
- āļŠāļģāļāļąāļ:āđāļāļĢāļāļāđāļēāļāđāļĨāļ°āļāļģāļāļ§āļēāļĄāđāļāđāļēāđāļ: āļāđāļĒāļāļēāļĒāļāļ§āļēāļĄāđāļāđāļāļŠāđāļ§āļāļāļąāļ§āļāđāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨ āļŠāļģāļŦāļĢāļąāļāļāļđāđāļŠāļĄāļąāļāļĢāļāļēāļ āđāļĨāļ°āļāļđāđāļŠāļĄāļąāļāļĢāđāļāđāļēāļāļķāļāļāļēāļ*..
- Don't forget to 'Like' and 'Follow' our social media channels so you won't miss any news from us. Click.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Compliance, Risk Management, ISO 27001
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop and implement IT governance frameworks, policies, and procedures that align with industry best practices, regulatory requirements, the company and technology team objectives.
- Design and implement controls and mitigation strategies to address identified risks and ensure compliance with relevant regulations and industry standards.
- Collaborate with key stakeholders to identify and document IT governance goals, objectives, and key performance indicators (KPIs) that align with the company and techno ...
- Collaborate with IT and business stakeholders to balance business agility and IT risk.
- Coordinate and participate in audits and assessments to evaluate the effectiveness of IT governance controls and ensure compliance with internal policies and external regulations.
- Monitor and report on the effectiveness of IT governance controls, identify areas for improvement, and recommend appropriate remediation actions.
- Regularly review existing policies and procedures to identify gaps and areas of improvement.
- Maintain a thorough understanding of emerging trends, technologies, and regulatory changes that could impact the company s IT operations and governance.
- Bachelor s degree in Computer Science/Engineering, Information Systems, or IT related field.
- At least 5 years of work experience and 2 years in IT governance, risk management, or IT audit.
- Strong knowledge of IT governance standards and frameworks such as COBIT, ITIL, ISO 27001, etc.
- Solid understanding of cyber security principles and data privacy regulations.
- Exceptional communication skills with the ability to present complex IT concepts to non-technical stakeholders.
- Analytical mindset with strong problem-solving skills and attention to detail.
- Proven project management and leadership skills.
- Familiarity with cloud technologies and their governance requirements.
- Experience in a startup or tech-oriented environment.
- If you are passionate about IT governance and want to make a significant impact in a dynamic startup environment, we would love to hear from you!.
āļāļąāļāļĐāļ°:
Automation, Kubernetes, Compliance, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop IT and digital transformation strategies based on TM Forum s Open Digital Architecture (ODA) and industry best practices..
- Guide TechCo transformation by defining cloud-native architectures, open APIs, and automation frameworks..
- Assess and implement emerging technologies (Cloud, AI, Blockchain, IoT, 5G, Edge Computing) for business impact and competitive advantage..
- Define IT governance, operating models, and technology investment roadmaps to support agile and digital-first operations..
- Cloud & Agile IT Operating Model.
- Drive cloud adoption (AWS, Azure, GCP) and help organizations transition to fully cloud-native, API-driven architectures..
- Enable composable IT architectures, leveraging microservices, Kubernetes, and containerization to enhance flexibility and scalability..
- Implement DevSecOps, CI/CD pipelines, and automation strategies to improve software delivery speed and quality..
- Ensure alignment with TM Forum s Open APIs and best practices for seamless ecosystem integration..
- IT Governance, Risk & Compliance.
- Establish IT governance models aligned with TM Forum TechCo principles..
- Ensure IT strategies support data privacy, security, and regulatory compliance (GDPR, CCPA, cybersecurity standards)..
- Optimize IT cost structures and ensure high ROI on technology investments..
- Stakeholder Engagement & Leadership.
- Collaborate with business, IT, and product teams to bridge gaps between technology strategy and business objectives..
- Engage with TM Forum communities and working groups, contributing to industry-wide digital transformation initiatives..
- Lead technology roadmaps, vendor assessments, and system integrator partnerships to enable TechCo agility..
- Stay ahead of industry trends, emerging digital business models, and technology disruptions..
- 5+ years of experience in IT Strategy, Digital Transformation, Enterprise Architecture, or Technology Consulting..
- Strong knowledge of TM Forum s Open Digital Architecture (ODA), Open APIs, and TechCo transformation frameworks..
- Experience designing cloud-native, API-first architectures for agile digital enterprises..
- Hands-on expertise with cloud platforms (AWS, Azure, GCP), microservices, and AI-driven automation..
- Deep understanding of DevSecOps, CI/CD, and Agile IT methodologies..
- Proven ability to engage with executives, influence technology decisions, and lead large-scale IT transformations..
- Excellent communication, problem-solving, and analytical skills..
- Good written and verbal communication, presentation of both Thai and English skills..
- Bachelor s degree in IT, Computer Science, Engineering, or related field (MBA, Master s, or TM Forum certifications such as Open Digital Framework (ODF) are a plus)..
