- No elements found. Consider changing the search query.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Identify and assess potential hazards and risks in the workplace.
- Develop and implement strategies to eliminate or control those risks.
- Conduct regular inspections and audits to ensure compliance with safety standards.
- Ensure that all policies and procedures are up-to-date and compliant with relevant regulations.
- Provide training to employees on health and safety procedures and regulations.
- Investigate workplace incidents and accidents to determine root causes.
- Assist with emergency response during actual incidents.
- Requirements: Bachelor's degree in Occupational Health & Safety or a related field, graduate with adequate *HSE qualifications/accreditation.
- 3-5 years of work experience in as HSE professional.
- Experience in delivering HSE training, performing HSE audits and incident investigation.
- Excellent communication, leadership, and problem-solving skills.
- Strong knowledge of local and international HSE regulations and best practices.
- Able to work with limited supervision and deliver results within challenging deadlines and under pressure.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Implement, configure, and maintain cybersecurity tools including SIEM, EDR/XDR, and network security solutions.
- Monitor, analyze, and respond to security alerts and incidents.
- Perform log monitoring and security event analysis to detect suspicious or malicious activities.
- Collaborate with IT Infrastructure and Application teams to implement security controls and best practices.
- Perform tuning and optimization of security tools to improve detection accuracy and reduce false positives.
- Conduct vulnerability assessments and support remediation activities.
- Develop and maintain technical documentation, standard operating procedures, playbook, and security guidelines.
- Support incident investigation, forensic analysis, and root cause analysis activities..
- Bachelor s degree in Information Technology, Computer Science, Cybersecurity, or related field.
- 2-5 years of experience in cybersecurity or IT security roles.
- o SIEM platforms
- o Endpoint Detection & Response solutions (e.g., SentinelOne, CrowdStrike)
- o Firewall and Network Security solutions (e.g., Palo Alto)
- Strong understanding of networking, operating systems, and security architecture.
- Strong analytical and problem-solving skills.
- Good teamwork and communication skills.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and oversee Security Operations Center (SOC) activities.
- Manage and coordinate incident response processes across the organization.
- Develop and maintain incident response playbooks and procedures.
- Perform threat intelligence analysis and monitor evolving cyber threat landscapes.
- Conduct security risk analysis and recommend mitigation strategies.
- Collaborate with IT, Risk, Compliance, and Business Units to enhance cybersecurity posture.
- Provide strategic cybersecurity guidance and recommendations to management.
- Mentor and coach SOC and Incident Response team members.
- Support internal and external security audits and compliance activities..
- Bachelor s degree or higher in Cybersecurity, Information Technology, or related field.
- Minimum 7 years of experience in cybersecurity roles.
- Proven experience managing SOC or Incident Response teams.
- Strong knowledge of threat detection, incident handling, and digital forensics.
- Strong understanding of security frameworks and standards such as ISO 27001, NIST, and MITRE ATT&CK.
- Strong analytical, investigative, and problem-solving skills.
- Leadership and team management capabilities.
āļāļąāļāļĐāļ°:
Legal, Safety Management, Excel
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Serve as the primary contact for employee emergency cases across APAC, coordinating directly with the GP&S SOC.
- Manage escalations from Employee Relations, HR, Workplace, and other internal partners.
- Lead crisis readiness initiatives, including training and Behavioral Threat Assessment Team (BTAT) operations.
- Build strong partnerships with ER, Legal, HR, Workplace, IT, and Travel to ensure effective crisis response.
- Maintain accurate incident reporting and identify trends requiring additional support or resources.
- Work closely with Regional Protective Services Managers to support employee-related crises and related security implications.
- Ensure all actions align with Accenture policies and standards.
- QualificationsBachelor s degree in Security/Safety Management, Risk or Crisis Management, Behavioral Science, or related field.
- 10+ years of crisis/emergency response experience, including 5+ years in behavioral threat assessment.
- 3+ years working with corporate support functions (HR, ER, Legal, Workplace).
- Proficient in Microsoft Word, Excel, and PowerPoint.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Excellent organization, analytical, and communication skills.
- Calm under pressure with the ability to provide clear guidance in stressful situations.
- Strong stakeholder management and relationship building skills.
- High ethics, integrity, and ability to handle highly confidential information.
- Able to shift priorities quickly and meet time sensitive deadlines.
- Comfortable with ambiguity and able to drive clarity.
