āđ€āļ‡āļ·āđˆāļ­āļ™āđ„āļ‚āļāļēāļĢāļ„āđ‰āļ™āļŦāļē

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāđƒāļŠāđ‰āļ„āļģāļŦāļĨāļąāļ

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļŦāļĄāļ§āļ”āļŦāļĄāļđāđˆāļ‡āļēāļ™

āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļ›āļĢāļ°āđ€āļ āļ—āļ˜āļļāļĢāļāļīāļˆ

āđ€āļĨāļ·āļ­āļāļ›āļĢāļ°āđ€āļ āļ—āļ˜āļļāļĢāļāļīāļˆ

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļŠāđˆāļ§āļ‡āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™

āļ•āļąāđ‰āļ‡āđāļ•āđˆ
āļ–āļķāļ‡

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļŠāļ·āđˆāļ­āļšāļĢāļīāļĐāļąāļ—

āļžāļīāļĄāļžāđŒāļŠāļ·āđˆāļ­āļšāļĢāļīāļĐāļąāļ—

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļĢāļ°āļ”āļąāļšāļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™

āđāļŠāļ”āļ‡āļœāļĨ 1 - 20 āļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™ āļˆāļēāļāļ—āļąāđ‰āļ‡āļŦāļĄāļ” 31 āļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™
āđƒāļ™āļŦāļĄāļ§āļ”āļŦāļĄāļđāđˆāļ‡āļēāļ™āļ”āđ‰āļēāļ™ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ
Upload ResumeUpload Resume
āļ­āļąāļžāđ‚āļŦāļĨāļ”āđ€āļĢāļ‹āļđāđ€āļĄāđˆāļ‚āļ­āļ‡āļ„āļļāļ“ AI āļ‚āļ­āļ‡āđ€āļĢāļēāļˆāļ°āļ§āļīāđ€āļ„āļĢāļēāļ°āļŦāđŒāđāļĨāļ°āđāļ™āļ°āļ™āļģāļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™āļ—āļĩāđˆāļ”āļĩāļ—āļĩāđˆāļŠāļļāļ”āđƒāļŦāđ‰āļ„āļļāļ“
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ›āļ•āļ— āļŠāļģāļĢāļ§āļˆāđāļĨāļ°āļœāļĨāļīāļ•āļ›āļīāđ‚āļ•āļĢāđ€āļĨāļĩāļĒāļĄ āļˆāļģāļāļąāļ” āļĄāļŦāļēāļŠāļ™ 1
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ›āļ•āļ— āļŠāļģāļĢāļ§āļˆāđāļĨāļ°āļœāļĨāļīāļ•āļ›āļīāđ‚āļ•āļĢāđ€āļĨāļĩāļĒāļĄ āļˆāļģāļāļąāļ” āļĄāļŦāļēāļŠāļ™ 1

āļ—āļąāļāļĐāļ°:

Procurement, Cost Estimation, Budgeting

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Work under supervision to support engineering works in every asset life cycle including but not limited to concept selection, basic / detailed engineering, construction engineering, procurement support, operations and maintenance support, and decommissioning.
  • Be present onsite or at the vendor/contractor premise to perform investigation, troubleshooting, audit, site survey, commissioning and/or acceptance test.
  • Perform engineering studies which involves engineering calculation, cost estimation, ...
āļ§āļąāļ™āļ™āļĩāđ‰
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļžāļĩāļ—āļĩāļˆāļĩ 2
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļžāļĩāļ—āļĩāļˆāļĩ 2

āļ—āļąāļāļĐāļ°:

ISO 27001

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Protect the organization's computer networks and systems against a range of cyber threats, such as hacking attempts, data breaches, and different types of cyber attacks. The
  • responsibilities of this role include creating, deploying, and overseeing security strategies and technologies to defend the organization IT security.
  • Lead the strategic direction, development, and implementation of cybersecurity solutions and practices to protect the organization from sophisticated cyber threats and ...
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāđ€āļšāļŸ 3
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāđ€āļšāļŸ 3
āļˆāļ•āļļāļˆāļąāļāļĢ, āļāļĢāļļāļ‡āđ€āļ—āļž, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ—āļąāļāļĐāļ°:

Data Analysis

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • āļ›āļāļīāļšāļąāļ•āļīāļ‡āļēāļ™āļ•āļĢāļ§āļˆāļŠāļ­āļšāļ”āđ‰āļēāļ™āļŠāļēāļĢāļŠāļ™āđ€āļ—āļĻāļ•āļēāļĄāļ—āļĩāđˆāđ„āļ”āđ‰āļĢāļąāļšāļĄāļ­āļšāļŦāļĄāļēāļĒ āđāļĨāļ°āļŠāļ™āļąāļšāļŠāļ™āļļāļ™āđƒāļŦāđ‰āļ‡āļēāļ™āļ•āļĢāļ§āļˆāļŠāļ­āļšāļŠāļģāđ€āļĢāđ‡āļˆāļ•āļēāļĄāļĢāļ°āļĒāļ°āđ€āļ§āļĨāļēāļ—āļĩāđˆāļāļģāļŦāļ™āļ”.
  • āļ›āļāļīāļšāļąāļ•āļīāļ‡āļēāļ™āđ‚āļ”āļĒāđƒāļŠāđ‰āđ€āļ—āļ„āļ™āļīāļ„āđāļĨāļ°āļ§āļīāļ˜āļĩāļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļšāļ—āļĩāđˆāđ€āļŦāļĄāļēāļ°āļŠāļĄ āđƒāļŦāđ‰āļŠāļ­āļ”āļ„āļĨāđ‰āļ­āļ‡āļ•āļēāļĄāđāļ™āļ§āļ—āļēāļ‡āļāļēāļĢāļ•āļĢāļ§āļŠāļ­āļšāļ—āļĩāđˆāđ„āļ”āđ‰āļĢāļąāļšāļāļēāļĢāđ€āļŦāđ‡āļ™āļŠāļ­āļš āđāļĨāļ°āļ•āļēāļĄāļĄāļēāļ•āļĢāļāļēāļ™āļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļšāļ āļēāļĒāđƒāļ™ āđ€āļžāļ·āđˆāļ­āđƒāļŦāđ‰āđ„āļ”āđ‰āļœāļĨāļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļšāļšāļĢāļĢāļĨāļļāļ•āļēāļĄāļ§āļąāļ•āļ–āļļāļ›āļĢāļ°āļŠāļ‡āļ„āđŒ.
  • āļˆāļąāļ”āļ—āļģāļāļĢāļ°āļ”āļēāļĐāļ—āļģāļāļēāļĢ (Working Papers) āđ€āļžāļ·āđˆāļ­āļšāļąāļ™āļ—āļķāļāļ‚āļąāđ‰āļ™āļ•āļ­āļ™āđāļĨāļ°āļœāļĨāļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļš.
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāđ€āļšāļŸ 4
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāđ€āļšāļŸ 4
āļˆāļ•āļļāļˆāļąāļāļĢ, āļāļĢāļļāļ‡āđ€āļ—āļž, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ—āļąāļāļĐāļ°:

Data Analysis

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • āļˆāļąāļ”āļ—āļģāđāļœāļ™āļāļēāļĢāļ›āļāļīāļšāļąāļ•āļīāļ‡āļēāļ™āļ•āļĢāļ§āļˆāļŠāļ­āļš (Audit Schedule) āđāļ™āļ§āļ—āļēāļ‡āļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļš (Audit Program) āđ€āļžāļ·āđˆāļ­āļāļģāļŦāļ™āļ”āļ‚āļ­āļšāđ€āļ‚āļ•āļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļš.
  • āļ›āļŽāļīāļšāļąāļ•āļīāļ‡āļēāļ™āļ•āļĢāļ§āļˆāļŠāļ­āļšāđƒāļŦāđ‰āļšāļĢāļĢāļĨāļļāļ§āļąāļ•āļ–āļļāļ›āļĢāļ°āļŠāļ‡āļ„āđŒāļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļšāđāļĨāļ°āđ€āļ›āđ‡āļ™āđ„āļ›āļ•āļēāļĄāļĄāļēāļ•āļĢāļāļēāļ™āļŠāļēāļāļĨāļāļēāļĢāļ›āļĢāļ°āļāļ­āļšāļ§āļīāļŠāļēāļŠāļĩāļžāļ•āļĢāļ§āļˆāļŠāļ­āļšāļ āļēāļĒāđƒāļ™.
  • āļĄāļ­āļšāļŦāļĄāļēāļĒ āļ„āļ§āļšāļ„āļļāļĄāđāļĨāļ°āļŠāļ­āļšāļ—āļēāļ™āļāļēāļĢāļ›āļāļīāļšāļąāļ•āļīāļ‡āļēāļ™āļ‚āļ­āļ‡āļœāļđāđ‰āđƒāļ•āđ‰āļšāļąāļ‡āļ„āļąāļšāļšāļąāļāļŠāļē āđ€āļžāļ·āđˆāļ­āđƒāļŦāđ‰āļāļēāļĢāļ›āļāļīāļšāļąāļ•āļīāļ‡āļēāļ™āļšāļĢāļĢāļĨāļļāļ§āļąāļ•āļ–āļļāļ›āļĢāļ°āļŠāļ‡āļ„āđŒāļāļēāļĢāļ•āļĢāļ§āļˆāļŠāļ­āļšāđāļĨāļ°āđ€āļ›āđ‡āļ™āđ„āļ›āļ•āļēāļĄāļĄāļēāļ•āļĢāļāļēāļ™āļŠāļēāļāļĨāļāļēāļĢāļ›āļĢāļ°āļāļ­āļšāļ§āļīāļŠāļēāļŠāļĩāļžāļ•āļĢāļ§āļˆāļŠāļ­āļšāļ āļēāļĒāđƒāļ™.
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ‚āļĨāļ•āļąāļŠ 5
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ‚āļĨāļ•āļąāļŠ 5