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Responsible for overall project administration.
- Develop and implement project plans including monitoring of Scope, Time and Cost.
- Coordinate with internal and external teams to ensure project(s) are executed according to the established plan and success.
- Monitor project progress, identify risks, develop mitigation action plan, and timely escalation to report any potential project risks/issues.
- Lead, facilitate meetings, and document minutes of meetings with internal stakeholders.
- Prepare and present regular project status reports.
- Support project manager to prepare presentation to senior management and stakeholders.
- Ensure project documentations are well maintained in organized project repository..
- Bachelor or Master's degree in Computer engineering, Computer science, Information technology or other related fields.
- At least 5 years and proven experience of IT project management as Project manager, PMO lead, and/or Project coordinator.
- Having background and experiences in SAP project(s), Oil/Gas industry or technology sector is preferable.
- Strong coordination, and interpersonal communication skills.
- Can-do attitude, ability to work under pressure and multi-tasking.
- Detailed oriented with strong organizational skills.
- Good command on English communication.
- Proficiency in Microsoft office, AI tool e.g Copilot, Project management software (e.g. MS project, Jira, Excel)..
āļāļąāļāļĐāļ°:
Compliance, Automation, Risk Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and enhance security operations, mentoring team members and implementing advanced security strategies.
- Architect and enforce security frameworks for IT systems, networks, and cloud environments.
- Monitor, detect, and respond to cyber threats, conducting forensic investigations and post-incident analysis.
- Oversee vulnerability management, system hardening, and security compliance.
- Manage identity and access controls, privileged accounts, and authentication mechanisms.
- Drive security automation, process improvements, and adoption of emerging technologies.
- Conduct security awareness training and ensure best practices across the organization.
- Minimum 5+ years of experience in security operations, with a strong focus on incident response, vulnerability management, and risk assessment.
- Proven experience leading incident response efforts and conducting root cause investigations.
- Experience with vulnerability management, and overseeing the security pipeline.
- Experience with security standardization and IT compliance certification and audit.
- Experience with risk management frameworks and methodologies.
- Expert knowledge of security tools, including SIEM, EDR, vulnerability scanners, and penetration testing tools.
- Strong understanding of network protocols, cloud operating systems, and security concepts.
- Strong understanding of security frameworks such as NIST, ISO 27001, and MITRE ATT&CK.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis is a plus.
- Exceptional analytical and problem-solving skills.
- Strong communication and interpersonal skills.
- Ability to work independently and as part of a team.
- Strong attention to detail and a commitment to accuracy.
- Strong documentation and reporting skills.
- Ability to effectively communicate technical risks to non-technical stakeholders.
- Understanding of the 3 lines of defense model is a significant advantage.
- Remark: Given the nature of the mentioned position, where employees are involved with customer data and asset values, and/or the company, to comply with legal and regulatory standards established by the Securities and Exchange Commission, as well as to align with laws and overseeing agencies, the company requires a criminal background check as part of the post-interview process before joining the company. Your criminal history information will be retained for a period of 6 months from the start date..
- Important: Candidate Privacy Policy.
- āļŠāļģāļāļąāļ:āđāļāļĢāļāļāđāļēāļāđāļĨāļ°āļāļģāļāļ§āļēāļĄāđāļāđāļēāđāļ: āļāđāļĒāļāļēāļĒāļāļ§āļēāļĄāđāļāđāļāļŠāđāļ§āļāļāļąāļ§āļāđāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨ āļŠāļģāļŦāļĢāļąāļāļāļđāđāļŠāļĄāļąāļāļĢāļāļēāļ āđāļĨāļ°āļāļđāđāļŠāļĄāļąāļāļĢāđāļāđāļēāļāļķāļāļāļēāļ*.
āļāļąāļāļĐāļ°:
Compliance, Software Development, Finance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead the development and implementation of IT governance, risk, and compliance (GRC) policies and procedures. Conduct risk assessments and develop mitigation strategies to ensure IT operations comply with internal policies and regulatory requirements.
- Oversee the entire SDLC process, ensuring that software development projects meet quality standards.
- Implement ITIL best practices to improve IT service management. Monitor and optimize IT service delivery processes, including incident management, problem management, a ...
- Manage IT change management and incident management processes, ensuring that changes are effectively assessed, implemented, and monitored.
- Collaborate with finance teams to manage IT financial planning, budgeting, and forecasting.
- Education: Bachelor s or Master s degree in Information Technology, Computer Science, or a related field.
- Proven experience in IT governance, risk management, and compliance roles.
- Relevant certifications such as ITIL, CISA, or COBIT are an advantage.
- Strong leadership and communication skills.
- In-depth knowledge of risk management methodologies and frameworks.
- Ability to drive continuous improvement in IT governance and compliance practices.
- Excellent problem-solving and decision-making abilities.
- 1
- 2
- 3
- 4
- 5
- 6
- 16
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2025
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