- ASIS CPP, PSP, and CPI are considered a plus.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļĨāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļ āļāđāļāļāļāļąāļ āļāļĢāļĢāđāļāļē āđāļĨāļ°āļŠāļāļąāļāļāļąāđāļāļāļēāļĢāļāļļāļāļĢāļīāļ āļĢāļ§āļĄāļāļķāļāļāļēāļĢāļāļĒāļēāļĒāļāļĨāļāļĢāļ§āļāļŠāļāļāļāļĩāđāļĄāļĩāđāļāļ§āđāļāđāļĄāļāļļāļāļĢāļīāļ āđāļāļ·āđāļāļĄāļīāđāļŦāđāđāļāļīāļāļāļ§āļēāļĄāđāļŠāļĩāļĒāļŦāļēāļĒāđāļāđāļāļāļēāļāļēāļĢāđāļĨāļ°āļĨāļđāļāļāđāļēāđāļāļāļĢāļ°āđāļāđāļāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļēāļāļāļēāļĢāđāļāļīāļ.
- āļ§āļļāļāļīāļāļēāļĢāļĻāļķāļāļĐāļē āļĢāļ°āļāļąāļāļāļĢāļīāļāļāļēāļāļĢāļĩāļāļķāđāļāđāļ āļāđāļēāļāļāļĢāļīāļŦāļēāļĢāļāļļāļĢāļāļīāļ āļāļēāļĢāļāļąāļāļāļĩ āļāļēāļĢāđāļāļīāļ āđāļĻāļĢāļĐāļāļĻāļēāļŠāļāļĢāđ āļāļīāļāļīāļĻāļēāļŠāļāļĢāđ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ āļāđāļēāļ Fraud Application āļāļąāđāļāđāļāļāđāļēāļ Retail āđāļĨāļ° Non-Retail.
- āļĄāļĩāļāļ§āļēāļĄāļĨāļ°āđāļāļĩāļĒāļāļĢāļāļāļāļāļ āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāļāļĢāļ§āļāļŠāļāļāļāđāļāļĄāļđāļĨāđāļāļīāļāļĨāļķāļāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļāļąāļāļĐāļ°āļāļēāļĢāđāļāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļāļĒāļđāđāđāļāđāļāļāļāđāļāļĩ.
- āļāļąāļāļĐāļ°āļ āļēāļĐāļēāļāļąāļāļāļĪāļĐ āļāļĒāļđāđāđāļāđāļāļāļāđāļāļĩ.
- āļāļāļķāđāļ āļāļāļēāļāļēāļĢāļāļāļŠāļāļ§āļāļŠāļīāļāļāļīāđāđāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāļāļąāļāđāļĨāļ·āļāļāļāļđāđāļāļĩāđāļĄāļĩāļāļļāļāļŠāļĄāļāļąāļāļīāđāļŦāļĄāļēāļ°āļŠāļĄāļāļĢāļāļāļēāļĄāļāļĩāđāļāļāļēāļāļēāļĢāļāđāļāļāļāļēāļĢ āļāļąāđāļāļāļĩāđāđāļāļ·āđāļāļāļĢāļ°āđāļĒāļāļāđāđāļāļĒāļĢāļ§āļĄāļāļāļāļāļāļēāļāļēāļĢ āđāļĨāļ°āđāļāļ·āđāļāđāļāđāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨāđāļŦāđāđāļāļīāļāļāļĢāļ°āđāļĒāļāļāđāļŠāļđāļāļŠāļļāļāļāđāļāđāļ.