āļ—āļąāļāļĐāļ°:

Compliance

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • User Identity Management: Overseeing the creation, modification, and removal of user accounts and access rights within the CP axtra's IAM system.
  • Access Reviews and Audits: Conducting regular access reviews and audits to ensure compliance with security standards and regulatory requirements.
  • Worked closely with Human Resources and Business team to address and resolve employee issues.
5 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļīāļ—āļ„āļąāļš āļ­āļ­āļ™āđ„āļĨāļ™āđŒ 6
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļīāļ—āļ„āļąāļš āļ­āļ­āļ™āđ„āļĨāļ™āđŒ 6
āļ„āļĨāļ­āļ‡āđ€āļ•āļĒ, āļāļĢāļļāļ‡āđ€āļ—āļž, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ—āļąāļāļĐāļ°:

Compliance, Assurance, Project Management

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Define the goal of IT risk and develop activities and action plans to achieve this goal.
  • Builds strong relationships and interacts with the board and senior management.
  • Possess leadership presence to promote risk culture, train and motivate staff to adopt new risk management practices.
13 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āļ•āļīāđŠāļāļ•āđŠāļ­āļ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 7
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āļ•āļīāđŠāļāļ•āđŠāļ­āļ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 7

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • TikTok is the leading destination for short-form mobile video. At TikTok, our mission is to inspire creativity and bring joy. TikTok's global headquarters are in Los Angeles and Singapore, and its offices include New York, London, Dublin, Paris, Berlin, Dubai, Jakarta, Seoul, and Tokyo.
  • Why Join Us.
  • Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
23 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāđŠāļ­āļŠāļĒāļēāļ™āļĒāļ™āļ•āđŒ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 8
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāđŠāļ­āļŠāļĒāļēāļ™āļĒāļ™āļ•āđŒ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 8

āļ—āļąāļāļĐāļ°:

Compliance, Legal, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Driving PSMS (physical security management system) at local level within the framework of C/AUP governance (incl. Site Security Concept process & consulting of local management).
  • Monitoring of adequate implementation of local risk mitigation measures (incl. security services delivered by GR/SES).
  • Conducting security investigations at local level & support internal investigations (Compliance) on request.
āļ§āļąāļ™āļ™āļĩāđ‰
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āļ•āļīāđŠāļāļ•āđŠāļ­āļ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 9
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āļ•āļīāđŠāļāļ•āđŠāļ­āļ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 9

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • About TikTok.
  • TikTok will be prioritizing applicants who have a current right to work in Singapore, and do not require TikTok sponsorship of a visa.
  • TikTok is the leading destination for short-form mobile video. At TikTok, our mission is to inspire creativity and bring joy. TikTok's global headquarters are in Los Angeles and Singapore, and its offices include New York, London, Dublin, Paris, Berlin, Dubai, Jakarta, Seoul, and Tokyo.
23 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 10
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 10

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

1 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Risk Management, Compliance, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Invite and provide evidence-based feedback in a timely and constructive manner.
  • Share and collaborate effectively with others.
  • Work with existing processes/systems whilst making constructive suggestions for improvements.
āļ§āļąāļ™āļ™āļĩāđ‰
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
Upload ResumeUpload Resume
āļ­āļąāļžāđ‚āļŦāļĨāļ”āđ€āļĢāļ‹āļđāđ€āļĄāđˆāļ‚āļ­āļ‡āļ„āļļāļ“ AI āļ‚āļ­āļ‡āđ€āļĢāļēāļˆāļ°āļ§āļīāđ€āļ„āļĢāļēāļ°āļŦāđŒāđāļĨāļ°āđāļ™āļ°āļ™āļģāļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™āļ—āļĩāđˆāļ”āļĩāļ—āļĩāđˆāļŠāļļāļ”āđƒāļŦāđ‰āļ„āļļāļ“
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ­āđ„āļ­āđ€āļ­āļŠ 11
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ­āđ„āļ­āđ€āļ­āļŠ 11

āļ—āļąāļāļĐāļ°:

Project Management, Linux, UNIX, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Manage CCII (Cloud, Cyber Security, IOT, ICT) project for single and multi-tower solution for Property, Retail, Conglomerate, and international customer segments.
  • Be a committee of AIS bid management for validating large projects at TCV > 10MB.
  • Manage project stakeholders to meet expectation and requirement.
2 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ 12
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ 12

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

3 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Accounting, Legal, Financial Analysis, Risk Management, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŋ60,000 - āļŋ80,000

  • Conduct an investigation of any matter, value or size at its sole discretion according to the Fraud Risk policy, to assist the Audit Committee / Board of Directors in obtaining the assurance it requires regarding the identified gaps, internal control deficiencies, modus operandi employed and the extent and impact of such fraudulent activities to the CIMB Thai Bank Group.
  • Prepare and deliver timely and informative investigation reports in English to an agreed quality standard.
5 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 13
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 13

āļ—āļąāļāļĐāļ°:

Linux, Good Communication Skills, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
  • Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
  • Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
āļ§āļąāļ™āļ™āļĩāđ‰
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 14
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 14

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

5 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Risk Management, Project Management, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Oversee the planning, execution, and monitoring of security-related projects.
  • Coordinate with cross-functional teams to ensure successful project delivery.
  • Develop project plans, schedules, and budgets, and track progress against established objectives.
āļ§āļąāļ™āļ™āļĩāđ‰
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 15
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 15

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

4 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Compliance, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Establish and maintain IT security standards and guidelines in compliance with the security regulations from regulators, and the security best practices, that governs new technology adoption.
  • Advise business units and technology group on how to comply with IT security policy, standards, guidelines and best practices.
  • Keep abreast of the knowledge in cybersecurity, new digital technology.
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļŸāļēāļŠāļ•āđŒāđ€āļ§āļīāļĢāđŒāļ„ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 16
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļŸāļēāļŠāļ•āđŒāđ€āļ§āļīāļĢāđŒāļ„ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 16

āļ—āļąāļāļĐāļ°:

Risk Management, Software Development, Kubernetes

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
  • Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
  • Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
1 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ‹āļīāđ€āļĨāļ‹āļ•āļīāļāļē 17
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ‹āļīāđ€āļĨāļ‹āļ•āļīāļāļē 17

āļ—āļąāļāļĐāļ°:

Project Management

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Responsible for the protection of Celestica assets and to respond to alarms, emergency situations and to assist employees with security issue as part of our mission to provide a safe work environment.
  • Responsible for maintaining appropriate access to all areas of the facility for both employees and customers.
  • Controlling daily security operations including incident investigation, property passes, loss prevention, and all administrative duties required at the site.
6 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 18
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 18

āļ—āļąāļāļĐāļ°:

Research, Automation, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
  • Support on implementing and running DevSecOP operation.
  • Keep abreast of the knowledge in cybersecurity, new digital technology and CI/CD area.
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 19
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 19

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

8 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Business Development, Assurance, Software Development, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Provide integrated services focused on IT security related to help clients develop a vision for their cybersecurity and privacy program.
  • Design and build a sustainable and agile Cybersecurity program in responding to changes as a part of economic and business development where IT and Cyber are catalyst.
  • Operate aspects of the program and provide an independent review and assurance of their program to Management or 3rd party stakeholders.
āļ§āļąāļ™āļ™āļĩāđ‰
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ­āļīāļ™āļŠāđŒāļ— āđāļ­āļ™āļ”āđŒ āļĒāļąāļ‡ 20
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ­āļīāļ™āļŠāđŒāļ— āđāļ­āļ™āļ”āđŒ āļĒāļąāļ‡ 20

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

2 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Network Infrastructure, Security Design, Big Data, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
  • Work on IT security design, analysis and implementation of security protection solution.
  • Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
5 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŠāđˆāļ‡āđāļˆāđ‰āļ‡āđ€āļ•āļ·āļ­āļ™āļ‡āļēāļ™āđƒāļŦāļĄāđˆāļĨāđˆāļēāļŠāļļāļ”āļŠāļģāļŦāļĢāļąāļšāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ
  • 1
  • 2
close
āļĨāļ‡āļ—āļ°āđ€āļšāļĩāļĒāļ™āļāļąāļš WorkVenture āđ€āļžāļ·āđˆāļ­āļ„āđ‰āļ™āļŦāļēāļ‡āļēāļ™āđƒāļŦāļĄāđˆāļĨāđˆāļēāļŠāļļāļ”āđāļĨāļ°āļ­āđˆāļēāļ™āļĢāļĩāļ§āļīāļ§āļšāļĢāļīāļĐāļąāļ—āļˆāļēāļāļœāļđāđ‰āļ—āļģāļ‡āļēāļ™āļˆāļĢāļīāļ‡