- āļāđāļēāļāđāļāđāļāđāļēāļāđāļĨāļ°āļĻāļķāļāļĐāļēāļāđāļĒāļāļēāļĒāļāļ§āļēāļĄāđāļāđāļāļŠāđāļ§āļāļāļąāļ§āļāļāļāļāļāļēāļāļēāļĢāļāļĢāļļāļāđāļāļĒ āļāļģāļāļąāļ (āļĄāļŦāļēāļāļ) āļāļĩāđ https://krungthai.com/th/content/privacy-policy āļāļąāđāļāļāļĩāđ āļāļāļēāļāļēāļĢāđāļĄāđāļĄāļĩāđāļāļāļāļēāļŦāļĢāļ·āļāļāļ§āļēāļĄāļāļģāđāļāđāļāđāļāđ āļāļĩāđāļāļ°āļāļĢāļ°āļĄāļ§āļĨāļāļĨāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļāđāļāļāđāļŦāļ§ āļĢāļ§āļĄāļāļķāļāļāđāļāļĄāļđāļĨāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļĻāļēāļŠāļāļēāđāļĨāļ°/āļŦāļĢāļ·āļāļŦāļĄāļđāđāđāļĨāļŦāļīāļ āļāļķāđāļāļāļēāļāļāļĢāļēāļāļāļāļĒāļđāđāđāļāļŠāļģāđāļāļēāļāļąāļāļĢāļāļĢāļ°āļāļģāļāļąāļ§āļāļĢāļ°āļāļēāļāļāļāļāļāļāđāļēāļāđāļāđāļāļĒāđāļēāļāđāļ āļāļąāļāļāļąāđāļ āļāļĢāļļāļāļēāļāļĒāđāļēāļāļąāļāđāļŦāļĨāļāđāļāļāļŠāļēāļĢāđāļāđ āļĢāļ§āļĄāļāļķāļāļŠāļģāđāļāļēāļāļąāļāļĢāļāļĢāļ°āļāļģāļāļąāļ§āļāļĢāļ°āļāļēāļāļ āļŦāļĢāļ·āļāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļāđāļāļāđāļŦāļ§āļŦāļĢāļ·āļāļāđāļāļĄāļđāļĨāļāļ·āđāļāđāļ āļāļķāđāļāđāļĄāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļŦāļĢāļ·āļāđāļĄāđāļāļģāđāļāđāļāļŠāļģāļŦāļĢāļąāļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāđāļāļāļēāļĢāļŠāļĄāļąāļāļĢāļāļēāļāđāļ§āđāļāļāđāļ§āđāļāđāļāļāđ āļāļāļāļāļēāļāļāļĩāđ āļāļĢāļļāļāļēāļāļģāđāļāļīāļāļāļēāļĢāđāļŦāđāđāļāđāđāļāļ§āđāļēāđāļāđāļāļģāđāļāļīāļāļāļēāļĢāļĨāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļāđāļāļāđāļŦāļ§ (āļāđāļēāļĄāļĩ) āļāļāļāļāļēāļāđāļĢāļāļđāđāļĄāđāđāļĨāļ°āđāļāļāļŠāļēāļĢāļāļ·āđāļāđāļāļāđāļāļāļāļĩāđāļāļ°āļāļąāļāđāļŦāļĨāļāđāļāļāļŠāļēāļĢāļāļąāļāļāļĨāđāļēāļ§āđāļ§āđāļāļāđāļ§āđāļāđāļāļāđāđāļĨāđāļ§āļāđāļ§āļĒ āļāļąāđāļāļāļĩāđ āļāļāļēāļāļēāļĢāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāļāđāļāļāđāļāđāļāļĢāļ§āļāļĢāļ§āļĄāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāđāļēāļāđāļāļ·āđāļāļāļĢāļĢāļĨāļļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāđāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāļĢāļąāļāļāļļāļāļāļĨāđāļāđāļēāļāļģāļāļēāļ āļŦāļĢāļ·āļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļļāļāļŠāļĄāļāļąāļāļī āļĨāļąāļāļĐāļāļ°āļāđāļāļāļŦāđāļēāļĄ āļŦāļĢāļ·āļāļāļīāļāļēāļĢāļāļēāļāļ§āļēāļĄāđāļŦāļĄāļēāļ°āļŠāļĄāļāļāļāļāļļāļāļāļĨāļāļĩāđāļāļ°āđāļŦāđāļāļģāļĢāļāļāļģāđāļŦāļāđāļ āļāļķāđāļāļāļēāļĢāđāļŦāđāļāļ§āļēāļĄāļĒāļīāļāļĒāļāļĄāđāļāļ·āđāļāđāļāđāļāļĢāļ§āļāļĢāļ§āļĄ āđāļāđ āļŦāļĢāļ·āļāđāļāļīāļāđāļāļĒāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāđāļēāļāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāļŠāļģāļŦāļĢāļąāļāļāļēāļĢāđāļāđāļēāļāļģāļŠāļąāļāļāļēāđāļĨāļ°āļāļēāļĢāđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāļāļēāļĄāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāļāļąāļāļāļĨāđāļēāļ§āļāđāļēāļāļāđāļ āđāļāļāļĢāļāļĩāļāļĩāđāļāđāļēāļāđāļĄāđāđāļŦāđāļāļ§āļēāļĄāļĒāļīāļāļĒāļāļĄāđāļāļāļēāļĢāđāļāđāļāļĢāļ§āļāļĢāļ§āļĄ āđāļāđ āļŦāļĢāļ·āļāđāļāļīāļāđāļāļĒāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄ āļŦāļĢāļ·āļāļĄāļĩāļāļēāļĢāļāļāļāļāļ§āļēāļĄāļĒāļīāļāļĒāļāļĄāđāļāļ āļēāļĒāļŦāļĨāļąāļ āļāļāļēāļāļēāļĢāļāļēāļāđāļĄāđāļŠāļēāļĄāļēāļĢāļāļāļģāđāļāļīāļāļāļēāļĢāđāļāļ·āđāļāļāļĢāļĢāļĨāļļāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđāļāļąāļāļāļĨāđāļēāļ§āļāđāļēāļāļāđāļāđāļāđ āđāļĨāļ°āļāļēāļ āļāļģāđāļŦāđāļāđāļēāļāļŠāļđāļāđāļŠāļĩāļĒāđāļāļāļēāļŠāđāļāļāļēāļĢāđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāļĢāļąāļāđāļāđāļēāļāļģāļāļēāļāļāļąāļāļāļāļēāļāļēāļĢ.
āļāļąāļāļĐāļ°:
Industry trends, Cloud Computing, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Provide consultancy advice to business and project teams to ensure security standards and requirements are considered and implemented.
- Perform deep dive reviews focused on Cybersecurity Risk, Technology Risk, and Emerging Risk.
- Effective management of all technology risk and cybersecurity framework including technology policies and standards based on the Group's risk appetite.
- Closely monitor technology and cyber related KPIs, KRIs, KCIs and drive remediation actions as Group perspective.
- Timely update on all material technology risk and cybersecurity topics including a set of risk indicators to the relevant Group Risk Committees and forums.
- Oversight the result of control testing from subsidiaries to ensure Cybersecurity and technology controls meet internal and external compliance requirements.
- Conduct technology risk assessments: Identify and evaluate potential risks Management with the organization's technology systems, infrastructure, and processes. Assess the adequacy of controls, identify vulnerabilities, and recommend risk mitigation strategies.
- Develop and implement risk management strategies: Collaborate with stakeholders to develop comprehensive risk management strategies that align with business objectives and regulatory requirements. Implement controls and procedures to mitigate identified risks effectively.
- Monitor technology risk exposure: Continuously monitor technology systems, networks, and processes to identify emerging risks, vulnerabilities, and trends. Stay up-to-date with industry developments, emerging technologies, and regulatory changes to proactively address potential risks.
- Perform risk analysis and reporting: Analyze risk assessment findings, internal control evaluations, and audit reports to identify trends, root causes, and areas of improvement. Prepare detailed reports on risk exposure, mitigation strategies, and recommendations for management and relevant stakeholders.
- Collaborate with cross-functional teams: Work closely with IT teams, compliance officers, cybersecurity professionals, and other stakeholders to develop and implement risk management frameworks, policies, and procedures. Provide guidance and recommendations on technology-related risk management activities.
- Conduct technology risk training and awareness programs: Develop and deliver training programs to educate employees on technology risk management best practices, policies, and procedures. Raise awareness about emerging threats and provide guidance on incident response protocols.
- Assist in incident response and recovery: Support the organization in managing technology-related incidents, including data breaches, system failures, and cybersecurity threats. Coordinate response efforts, assist in recovery measures, and contribute to post-incident reviews and lessons learned.
- Stay updated on industry standards and regulations: Keep abreast of industry trends, emerging technologies, and regulatory requirements related to technology risk management. Provide recommendations on incorporating best practices into the organization's risk management framework.
- Minimum of 5 years experience in Technology and Cyber Risk.
- Bachelor s degree or above in related discipline.
- Working experience or familiar in a group public company.
- Understanding of regulatory requirements such as BOT, OIC, and SEC; industry standards such as COBIT, NIST, ISO27001, ITIL, and PCIDSS.
- Experience in one or more emerging technologies such as Artificial Intelligence, Machine Learning, Distributed Ledger Technology, Robotic Process Automation, Cloud computing.
- Excellent communication and relationship building skills; proven ability to influence senior management.
- Good command of written and spoken in English is preferable.
āļāļąāļāļĐāļ°:
Linux, Good Communication Skills, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāļąāļāļāļāļąāļāļāļēāļāļāļļāļāļāļāļāļĒāđāļēāļāđāļāđāļēāđāļāļĩāļĒāļĄ āļāļĨāļđāļāļāļąāļāđāļŦāđāļāļļāļāļāļāļĒāļķāļāļĄāļąāđāļāđāļāļāļēāļĢāļāļĢāļ°āļāļāļāļŠāļąāļĄāļĄāļēāļāļĩāļ āļāļĒāđāļēāļāļĄāļĩāļāļĢāļĢāļĐāļąāļāļ āļīāļāļēāļĨāļāļĩāđāļāļĩ.
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāđāļāļāļēāļĢāļāļąāļāļāļēāļĻāļąāļāļĒāļ āļēāļāļāļāļąāļāļāļēāļāđāļāļāļļāļāđ āļāđāļēāļ āļāđāļ§āļĒāđāļāļĢāđāļāļĢāļĄāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāļļāļāļ āļēāļāđāļŦāđāđāļŦāļĄāļēāļ°āļŠāļĄāļāļąāļāđāļāđāļĨāļ°āļāļ āđāļāļ·āđāļāļĒāļāļĢāļ°āļāļąāļāļāļēāļĢāļāļģāļāļēāļāļāļāļāļāļāļąāļāļāļēāļāļāļĒāđāļēāļāļĄāļ·āļāļāļēāļāļĩāļ.
- āļŠāļģāļāļąāļāļāļēāļāđāļŦāļāđāļāļāļāļāļēāļāļāļēāļ āļāļđāļāļāļāļāđāļāļāđāļŦāđāđāļāđāļ Smart Office and Smart Display Solution āļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļŦāļĢāļđāļŦāļĢāļē āļāļąāļāļŠāļĄāļąāļĒ āđāļĨāļ°āļāļĢāļ°āļŦāļĒāļąāļāļāļĨāļąāļāļāļēāļ.
- āļāļ§āļēāļĄāļāļāļāļļāđāļāđāļāļāļāļĩāđāļāđāļāļ āļāļ·āļāļŦāļąāļ§āđāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļāļąāļāļāļēāļāđāļŦāļĄāđāļāļĩāđāļāđāļēāļ§āđāļāđāļēāļĄāļēāđāļāļāļĢāļāļāļāļĢāļąāļ§āļāļāļāđāļĢāļē.
- āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļāļāļēāļĢāļāļģāļāļēāļāļĒāļąāļāđāļāđāļāļāļĩāļāļŦāļāļķāđāļāļŠāļīāđāļāļāļĩāđāļŠāļģāļāļąāļāļŠāļđāļāļŠāļļāļāļāļāļāļāļļāļĢāļāļīāļāļāļīāđāļāļĢāđāļĨāļĩāļĒāļĄ āļāļąāļāļāļąāđāļāļāļāļąāļāļāļēāļāļāļēāļāļāļēāļāļāļļāļāļāļāļāļķāļāļāđāļāļāļāđāļēāļāļāļēāļĢāļāļāļĢāļĄāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļĨāļ°āļāļēāļāļĩāļ§āļāļāļēāļĄāļąāļĒāļāļĒāđāļēāļāđāļāđāļĄāļāđāļ.
- āļāļāļąāļāļāļēāļāļŠāļāļēāļĒāđāļāđāļāđāļāļąāļāđāļāļĢāđāļāļĢāļĄāļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ OPD/IPD āđāļĨāļ°āđāļĢāļēāļĒāļąāļāđāļŦāđāđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāđāļēāļĢāļąāļāļĐāļēāļāļĒāļēāļāļēāļĨāļŠāļģāļŦāļĢāļąāļāļāļļāļāļāļēāļĢāļĩ.
- Work life balance āļāļ·āļāļŠāļīāđāļāļŠāļģāļāļąāļ āđāļ§āļĨāļēāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāļĒāļ·āļāļŦāļĒāļļāđāļāļāļģāđāļŦāđāļāļļāļāļāļąāļāļŠāļĢāļĢāđāļ§āļĨāļēāđāļāđāļāļĒāđāļēāļāļĨāļāļāļąāļ§.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement and maintain enterprise network support business solutions
- Installing, configuring, designing and support LANs, WANs, WLAN, Firewall, Telephone, Internet and datacenter systems (Cisco, HPE, Palo Auto, Fortinet, ETC.)
- Participation in the documentation processes including network diagrams, staff contacts, vendor contacts, utilization of monitoring/resource/inventory management tools.
- Responsible for External Audit, ISO 27001 and ISO27032.
- Contribute and lead related projects to achieve goals within timeframes.
- Collaborate with cross functional team, vendors and product professionals to effectively troubleshooting and resolve issue with root cause analysis to ensure networks, application and customer service can operate smoothly with efficiency
- Monitor networks performance and connectivity to ensure all services are readiness..
- Bachelor Degree in Computer Sciences, Computer Engineering or related fields
- 3-5 years experience in related field
- Demonstrated in depth knowledge of LAN, WLAN, WAN, OT/IT Network, Firewall, Telephone, Routing protocols with OSPF & BGP and SD-WAN technologies
- Familiar to Cisco, HPE, Palo Auto, Fortinet product with strong knowledge switching, routing, WLAN, 802.1X, network security and datacenter system.
- Good command of English and good communication skill
- Good analytical skill and problem solving skill
- Excellent service mind with positive action
- The desire to work as part of a team in supporting an enterprise level infrastructure..
āļāļąāļāļĐāļ°:
Network Infrastructure, SAP, Assurance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Participate in the development of IT Audit Programs within assigned areas, covering IT security, applications, and IT processes (e.g., network infrastructure, operating systems, data centers, SAP, and retail systems). Assess whether security risks and vulnerabilities are properly identified and mitigated. Coordinate audit scope and effectiveness with business units and external IT/security specialists..
- Contribute to the design of detailed audit testing procedures in alignment with the approved Audit Program, including the definition of audit scope, sample sizes, audit ...
- Execute audit assignments as assigned by supervisors, performing detailed testing in accordance with established audit methodologies and procedures..
- Review and consolidate audit results, working papers, and supporting evidence prepared by team members in order to analyze audit findings and determine whether further audit procedures or expanded testing are required..
- Evaluate and analyze audit findings, including root causes and risks, and provide recommendations for improvement. Prepare and consolidate audit reports for submission to management for review and consideration..
- Bachelor s degree or higher in Management Information Systems, Information Technology, Computer Science, or other related fields..
- At least 5 years of experience in internal auditing, with a focus on IT audit, IT security controls, or IT-related assurance functions, or other relevant experience (e.g., information security, IT risk and control, IT governance, or IT quality assurance)..
- Strong leadership skills, with the ability to work effectively as part of a team and adapt to changing work environments..
- Strong analytical and systematic thinking skills..
- Proactive and innovative mindset, with the ability to initiate improvements..
- Effective communication and coordination skills..
- Proficiency in computer applications, including MS Office and SAP ERP..
- Professional certifications such as CISA, CISSP, CISM, or other relevant technical certifications will be considered an advantage..
- Working location: The Mall Ramkhamhaeng (Headquarter).
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
3 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
System Security
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Participate in gathering and analyzing business and technical requirements to develop enterprise-wide Identity and Access Management (IAM) processes and procedures.
- Demonstrate a solid understanding of risk and change management, security policies and controls, user account lifecycle management, onboarding/offboarding, role-based access control (RBAC), access governance, and directory services.
- Translate business requirements into specific system, application, or process designs.
- Collaborate with cross-functional teams, including business units and technical stakeholders, to identify and define functional requirements, and contribute to or lead the design of IAM solutions.
- Engage in a broad range of IAM design activities from requirements analysis to implementation.
- Apply your knowledge of various IAM products and domains, with the ability to quickly adapt to new tools and technologies through self-learning or formal training.
- Provide support for identity provisioning, governance platforms, and privileged access management (PAM) tools.
- Lead and contribute to IAM-related projects to ensure successful delivery of objectives.
- Identify and communicate high-level functional gaps, risks, and potential issues, and propose effective solutions.
- Monitor service delivery against SLAs and escalate exceptions as needed.
- Perform IAM-related risk assessments and consult on project implementations to ensure alignment with RBAC frameworks and internal security policies.
- Drive improvements in RBAC processes, governance policies, and IAM lifecycle workflows.
- Lead or contribute to incident and problem management efforts, ensuring root cause analysis and future incident mitigation.
- Participate in on-call production support rotations and work with vendors to resolve technical issues.
- Influence the IAM strategy by making informed decisions on complex technical challenges.
- Support internal and external audit readiness by preparing and organizing required audit documentation.
- Design and implement key management controls to ensure encryption key security throughout the lifecycle.
- Conduct physical access control reviews and physical security assessments for restricted areas.
- Promote and extend secure access control practices across the organization and its affiliates.
- Essential Skills & PrerequisitesA positive, proactive mindset with strong empathy and team collaboration skills.
- Bachelor s or Master s degree in Computer Engineering, Information Security, MIS, or a related field.
- Minimum of 3 years of experience in cybersecurity or IAM domains.
- Solid foundation in information security principles and best practices.
- Knowledge of international security frameworks and standards, such as COBIT, NIST 800 series, ISO/IEC 27001, PCI-DSS, and OWASP.
- Familiarity with end-to-end security architecture including network, platform, and application layers.
- Experience with application/system security controls, IAM risk assessments, and access governance.
- Strong skills in technical writing, documentation, process mapping, and visual communication.
- Ability to develop and execute a clear vision for IAM and security solutions.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Security Risk Management: Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Establishment of Policies, Standards, and Procedures:Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Communication and Collaboration with Technology Team:Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Essential Skills & PrerequisitesA positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as the expert in project teams. PERSONAL SKILLS: Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Linux, Good Communication Skills, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up-to-date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Problem Solving, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Problem Solving, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Microsoft Office
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Serve as the main point of contact for gathering evidence, CCTV footage, and relevant information for assigned fraud cases.
- Coordinate with other relevant teams to prepare for interrogation sessions.
- Participate in the interrogation sessions of offenders,witnesses, and/or other relevant parties.
- Draft investigation reports.
- Act as a CCTV real-time monitor as requested or assigned by the supervisor.
- Participate in security-related projects and tasks as assigned.
- Requirements: Bachelor's degree in Laws, Political Science or related field. (Fresh Graduate is welcome.).
- Availability to work in the office 5 days a week and 1 day from home.
- Minimum of 0-2 years of experience in Fraud Investigation, Fraud Prevention, Loss Prevention, Government Affairs, Government Relations, or Risk Management-related positions.
- Experience in the logistics industry is a plus.
- Previous experience as a Police/Military Official or other government official is advantageous.
- Familiarity with reviewing CCTV footage.
- Skills in offender interrogation or interviewing.
- Strong analytical and problem-solving abilities.
- Excellent interpersonal skills.
- Proficient in GSuite or Microsoft Office.
- Must have a private vehicle and a valid driver's license.
- Availability to be on-call for emergency issues.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Respond effectively to the diverse perspectives, needs, and feelings of others.
- Use a broad range of tools, methodologies and techniques to generate new ideas and solve problems.
- Use critical thinking to break down complex concepts.
- Understand the broader objectives of your project or role and how your work fits into the overall strategy.
- Develop a deeper understanding of the business context and how it is changing.
- Use reflection to develop self awareness, enhance strengths and address development areas.
- Interpret data to inform insights and recommendations.
- Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements.
- Minimum years experience required.
- n/a.
- Additional application instructions.
- n/a.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture {+ 8 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
- Job Posting End Date.
āļāļąāļāļĐāļ°:
Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Validates, classifies, priorities and opens ticket.
- Acting as focal contact point for report security incidents.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of security incidents.
- Responds to security alerts generate within the SLA time window.
- Follow-up and tracking security incidents base on team process.
- Examine network topologies to understand data flows through the network.
- Validate security incidents alerts against network traffic using packet analysis tools.
- Isolate or remove malware.
- Identify applications and operating systems of a network device based on network traffic.
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
- Notify cybersecurity service provider team members of suspected cyber incidents, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Who are we looking for?.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Analytical and problem-solving skills are required.
- Knowledge of network traffic analysis methods.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Experience in IT Security, Network Security or Security Compliance.
- Knowledge of common security tools such as anti-virus, firewall and intrusion detection system.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Able to work in shift.
- Location: Head Office: Chatuchak, SJ Infinite One Business Complex
- 1
- 2
- 3
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2025
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ
