- No elements found. Consider changing the search query.
āļāļąāļāļĐāļ°:
Power BI
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļģāđāļāļīāļāļāļēāļĢāļĢāļ°āļāļąāļāļĢāđāļēāļāļāđāļēāļŦāļĢāļ·āļāļāļĨāļīāļāļ āļąāļāļāđāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļąāļāļāļĩāļĄāđāļēāļŠāļĩāļāđāļēāļ āđ āļāļēāļĄāļāļĩāđāļĢāļ°āļāļļāđāļ āļ.āļĢ.āļ. āļĄāļēāļāļĢāļāļēāļĢāļāđāļāļāļāļąāļāđāļĨāļ°āļāļĢāļēāļāļāļĢāļēāļĄāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļēāļāđāļāļāđāļāđāļĨāļĒāļĩ (āļāļāļąāļāļāļĩāđ 2) āļ.āļĻ. 2568 āđāļĨāļ°āļāļāļŦāļĄāļēāļĒāļāļ·āđāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āđāļŦāđāđāļĨāđāļ§āđāļŠāļĢāđāļāļ āļēāļĒāđāļāđāļ§āļĨāļēāļāļĩāđāļāļģāļŦāļāļ.
- āļŠāļ·āļāļŠāļ§āļāđāļĨāļ°āļāļĒāļēāļĒāļāļĨāļāļĪāļāļīāļāļĢāļĢāļĄāļāļēāļĢāļĢāļąāļāļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāļāļĩāđāļāđāļēāļŠāļāļŠāļąāļĒāļāļāļāļĢāđāļēāļāļāđāļēāļāļĩāđāļāļēāļāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļēāļĢāļāļļāļāļĢāļīāļāļŦāļĢāļ·āļāļāļąāļāļāļĩāļĄāđāļē āđāļāļ·āđāļāļāļģāđāļāļīāļāļāļēāļĢāļĢāļ°āļāļąāļāļŦāļĢāļ·āļāļĒāļāđāļĨāļīāļāļāļēāļĄāđāļāļ§āļāļēāļāļāļĩāđāļāļāļēāļāļēāļĢāļāļģāļŦāļāļ.
- āļĢāļąāļāđāļĢāļ·āđāļāļāļāļĢāļāļĩāļāļēāļĢāļāļāļīāđāļŠāļāļĢāļēāļĒāļāļēāļĢāđāļāđāļāļąāļāļĢ āļĢāļēāļĒāļāļēāļĢāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļĢāđāļēāļāļāđāļēāļāļĩāđāļĢāļąāļāļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļēāļĢāļāļĩāđāđāļāđāļēāļāđāļēāļĒāļāļļāļāļĢāļīāļ āļĢāļ§āļĄāļāļķāļ āļĢāļēāļĒāļāļēāļĢāđāļāđ Wallet Application āļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļē ...
- āļŠāļ·āļāļŠāļ§āļāļāļĢāļāļĩāļāļēāļĢāļāļĢāļ°āļāļģāļāļļāļāļĢāļīāļāļāļĩāđāļāļģāđāļŦāđāļāļāļēāļāļēāļĢāđāļāđāļĢāļąāļāļāļ§āļēāļĄāđāļŠāļĩāļĒāļŦāļēāļĒ āļāļąāđāļāļāđāļāļāļāļēāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļēāļŠāļĄāļēāļāļīāļ āļŦāļĢāļ·āļ Wallet Application āļāļĢāđāļāļĄāļāļīāļāļāļēāļĄāļāļ§āļēāļĄāđāļŠāļĩāļĒāļŦāļēāļĒāļāļ·āļāđāļŦāđāđāļāđāļāļāļēāļāļēāļĢ āđāļĨāļ°āđāļāđāļāļāļ§āļēāļĄāļāļģāđāļāļīāļāļāļāļĩāļāđāļāļāļāļąāļāļāļēāļāļŠāļāļāļŠāļ§āļāđāļŦāđāļāļģāđāļāļīāļāļāļāļĩāļāļąāļāļāļđāđāļāļĢāļ°āļāļģāļāļļāļāļĢāļīāļ āļĢāļ§āļĄāļāļķāļāļāļīāļāļāļēāļĄāļāļĨāļāļāļāļ§āđāļēāļāļāļĩāļāļ°āļāļķāļāļāļĩāđāļŠāļļāļ.
- āļ§āļīāđāļāļĢāļēāļ°āļŦāđāļāđāļāļĄāļđāļĨāļĢāļđāļāđāļāļāļāđāļēāļ āđ āļāļāļāļāļēāļĢāļāļļāļāļĢāļīāļ āļāļąāđāļāļāđāļāļāļāļēāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļēāļŠāļĄāļēāļāļīāļ āļŦāļĢāļ·āļ Wallet Application āđāļāļ·āđāļāļāļģāļŦāļāļāđāļāļ§āļāļēāļāļāļēāļĢāļāđāļāļāļāļąāļāđāļĨāļ°āļāļĢāļēāļāļāļĢāļēāļĄāļāļēāļĢāļāļļāļāļĢāļīāļāļāļĩāđāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāđāļĨāļ°āļŠāļĢāļļāļāļāļĨāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļāļ·āđāļāļāļģāđāļŠāļāļāđāļāđāļāļđāđāļāļąāļāļāļąāļāļāļąāļāļāļē Head of Card & Merchant Fraud Investigation.
- āļāļļāļāļŠāļĄāļāļąāļāļī: āļŠāļģāđāļĢāđāļāļāļēāļĢāļĻāļķāļāļĐāļēāļĢāļ°āļāļąāļāļāļĢāļīāļāļāļēāļāļĢāļĩāļāļķāđāļāđāļāđāļāļŠāļēāļāļēāļāļīāļāļīāļĻāļēāļŠāļāļĢāđ āļĢāļąāļāļĻāļēāļŠāļāļĢāđ āđāļĻāļĢāļĐāļāļĻāļēāļŠāļāļĢāđ āļŠāļąāļāļāļĄāļĻāļēāļŠāļāļĢāđ āļāļĢāļīāļŦāļēāļĢāļāļļāļĢāļāļīāļ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļ·āđāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāļ·āđāļāļāļēāļāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĨāļīāļāļ āļąāļāļāđāļāļāļēāļāļēāļĢ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļŠāļ·āļāļŠāļ§āļāļŠāļāļāļŠāļ§āļāļŦāļĢāļ·āļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāļāļĩāļāļļāļāļĢāļīāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļē Wallet Application āļŦāļĢāļ·āļāļāļĢāļīāļāļēāļĢāļāļēāļāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđāļāļ·āđāļ āđ āļāļāļāļāļāļēāļāļēāļĢ āđāļĄāđāļāđāļāļĒāļāļ§āđāļē 1 āļāļĩ.
- āļĄāļĩāļāļąāļāļĐāļ°āļ āļēāļĐāļēāļāļąāļāļāļĪāļĐāļāļąāđāļāļāđāļēāļāļāļąāļ āļāļđāļ āļāđāļēāļ āđāļĨāļ°āđāļāļĩāļĒāļāđāļāļĢāļ°āļāļąāļāļāļĩ.
- āļŠāļēāļĄāļēāļĢāļāđāļāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđāđāļāđāļāļĩ āđāļāļĒāđāļāļāļēāļ° MS Excel āđāļĨāļ° Power BI āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāļāļąāļāļāļģ Presentation āđāļāļ·āđāļāļāļģāđāļŠāļāļāļāđāļāļĄāļđāļĨāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļŠāļēāļĄāļēāļĢāļāļāļāļīāļāļąāļāļīāļāļēāļāļāļāļāļŠāļāļēāļāļāļĩāđ āļŦāļĢāļ·āļāļāđāļēāļāļāļąāļāļŦāļ§āļąāļ āđāļĨāļ°āļāļāļāđāļ§āļĨāļēāļāļģāļāļēāļĢāđāļāđāļāļēāļĄāļāļ§āļēāļĄāļāļģāđāļāđāļāļāļāļāļāļēāļ.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Define, review, and integrate application security requirements across applications and platforms..
- Review and provide input into application security technical architecture, ensuring security considerations are embedded into final design decisions..
- Act as a security architecture lead, owning security decisions across multiple teams and workstreams..
- Collaborate with cross functional teams (architecture, development, infrastructure, and delivery) to ensure security is integrated throughout the SDLC..
- Conduct application security risk assessments, identify vulnerabilities, and recommend appropriate mitigation strategies..
- Provide solutions to cross team security challenges, addressing both technical and business risks..
- Develop and maintain application security standards, policies, and procedures..
- Stay up to date with emerging security threats, technologies, and best practices to continuously improve application security posture..
- Provide guidance, mentoring, and training to team members on application security principles and best practices..
- Act as a trusted advisor to stakeholders, providing security recommendations and influencing key architectural decisions..
- Required Skills & ExperienceStrong experience in Application Security Architecture or Application Security Lead roles..
- Expert proficiency in Application Security, including secure design, threat modeling, and vulnerability management..
- Experience performing application security assessments and translating findings into actionable remediation plans..
- Strong understanding of enterprise application architectures and system integration..
- Proven ability to work across multiple teams and influence architectural and security decisions.
- Strong analytical, problem solving, and communication skills.
- Nice to HaveExperience in enterprise or financial services environments..
- Exposure to digital transformation or large scale platform initiatives..
- Knowledge of secure integration patterns, APIs, and modern application platforms.
- Background in consulting or project based delivery environments..
āļāļąāļāļĐāļ°:
Industry trends, Cloud Computing, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Provide consultancy advice to business and project teams to ensure security standards and requirements are considered and implemented.
- Perform deep dive reviews focused on Cybersecurity Risk, Technology Risk, and Emerging Risk.
- Effective management of all technology risk and cybersecurity framework including technology policies and standards based on the Group's risk appetite.
- Closely monitor technology and cyber related KPIs, KRIs, KCIs and drive remediation actions as Group perspective.
- Timely update on all material technology risk and cybersecurity topics including a set of risk indicators to the relevant Group Risk Committees and forums.
- Oversight the result of control testing from subsidiaries to ensure Cybersecurity and technology controls meet internal and external compliance requirements.
- Conduct technology risk assessments: Identify and evaluate potential risks Management with the organization's technology systems, infrastructure, and processes. Assess the adequacy of controls, identify vulnerabilities, and recommend risk mitigation strategies.
- Develop and implement risk management strategies: Collaborate with stakeholders to develop comprehensive risk management strategies that align with business objectives and regulatory requirements. Implement controls and procedures to mitigate identified risks effectively.
- Monitor technology risk exposure: Continuously monitor technology systems, networks, and processes to identify emerging risks, vulnerabilities, and trends. Stay up-to-date with industry developments, emerging technologies, and regulatory changes to proactively address potential risks.
- Perform risk analysis and reporting: Analyze risk assessment findings, internal control evaluations, and audit reports to identify trends, root causes, and areas of improvement. Prepare detailed reports on risk exposure, mitigation strategies, and recommendations for management and relevant stakeholders.
- Collaborate with cross-functional teams: Work closely with IT teams, compliance officers, cybersecurity professionals, and other stakeholders to develop and implement risk management frameworks, policies, and procedures. Provide guidance and recommendations on technology-related risk management activities.
- Conduct technology risk training and awareness programs: Develop and deliver training programs to educate employees on technology risk management best practices, policies, and procedures. Raise awareness about emerging threats and provide guidance on incident response protocols.
- Assist in incident response and recovery: Support the organization in managing technology-related incidents, including data breaches, system failures, and cybersecurity threats. Coordinate response efforts, assist in recovery measures, and contribute to post-incident reviews and lessons learned.
- Stay updated on industry standards and regulations: Keep abreast of industry trends, emerging technologies, and regulatory requirements related to technology risk management. Provide recommendations on incorporating best practices into the organization's risk management framework.
- Minimum of 5 years experience in Technology and Cyber Risk.
- Bachelor s degree or above in related discipline.
- Working experience or familiar in a group public company.
- Understanding of regulatory requirements such as BOT, OIC, and SEC; industry standards such as COBIT, NIST, ISO27001, ITIL, and PCIDSS.
- Experience in one or more emerging technologies such as Artificial Intelligence, Machine Learning, Distributed Ledger Technology, Robotic Process Automation, Cloud computing.
- Excellent communication and relationship building skills; proven ability to influence senior management.
- Good command of written and spoken in English is preferable.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and oversee Security Operations Center (SOC) activities.
- Manage and coordinate incident response processes across the organization.
- Develop and maintain incident response playbooks and procedures.
- Perform threat intelligence analysis and monitor evolving cyber threat landscapes.
- Conduct security risk analysis and recommend mitigation strategies.
- Collaborate with IT, Risk, Compliance, and Business Units to enhance cybersecurity posture.
- Provide strategic cybersecurity guidance and recommendations to management.
- Mentor and coach SOC and Incident Response team members.
- Support internal and external security audits and compliance activities..
- Bachelor s degree or higher in Cybersecurity, Information Technology, or related field.
- Minimum 7 years of experience in cybersecurity roles.
- Proven experience managing SOC or Incident Response teams.
- Strong knowledge of threat detection, incident handling, and digital forensics.
- Strong understanding of security frameworks and standards such as ISO 27001, NIST, and MITRE ATT&CK.
- Strong analytical, investigative, and problem-solving skills.
- Leadership and team management capabilities.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Contracts, Procurement, AutoCAD, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Serve as the key business partner working directly with service business partners and internal stakeholders (primarily infrastructure, physical security and operations teams).
- Collaborate with engineers, technicians, project managers, and Sr. Leaders to develop your programs.
- Drive process change and improvement across multiple business and program teams.
- Report ad hoc, weekly, and monthly program and operating metrics.
- Run meetings, create and maintain timelines, and keep large, diverse groups informed of progress and obstacles.
- Manage security system integration vendor contracts to deliver projects.
- Communicate the status of programs with customers, stakeholders and conduct program reviews.
- Must be willing to travel 15% of the time as required when launching new locations (Domestically and Internationally).
- A day in the life
- The SPM team in ASEAN is a high performing unit that supports ASEAN Data Center builds now and into the future. The team work at pace and Take Ownership, able to Deliver Results on a daily basis. We are mindful of each others differences and work tirelessly to support each other daily.
- Diverse Experiences
- Amazon values diverse experiences. Even if you do not meet all of the preferred qualifications and skills listed in the job description, we encourage candidates to apply. If your career is just starting, hasn t followed a traditional path, or includes alternative experiences, don t let it stop you from applying.
- Why AWS
- Amazon Web Services (AWS) is the world s most comprehensive and broadly adopted cloud platform. We pioneered cloud computing and never stopped innovating that s why customers from the most successful startups to Global 500 companies trust our robust suite of products and services to power their businesses.
- Work/Life Balance
- We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why we strive for flexibility as part of our working culture. When we feel supported in the workplace and at home, there s nothing we can t achieve in the cloud.
- Inclusive Team Culture
- Here at AWS, it s in our nature to learn and be curious. Our employee-led affinity groups foster a culture of inclusion that empower us to be proud of our differences. Ongoing events and learning experiences, including our Conversations on Race and Ethnicity (CORE) and AmazeCon conferences, inspire us to never stop embracing our uniqueness.
- Mentorship and Career Growth
- We re continuously raising our performance bar as we strive to become Earth s Best Employer. That s why you ll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional.
- BASIC QUALIFICATIONS.
- 5 years working in Project Management related to construction or physical security.
- Demonstrated ability to manage multiple complex projects and adapt to and control change on a project.
- Fluency/competency in more than one language in Thai and English to communicate with local and overseas stakeholders.
- Experienced in vendor management and procurement processes, to include the establishment of key performance indicators and service level agreements.
- PREFERRED QUALIFICATIONS.
- BA/BS degree or higher in related field of architecture, engineering, or project management. PSP, CPP, PMP Certification will be an added advantage.
- Subject Matter Expertise with Access Control, Intrusion Detection, and Video Surveillance Systems.
- Demonstrated ability to use AutoCad/Desk, BIM, Bluebeam.
- Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit https://amazon.jobs/content/en/how-we-hire/accommodations for more information. If the country/region you re applying in isn t listed, please contact your Recruiting Partner.
āļāļąāļāļĐāļ°:
ISO 27001, DevOps, Swift
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Manage end-to-end cryptographic key lifecycle (generation, distribution, rotation, backup, archival, destruction).
- Administer and operate Hardware Security Modules (HSMs), preferably Thales Luna HSM.
- Define and enforce key management policies and procedures aligned with banking regulations and industry standards (e.g., PCI DSS, ISO 27001).
- Support encryption key integration across banking applications, core systems, payment systems, and digital channels.
- Conduct key ceremonies and maintain audit logs.
- Vault & Secrets Management.
- Administer enterprise vault platforms (e.g., HashiCorp Vault or similar).
- Manage secrets lifecycle (API keys, certificates, tokens, database credentials).
- Configure access control policies, role-based access, and segregation of duties.
- Integrate vault solutions with applications, DevOps pipelines, and cloud/on-prem infrastructure.
- Monitor vault security posture and perform regular health checks.
- Security & Compliance.
- Ensure compliance with regulatory requirements (BOT, PCI DSS, SWIFT CSP, etc.).
- Perform risk assessments related to cryptographic controls.
- Support audit activities and provide evidence for internal/external auditors.
- Participate in incident response related to key compromise or vault breaches.
- Architecture & Improvement.
- Contribute to cryptographic architecture design and secure key management framework.
- Support post-quantum cryptography transition planning (if applicable).
- Recommend best practices and continuous improvements for key and secrets management.
- Apply now if you have these advantages.
- Bachelor s degree or higher in computer science/ data science or any related field.
- Minimum of 3-7 years of experience in Information Security or Cryptography (Banking Financial industries are advantage).
- 3-7+ years of experience in Information Security or Cryptography.
- Hands-on experience with HSM (Thales Luna preferred).
- Experience in Vault or Secrets Management platforms (e.g., HashiCorp Vault).
- Experience in banking or financial services environment is highly preferred..
- Strong understanding of cryptographic principles (PKI, symmetric/asymmetric encryption, TLS, key wrapping, key derivation).
- Experience with key lifecycle management processes.
- Knowledge of PKI, certificate management, and CA integration.
- Familiarity with PCI DSS encryption requirements.
- Scripting skills (e.g., Bash, Python, PowerShell) are a plus.
- Why join Krungsri?.
- As a part of MUFG (Mitsubishi UFJ Financial Group), we a truly a global bank with networks all over the world.
- We offer a striking work-life balance culture with hybrid work policies (3 days in office per week).
- Unbelievable benefits such as attractive bonuses, employee loan with special rates and many more..
- Apply now before this role is close. **.
- FB: Krungsri Career(http://bit.ly/FacebookKrungsriCareer [link removed]).
- LINE: Krungsri Career (http://bit.ly/LineKrungsriCareer [link removed]).
- Talent Acquisition Department
- Bank of Ayudhya Public Company Limited
- 1222 Rama III Rd., Bangpongpang, Yannawa, Bangkok 10120.
- āļŦāļĄāļēāļĒāđāļŦāļāļļ āļāļāļēāļāļēāļĢāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāđāļĨāļ°āļāļ°āļĄāļĩāļāļąāđāļāļāļāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāļđāđāļŠāļĄāļąāļāļĢ āļāđāļāļāļāļĩāđāļāļđāđāļŠāļĄāļąāļāļĢāļāļ°āđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāđāļāđāļēāļĢāđāļ§āļĄāļāļēāļāļāļąāļāļāļāļēāļāļēāļĢāļāļĢāļļāļāļĻāļĢāļĩāļŊ.
- Remark: The bank needs to and will have a process for verifying personal information related to the criminal history of applicants before they are considered for employment with the bank..
- Applicants can read the Personal Data Protection Announcement of the Bank's Human Resources Function by typing the link from the image that stated below.
- EN (https://krungsri.com/b/privacynoticeen).
- āļāļđāđāļŠāļĄāļąāļāļĢāļŠāļēāļĄāļēāļĢāļāļāđāļēāļāļāļĢāļ°āļāļēāļĻāļāļēāļĢāļāļļāđāļĄāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļŠāđāļ§āļāļāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨāļāļāļāļāļāļēāļāļēāļĢāđāļāđāđāļāļĒāļāļēāļĢāļāļīāļĄāļāđāļĨāļīāļāļāđāļāļēāļāļĢāļđāļāļ āļēāļāļāļĩāđāļāļĢāļēāļāļāļāđāļēāļāļĨāđāļēāļ.
- āļ āļēāļĐāļēāđāļāļĒ (https://krungsri.com/b/privacynoticeth).
āļāļąāļāļĐāļ°:
ISO 27001, Python, PowerShell
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŋ60,000 - āļŋ80,000, āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5 years of experience in IT security and governance.
- Strong understanding of IT security principles, practices, and technologies.
- Knowledge of relevant security standards and regulations (e.g., ISO 27001, NIST, GDPR, HIPAA, PCI DSS).
- Experience with risk assessment and vulnerability management.
- Experience with security incident response and management.
- Strong analytical and problem-solving skills.
- Excellent communication and interpersonal skills.
- Ability to work independently and as part of a team..
- Relevant certifications (e.g., CISSP, CISM, CISA, Security+).
- Experience with cloud security (AWS, Azure, GCP) and On-Premises.
- Experience with security information and event management (SIEM) systems.
- Experience with scripting languages (e.g., Python, PowerShell).
- Experience with penetration testing.
- Ability to maintain confidentiality and handle sensitive information.
- Ability to adapt to changing technologies and security threats.
- Strong attention to detail and organizational skills.
- Ability to create and maintain clear and concise documentation..
- āđāļāļāļąāļŠāļāļĢāļ°āļāļģāļāļĩ.
- āļĨāļēāļāļąāļāļĢāđāļāļ āđāļĄāļ·āđāļāļāđāļāļāļāļĨāļāļāļāļēāļ.
- āļĨāļē Workcation.
- āļāļāļāļāļļāļāļŠāļģāļĢāļāļāđāļĨāļĩāđāļĒāļāļāļĩāļ.
- āļāļĢāļ°āļāļąāļāļŠāļąāļāļāļĄ / āļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ / āļāļĢāļ°āļāļąāļāļāļĩāļ§āļīāļ / āļāļĢāļ°āļāļąāļāļāļļāļāļąāļāļīāđāļŦāļāļļ.
- āļ§āļąāļāļŦāļĒāļļāļāļāļēāļĄāļāļāļŦāļĄāļēāļĒ (āđāļĄāđāļāđāļāļĒāļāļ§āđāļē 13āļ§āļąāļ).
- āļĨāļēāļŦāļĒāļļāļāđāļāđāļāļ·āļāļāđāļāļīāļ.
- āļāļĢāļ§āļāļŠāļļāļāļ āļēāļāļāļĢāļ°āļāļģāļāļĩ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļŠāļĄāļĢāļŠ.
- āļŠāļīāļāļāļīāļāļļāļāļāđāļāļĨāļēāđāļĨāļĩāđāļĒāļāļāļļāļāļĢ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāļēāļāļāļāļīāļ.
- Co working Space.
- āļāļīāļāđāļāļ.
- Point āđāļĨāļāļāļāļāļĢāļēāļāļ§āļąāļĨ.
- āļāļĢāļīāļāļēāļĢāļāļĢāļķāļāļĐāļēāļāļąāļāļāļīāļāļ§āļīāļāļĒāļēāļāļāļāđāļĨāļāđ..
- āļāļēāļĢāđāļāļīāļāļāļēāļ.
- BTS: āļŠāļāļēāļāļĩāļŦāļĄāļāļāļīāļ, āļŦāđāļēāđāļĒāļāļĨāļēāļāļāļĢāđāļēāļ§.
- MRT: āļŠāļāļēāļāļĩāļāļŦāļĨāđāļĒāļāļīāļ.
- āļāļĢāļīāļāļēāļĢāđāļĢāļĩāļĒāļāļĢāļāļāđāļēāļ App MuvMi..
- āļāļīāļāļāļēāļĄāļāđāļēāļ§āļŠāļēāļĢāļāļēāļ SC ASSET āđāļāđāļāļĩāđ.
- http://insidesc.scasset.com/..
āļāļąāļāļĐāļ°:
Internal Audit
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļĢāļ§āļāļāļēāļĄ internal control āļāļđāđāļĨāļāļļāļāļŦāļāđāļ§āļĒāļāļēāļāđāļāļĩāđāļĒāļ§āļāļąāļāļĢāļ°āļāļ Application āļ āļēāļāļĢāļ§āļĄāļĄāļĩāļāļąāđāļ Cyber security + Application control (asset control).
- āļĢāđāļ§āļĄāļāļąāļāļāļģāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ (Audit Program) āļŦāļāđāļ§āļĒāļĢāļąāļāļāļĢāļ§āļāļāļĩāđāļĢāļąāļāļāļīāļāļāļāļāđāļĨāļ°āļāļģāļŦāļāļāļ§āļīāļāļĩāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļāļ·āđāļāđāļŦāđāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāļĢāļĨāļļāļāļēāļĄāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđ.
- āļāļāļīāļāļąāļāļīāļāļēāļāļāļĢāļ§āļāļŠāļāļāļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒāđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļēāļĄāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļŠāļāļāļāļĩāđāđāļāđāļĢāļąāļāļāļēāļĢāđāļŦāđāļāļāļāļ āđāļĨāļ°āļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļ āļēāļĒāđāļ.
- āļĢāļ§āļāļĢāļ§āļĄ āļ§āļīāđāļāļĢāļēāļ°āļŦāđ āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāđāļāļĄāļđāļĨāļāļĩāđāđāļāđāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ āļāļķāļāļāļ§āļēāļĄāđāļāļĩāļĒāļāļāļāđāļĨāļ°āļāļ§āļēāļĄāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļāļāļāļāļĢāļ°āļāļāļāļ§āļāļāļļāļĄāļ āļēāļĒāđāļ.
- āļāđāļ§āļĒāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļĢāļ°āļāļ IT āđāļāļ·āđāļāļāđāļāļŦāļēāļāļąāļāļŦāļēāđāļĨāļ°āļāđāļāļāļāļāļĢāđāļāļ āļāļĢāđāļāļĄāļāļģāđāļŠāļāļāđāļāļ§āļāļēāļāđāļāļāļēāļĢāļāļĢāļąāļāļāļĢāļļāļāđāļĨāļ°āļāļąāļāļāļēāļĢāļ°āļāļ IT.
- āļ§āļēāļāđāļāļāļāļēāļĢāļāđāļēāđāļāļīāļāļāļēāļĢāļāļēāļĄāļāļĢāļ°āļāļ§āļāļāļēāļĢāđāļĨāļ°āļāļąāđāļāļāļāļāđāļāļāļēāļĢāļĢāļ°āļāļļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāđāļāļĢāļ°āļāļāļŠāļēāļĢāļŠāļāđāļāļĻāļāļāļāļāļāļāđāļāļĢ.
- āļāļĢāļīāļāļāļēāļāļĢāļĩ āđāļāļŠāļēāļāļē āđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ, āļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđ.
- Computer Engineer, Computer Science, Information Technology.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļāđāļāļāļāļīāļāđāļāļĩāđāļĒāļ§āļāļąāļāļŠāļ āļēāļāđāļ§āļāļĨāđāļāļĄāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļŦāļĢāļ·āļ IT Security.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļāļĢāļ°āđāļĄāļīāļ/āļāļĢāļ§āļāļŠāļāļ āļĢāļ°āļāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻāļŦāļĢāļ·āļāļĢāļ°āļāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ 2-3 āļāļĩ.
- āļāđāļēāļāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāđāļēāļ IT Governance āļŦāļĢāļ·āļ IT Best Practice āļŦāļĢāļ·āļāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļŠāļēāļĢāļŠāļāđāļāļĻ (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ).
- āđāļāđāļĢāļąāļāđāļāļĢāļąāļāļĢāļāļāļāļļāļāļ§āļļāļāļīāļāđāļēāļ IT Audit āļŦāļĢāļ·āļāļāđāļēāļ Security (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ)..
- āļ§āļąāļ-āđāļ§āļĨāļē āļāļģāļāļēāļ: 8.30 - 17.00 āļ-āļĻ.
- āļŠāļāļēāļāļāļĩāđāļāļģāļāļēāļ: āļāļēāļāļēāļĢāđāļŠāļāđāļŠāļĄ āļāļāļļāļāļąāļāļĢ.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāļąāļāļāļāļąāļāļāļēāļāļāļļāļāļāļāļāļĒāđāļēāļāđāļāđāļēāđāļāļĩāļĒāļĄ āļāļĨāļđāļāļāļąāļāđāļŦāđāļāļļāļāļāļāļĒāļķāļāļĄāļąāđāļāđāļāļāļēāļĢāļāļĢāļ°āļāļāļāļŠāļąāļĄāļĄāļēāļāļĩāļ āļāļĒāđāļēāļāļĄāļĩāļāļĢāļĢāļĐāļąāļāļ āļīāļāļēāļĨāļāļĩāđāļāļĩ.
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāđāļāļāļēāļĢāļāļąāļāļāļēāļĻāļąāļāļĒāļ āļēāļāļāļāļąāļāļāļēāļāđāļāļāļļāļāđ āļāđāļēāļ āļāđāļ§āļĒāđāļāļĢāđāļāļĢāļĄāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāļļāļāļ āļēāļāđāļŦāđāđāļŦāļĄāļēāļ°āļŠāļĄāļāļąāļāđāļāđāļĨāļ°āļāļ āđāļāļ·āđāļāļĒāļāļĢāļ°āļāļąāļāļāļēāļĢāļāļģāļāļēāļāļāļāļāļāļāļąāļāļāļēāļāļāļĒāđāļēāļāļĄāļ·āļāļāļēāļāļĩāļ.
- āļŠāļģāļāļąāļāļāļēāļāđāļŦāļāđāļāļāļāļāļēāļāļāļēāļ āļāļđāļāļāļāļāđāļāļāđāļŦāđāđāļāđāļ Smart Office and Smart Display Solution āļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļŦāļĢāļđāļŦāļĢāļē āļāļąāļāļŠāļĄāļąāļĒ āđāļĨāļ°āļāļĢāļ°āļŦāļĒāļąāļāļāļĨāļąāļāļāļēāļ.
- āļāļ§āļēāļĄāļāļāļāļļāđāļāđāļāļāļāļĩāđāļāđāļāļ āļāļ·āļāļŦāļąāļ§āđāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļāļąāļāļāļēāļāđāļŦāļĄāđāļāļĩāđāļāđāļēāļ§āđāļāđāļēāļĄāļēāđāļāļāļĢāļāļāļāļĢāļąāļ§āļāļāļāđāļĢāļē.
- āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļāļāļēāļĢāļāļģāļāļēāļāļĒāļąāļāđāļāđāļāļāļĩāļāļŦāļāļķāđāļāļŠāļīāđāļāļāļĩāđāļŠāļģāļāļąāļāļŠāļđāļāļŠāļļāļāļāļāļāļāļļāļĢāļāļīāļāļāļīāđāļāļĢāđāļĨāļĩāļĒāļĄ āļāļąāļāļāļąāđāļāļāļāļąāļāļāļēāļāļāļēāļāļāļēāļāļāļļāļāļāļāļāļķāļāļāđāļāļāļāđāļēāļāļāļēāļĢāļāļāļĢāļĄāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļĨāļ°āļāļēāļāļĩāļ§āļāļāļēāļĄāļąāļĒāļāļĒāđāļēāļāđāļāđāļĄāļāđāļ.
- āļāļāļąāļāļāļēāļāļŠāļāļēāļĒāđāļāđāļāđāļāļąāļāđāļāļĢāđāļāļĢāļĄāļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ OPD/IPD āđāļĨāļ°āđāļĢāļēāļĒāļąāļāđāļŦāđāđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāđāļēāļĢāļąāļāļĐāļēāļāļĒāļēāļāļēāļĨāļŠāļģāļŦāļĢāļąāļāļāļļāļāļāļēāļĢāļĩ.
- Work life balance āļāļ·āļāļŠāļīāđāļāļŠāļģāļāļąāļ āđāļ§āļĨāļēāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāļĒāļ·āļāļŦāļĒāļļāđāļāļāļģāđāļŦāđāļāļļāļāļāļąāļāļŠāļĢāļĢāđāļ§āļĨāļēāđāļāđāļāļĒāđāļēāļāļĨāļāļāļąāļ§.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Compliance, Risk Management, Purchasing, English, French
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Provide timely and accurate security and safety advice and recommendations to the CO/MCO/RO; and approve organizational missions;.
- Clarify, interpret, and implement existing UN and UN Women security and safety policy as applicable;.
- Oversee security evaluations and provide advice on security measures for the residences (Residential Security Measures - RSM) of UN Women personnel, as well as on latest trends and threats to personnel safety and security;.
- Track developing threats and related risks, reviewing the impact of security and safety factors and risk on UN Women personnel, premises, assets, programme design and delivery;.
- Provide recommendations regarding effective risk prevention and mitigation measures, including recommendations for possible UN Women support needs and improvements;.
- Provide security surge support outside of the designated Duty Station as required;.
- Provide remote security support to identified UN Women personnel, offices, programmes and projects;.
- Advise and support UN Women Security Focal Points with regard UN Women online security assessments and compliance systems.
- Oversee security assessments and take necessary action.
- Oversee substantive assessment of the security situation at duty stations and ensure adequate collation and verification of security information;.
- Conduct security assessments of UN Women premises and equipment and provide recommendations on risk management.
- Liaise with and participate in the local and regional security community.
- Liaise and coordinate with the host government security organizations and/or personnel, including national and local provincial authorities, military, and police officers, as well as non-governmental organizations, UN entities, and other non-State actors;.
- Participate as a member of security groups, particularly IASMN Working Groups as directed by the UN Women Global Security Adviser;.
- Provide an advisory presence at UN security management meetings such as the country SMT, UNCT, and OMT.
- Maintain a security network of international and national security personnel;.
- Represent UN Women on behalf of the Global Security Adviser at security meetings, and attends security workshops/training sessions, working groups and conferences as directed.
- Collect, update, and communicate security information.
- Provide updates and information to HQ in relation to the security intranet portal and documentation;.
- Disseminate security information and measures to personnel;.
- Disseminate analytical products and outputs of the Security and Safety Services to stakeholders;.
- Conduct regular communications with UN Women Security Focal Points;.
- Establish a UN Women Warden Systems/Communication Trees where applicable.
- Develop, maintain, manage and implement the UN Women Security Plan, including updating personnel lists.
- Oversee the development and implementation the UN Women Security Plan in accordance with the UN Security Plan; maintain the plan;.
- Manage the preparation and review of the UN Security Plan and provide technical support in its implementation;.
- Provide advice and recommendations in the selection and purchasing of security and safety equipment;.
- Prepare and submit security clearance/movement of personnel requests;.
- Provides oversight and coordinates the implementation of UN Women Warden Systems;.
- Keep and update of information related to UN Women offices and residences including Global Premises Directory.
- Monitor, manage and implement UN Women compliance of the Security Risk Management Measures (SRMM) established for the duty station/s.
- Compile data required for the SRMM Self-Assessment of the UN Women and UN Security and Safety Compliance Survey (SSCS) Programme;.
- Provide technical support to and advise the UN Women Security Focal Points in the completion and updating of the SSCS;.
- Provide technical support to and advise the UN Women Security Focal Points in the evaluation and implementation of the UN Women Security and Safety Compliance Action Plan (SSCAP);.
- Provide technical advisory support to the Security Focal Points for the UN Women Security Compliance Enhancement Funding (SSCEF);.
- Implement SRMM for UN Women personnel, premises and assets, and systems and protocols, in accordance with organizational risk acceptance, ensuring the mainstreaming of security;.
- Provide UN Women managers with prescriptive content such as policy, risk management methodology, SRMM and RSM;.
- Provide technical support to security compliance input of all UN Women offices within AOR;.
- Provide technical support to the Programme team in completing and submitting the UN Women online Programme Assessment format.
- Report security and safety incidents affecting UN Women personnel, programmes, offices and assets.
- Collate information and provide inputs to security reports, such as the Security & Safety Incident Reporting System (SSIRS), Security Risk Management (SRM) Assessments and other ad-hoc incident reports;.
- Oversee security and safety evaluations and surveys of RO/MCO/CO/PPOs;.
- Develop accurate and timely written country briefings; add inputs to position papers from a field perspective;.
- Provide information to the country UN Security Management System (UNSMS) as required.
- Develop and conduct training courses on security and safety awareness, preparedness, mainstreaming, BCP and specialized functions.
- Participate in the development and delivery of UNSMS training;.
- Develop and deliver UN Women specific security and safety training;.
- Provide security and safety orientation to newly assigned personnel members and briefings;.
- Provide security and safety mainstreaming sessions as required;.
- Provide BCP training sessions as required and under the guidance of the UN Women Business Continuity Coordinator;.
- Provide Occupational Health and Safety (OHS) training sessions as required and under the guidance of the UN Women Occupational Health and Safety Specialist;.
- Coordinate with Human Resources to provide UN Women Representatives and Heads of Offices security and safety briefings.
- Identify, develop and deliver specialized security and safety training under the guidance of the Global Security Adviser.
- Oversee the Budget and Finances.
- Oversee the security and safety bi-annual work plan and related budget; initiate budget revisions for approval;.
- Prepare security budgets as well as completion of UN Women SSCEF funding requests;.
- Provide substantive security inputs to UN Women BWP/SN, programme appraisal bodies, and related budgets;.
- Monitor and support allotted UN Women Security and Safety Compliance funds to budget and utilize them in a timely manner;.
- Monitor that costs and expenditures remain within budget and approved limits through the monitoring of monthly budget reports;.
- Keep the Global Security Adviser updated on expenditures in the operational budget and follow closely remaining expenditure;.
- Oversee budget closures and reports as per HQ processes;.
- Ensure that all projects and programmes contribute resources to implementation of security and safety measures.
- Provide Air Travel Focal Point services to UN Women as per CATSU requirements;.
- Maintain liaison with commercial companies used for UN Women security at offices and residences, in order to ensure the effective and efficient use of the guard force.
- The incumbent will perform other duties within their functional profile as deemed necessary for the efficient functioning of the Office and the Organisation.
- Supervisory/Managerial Responsibilities: The incumbent will work closely with the region s Security Specialist, Local Security Associates, and country offices in line with the above accountabilities.
- Integrity;.
- Professionalism;.
- Respect for Diversity.
- Awareness and Sensitivity Regarding Gender Issues;.
- Creative Problem Solving;.
- Effective Communication;.
- Inclusive Collaboration;.
- Stakeholder Engagement;.
- Leading by Example.
- Excellent knowledge of security and risk management;.
- Excellent knowledge of country's security situation/ laws;.
- Ability to be client focused;.
- Excellent analytical skills;.
- Ability to create, edit and present information in clear, presentable and concise formats;.
- Ability to build effective client relationships and partnerships;.
- Ability to interact at all levels of staff/organization;.
- Excellent interpersonal skills;.
- Ability to provide guidance and support to others;.
- Ability to plan, prioritize and deliver tasks on time;.
- Ability to develop creative solutions;.
- Ability to function effectively in crisis and stressful circumstances.
- Master's degree or equivalent in security management, business administration, leadership, political/social science, psychology, international relations or a related field;.
- A first-level university degree in combination with two additional years of qualifying experience may be accepted in lieu of the advanced university degree. UN, military or police senior Command and Staff College qualification with command experience, may be accepted in lieu of the advanced university degree.
- A minimum of 5 years of progressively responsible experience in security of which at least 2 years at the country level in conflict, post conflict or development context.
- Experience of conducting security and/or safety risk assessments as integral part of operational planning and the enabling of operations is required.
- Experience of disaster and/or conflict operations is desirable.
- Experience in implementation of business continuity programme is desirable.
- Experience in a regional security role is desirable.
- Experience in United Nations Security Management System is desirable.
- Fluency in English is required.
- Knowledge of another official UN language is desirable (French, Arabic, Chinese, Russian or Spanish).
- In July 2010, the United Nations General Assembly created UN Women, the United Nations Entity for Gender Equality and the Empowerment of Women. The creation of UN Women came about as part of the UN reform agenda, bringing together resources and mandates for greater impact. It merges and builds on the important work of four previously distinct parts of the UN system (DAW, OSAGI, INSTRAW and UNIFEM), which focused exclusively on gender equality and women's empowerment.
- At UN Women, we are committed to creating a diverse and inclusive environment of mutual respect. UN Women recruits, employs, trains, compensates, and promotes regardless of race, religion, color, sex, gender identity, sexual orientation, age, ability, national origin, or any other basis covered by appropriate law. All employment is decided on the basis of qualifications, competence, integrity and organizational need.
- If you need any reasonable accommodation to support your participation in the recruitment and selection process, please include this information in your application.
- UN Women has a zero-tolerance policy on conduct that is incompatible with the aims and objectives of the United Nations and UN Women, including sexual exploitation and abuse, sexual harassment, abuse of authority and discrimination. All selected candidates will be expected to adhere to UN Women s policies and procedures and the standards of conduct expected of UN Women personnel and will therefore undergo rigorous reference and background checks. (Background checks will include the verification of academic credential(s) and employment history. Selected candidates may be required to provide additional information to conduct a background check.).
- Note: Applicants must ensure that all sections of the application form, including the sections on education and employment history, are completed. If all sections are not completed the application may be disqualified from the recruitment and selection process.
āļāļąāļāļĐāļ°:
Linux
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļ§āļļāļāļīāļāļēāļĢāļĻāļķāļāļĐāļēāļāļĢāļīāļāļāļēāļāļĢāļĩ āļŠāļēāļāļēāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļāļĒāļēāļāļēāļĢāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļāļāđāļēāļ IT Support, Network Operation Center (NOC) āļŦāļĢāļ·āļ Security Operations Center (SOC) āļāļĒāđāļēāļāļāđāļāļĒ 2 āļāļĩ.
- āļĄāļĩāļāļ§āļēāļĄāđāļāļĩāđāļĒāļ§āļāļēāļāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļŠāļāļēāļāļ°āđāļāļĢāļ·āļāļāđāļēāļĒ (Traffic Load) āđāļĨāļ°āļāļēāļĢāļāļąāļāļāļēāļĢāļĢāļ°āļāļ Network āđāļāđāļ VLAN, VPN, Firewall.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļ Cyber Security āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāđāļāđāđāļāļĢāļ·āđāļāļāļĄāļ·āļ SIEM (āđāļāđāļ Splunk) āļŦāļĢāļ·āļāđāļāļĢāđāļāļĢāļĄ Monitor āļāļ·āđāļāđ āđāļāļ·āđāļāđāļāđāļēāļĢāļ°āļ§āļąāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļāļāļĢāļ°āļāļ.
- āļŠāļēāļĄāļēāļĢāļāđāļāđāđāļāļāļąāļāļŦāļē Software āđāļāļ·āđāļāļāļāđāļ (1st Tier Support) āđāļĨāļ°āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāļĩāļĄāđāļāļāļāļīāļāđāļāļāļēāļ°āļāļēāļāļŦāļĢāļ·āļ Vendor āļ āļēāļĒāļāļāļāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļĄāļĩāļāļ§āļēāļĄāļŠāļēāļĄāļēāļĢāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļąāļāļāļēāļĢ Server (Windows/Linux Server), āļāļēāļĢāļāļīāļāļāļąāđāļ Patch Software āđāļĨāļ°āļāļēāļĢāļāļģāļĢāļļāļāļĢāļąāļāļĐāļēāļāļēāļĄāđāļāļāļāļĩāđāļāļģāļŦāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāđāļāļāļĢāļ°āļāļ§āļāļāļēāļĢāļŠāļģāļĢāļāļāļāđāļāļĄāļđāļĨ (Data Backup) āđāļĨāļ°āļĄāļĩāļāļąāļāļĐāļ°āđāļāļāļēāļĢāļāļāļŠāļāļāļāļēāļĢāļāļđāđāļāļ·āļāļāđāļāļĄāļđāļĨ (Recovery).
- āļĄāļĩāļāļ§āļēāļĄāļĨāļ°āđāļāļĩāļĒāļāļĢāļāļāļāļāļāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āļāļ§āļāļāļļāļĄāļāļēāļĢāđāļāđāļēāļāļķāļāļĢāļ°āļāļāļāļāļāļāļļāļāļāļĨāļ āļēāļĒāļāļāļ.
- āļāļđāđāļĨāđāļĨāļ°āđāļāđāđāļāļāļąāļāļŦāļēāļāļēāļĢāđāļāđāļāļēāļ Software āđāļāļ·āđāļāļāļāđāļ (1st Tier) āļāļāļāđāļĢāļāļāļĨāļąāđāļ PKN āđāļĨāļ° BSRC.
- āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāļĩāļĄ Support āđāļāļĢāļ°āļāļąāļāļāļąāļāđāļ (ATD) āđāļāļ·āđāļāđāļāđāđāļāļāļąāļāļŦāļēāļāļēāļāđāļāļāļāļīāļ.
- āļāļĢāļ§āļāļŠāļāļāļŠāļāļēāļāļ°āļāļēāļĢāļāļģāļāļēāļāļāļāļāļĢāļ°āļāļāđāļāļĢāļ·āļāļāđāļēāļĒāļāđāļāļĄāļđāļĨ (Traffic Load).
- āļāļĢāļ§āļāļŠāļāļāļāļĨāļāļēāļĢāļŠāļģāļĢāļāļāļāđāļāļĄāļđāļĨ āđāļĨāļ°āļāļāļŠāļāļāļāļēāļĢāļāļđāđāļāļ·āļāļāđāļāļĄāļđāļĨ.
- āļāļģāđāļāļīāļāļāļēāļĢāļāļģāļĢāļļāļāļĢāļąāļāļĐāļē Server āļāļēāļĄāđāļāļāļāļĩāļāļģāļŦāļāļ āđāļĨāļ°āđāļāđāļāđāļāļ·āļāļāļāļēāļĢ Update Patch āļāļāļ Software āļāđāļēāļāđ.
- āļāļĢāļ§āļāļŠāļāļāļāļēāļĢāđāļāđāļē-āļāļāļ āļāļāļ Licensor āļāļĩāđāđāļāđāļēāļĄāļēāļāļĢāļąāļāļāļĢāļļāļ Application āđāļ Server āļāļāļāđāļĢāļāļāļĨāļąāđāļ.
āļāļąāļāļĐāļ°:
Automation, Power BI, Tableau
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Review major claims for fraud indicators, conduct investigations, and gather evidence for resolution including engaging key stakeholders to manage red flag and termination dialogue.
- Use analytics tools to identify patterns, anomalies, and emerging fraud risks.
- Design and maintain dashboards, generate accurate and insightful reports on fraud, trends, case outcomes, and KPIs for leadership.
- Identify inefficiencies in fraud and claims processes; propose and implement solutions leveraging Lean Six Sigma and automation.
- Ensure all investigations adhere to regulatory and internal standards.
- Partner with cross-functional teams to implement fraud prevention measures and share insights.
- Recommend process enhancements and leverage technology for efficiency.
- Explore technology, AI and automation opportunities to enhance fraud detection and reporting capabilities.
- Monitor emerging fraud trends within the insurance industry and update internal controls accordingly.
- Degree in data science, engineering, business administration or equivalent combination of education and experience.
- Data Analyst Professional certificates preferred. Power BI, Tableau Desktop Specialist, Lean Six Sigma or equivalent certification.
- Minimum 5 years data analytics experiences..
āļāļąāļāļĐāļ°:
Network Infrastructure, SAP, Assurance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Participate in the development of IT Audit Programs within assigned areas, covering IT security, applications, and IT processes (e.g., network infrastructure, operating systems, data centers, SAP, and retail systems). Assess whether security risks and vulnerabilities are properly identified and mitigated. Coordinate audit scope and effectiveness with business units and external IT/security specialists..
- Contribute to the design of detailed audit testing procedures in alignment with the approved Audit Program, including the definition of audit scope, sample sizes, audit ...
- Execute audit assignments as assigned by supervisors, performing detailed testing in accordance with established audit methodologies and procedures..
- Review and consolidate audit results, working papers, and supporting evidence prepared by team members in order to analyze audit findings and determine whether further audit procedures or expanded testing are required..
- Evaluate and analyze audit findings, including root causes and risks, and provide recommendations for improvement. Prepare and consolidate audit reports for submission to management for review and consideration..
- Bachelor s degree or higher in Management Information Systems, Information Technology, Computer Science, or other related fields..
- At least 5 years of experience in internal auditing, with a focus on IT audit, IT security controls, or IT-related assurance functions, or other relevant experience (e.g., information security, IT risk and control, IT governance, or IT quality assurance)..
- Strong leadership skills, with the ability to work effectively as part of a team and adapt to changing work environments..
- Strong analytical and systematic thinking skills..
- Proactive and innovative mindset, with the ability to initiate improvements..
- Effective communication and coordination skills..
- Proficiency in computer applications, including MS Office and SAP ERP..
- Professional certifications such as CISA, CISSP, CISM, or other relevant technical certifications will be considered an advantage..
- Working location: The Mall Ramkhamhaeng (Headquarter).
āļāļąāļāļĐāļ°:
Risk Management, Kubernetes, Docker
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
- Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
- Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
- Develop and enforce policies for secure coding, data protection, and incident response.
- Implement robust authentication and authorization mechanisms.
- Conduct regular security assessments, including penetration testing and code reviews.
- Monitor, detect, and respond to security incidents using advanced tools and methodologies.
- Enhance infrastructure security using Kubernetes, Docker, and cloud platforms (GCP, AWS).
- Stay current on emerging threats, vulnerabilities, and security trends, and recommend actionable insights to improve defenses.
- Champion security awareness across the organization, including training sessions and knowledge-sharing activities.
- Ensure compliance with relevant security standards and regulations such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Basic Qualifications.
- Proven expertise in application security, cloud security, and infrastructure security.
- Proficiency in securing systems built with technologies such as Node.js, Golang, Elixir, Python, React, Svelte, or Flutter.
- Experience with tools like Docker, Kubernetes, and cloud services (GCP, AWS).
- Strong understanding of cryptographic principles and secure communication protocols.
- Familiarity with CI/CD pipelines and secure DevOps practices.
- Hands-on experience with security tools for vulnerability scanning, penetration testing, and threat detection.
- Deep understanding of database security, especially with PostgreSQL or other relational or non-relational databases.
- Strong analytical and problem-solving skills with a security-first mindset.
- Excellent communication skills and the ability to collaborate effectively in Agile teams.
- Self-motivation, adaptability, and a strong work ethic.
- Preferred Qualifications.
- Experience leading security initiatives or mentoring other engineers in security best practices.
- Expertise in compliance frameworks such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Advanced knowledge of security monitoring and incident response systems.
- Strong system design skills with a focus on secure architectures and long-term trade-offs.
- A proven track record of securing fast-paced, high-growth tech environments.
- A passion for securing user-centric products and contributing to their success.
- Perks & Benefits.
- Flat Structure As we continue to grow fast, we strive to retain our culture where everyone is heard, contributes, and grows with the company..
- Work-life Harmony We believe that quality time outside of work is important to sustaining a healthy and happy lifestyle.
- Remote Work Hybrid-mode activated! It comes with the package: flexibility, focus and productivity!.
- Urban Office One breath from Phrom Phong BTS. No sweat whatsoever! The office should also feel like a second home so we dedicated a lot of care and resources into building the best environment for you to wake up to every morning.
- Fun Workshop The best relationships are built over new experiences, that s why we have workshops filled with a range of activities for you to look forward to and enjoy.
- Game Tournament It s getting fun and competitive! Challenge doesn t only have to come from work. Own the championship and show the peeps how great of a gamer (and player) you are.
- Group Insurance Health comes first, we know, don t worry, we ve got you covered.
- Health & Wellness Only a healthy army wins the war. We invest to take care of you from physical, mental and happiness-level. Adopted health & wellness applications plus activities to make sure everyone here is on cloud nine
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Compliance, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Invite and give in the moment feedback in a constructive manner.
- Share and collaborate effectively with others.
- Identify and make suggestions for improvements when problems and/or opportunities arise.
- Handle, manipulate and analyse data and information responsibly.
- Follow risk management and compliance procedures.
- Keep up-to-date with developments in area of specialism.
- Communicate confidently in a clear, concise and articulate manner - verbally and in the materials I produce.
- Build and maintain an internal and external network.
- Seek opportunities to learn about how PwC works as a global network of firms.
- Uphold the firm's code of ethics and business conduct.
- Bachelor s degree in Computer Engineering, Computer Science, Information Systems or a related field.
- 0-2 years of experience.
- Be able to utilize your well-rounded skills and experience related to industries to steer your projects to a successful outcome.
- Team player with strong interpersonal, communication skills.
- Be able to work both independently and as part of a team with professionals at all levels.
- Proficiency in spoken and written English & Thai.
- We thank all applicants. Please note that only short-listed candidates will be contacted for interviews.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
- Job Posting End Date.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop, implement, and enforce robust Security Policies and procedures to protect company assets, employees, and customers.
- Manage and optimize Access Control (AC) systems across all bank premises.
- Lead Incident Response efforts, including investigation, resolution, and reporting of security breaches or emergencies.
- Conduct regular Threat Assessment to identify potential security vulnerabilities and develop mitigation strategies.
- Ensure full Regulatory Compliance with all relevant security laws, regulations, and industry standards, including Regulatory Compliance Management.
- Oversee and manage the bank's Security Operations, including surveillance, patrols, and security personnel deployment.
- Implement and maintain effective Risk Management strategies to identify, assess, and mitigate security risks.
- Plan and execute Emergency Management protocols, including drills and crisis communication.
- Conduct Investigative Skills for security incidents, thefts, and other breaches.
- Develop and deliver comprehensive Security Trainings for all employees, including Health And Safety (H&S) Training.
- Evaluate and implement new Security Technologies to enhance the bank's security posture.
- Demonstrate strong Accountability for the overall security performance and outcomes of the bank.
- Job Qualifications Proven experience in a senior security management role, preferably within the financial services industry.
- Extensive knowledge and practical experience in Access Control (AC) systems.
- Demonstrated ability in Incident Response and crisis management.
- Strong understanding of Regulatory Compliance and Regulatory Compliance Management frameworks.
- Expertise in Risk Management methodologies and threat assessment.
- Proficiency in Security Operations and policy enforcement.
- Excellent Investigative Skills with a keen eye for detail.
- Experience in developing and delivering Security Trainings, including Health And Safety (H&S) Training.
- Familiarity with various Security Technologies and their application.
- Strong leadership, communication, and interpersonal skills.
- High level of Accountability and integrity.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
1 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Express
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
- Minimum years experience required.
- 1-2 years of experiences in Cyber - Penetration tester.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Cloud Security, Communication, Conducting Research, Cyber Defense, Cyber Threat Intelligence, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Malware Analysis, Malware Detection Tools, Malware Intelligence Gathering, Malware Research, Malware Reverse Engineering, Malware Sandboxing {+ 11 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Linux, Good Communication Skills, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up-to-date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Microsoft Office
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Serve as the main point of contact for gathering evidence, CCTV footage, and relevant information for assigned fraud cases.
- Coordinate with other relevant teams to prepare for interrogation sessions.
- Participate in the interrogation sessions of offenders,witnesses, and/or other relevant parties.
- Draft investigation reports.
- Act as a CCTV real-time monitor as requested or assigned by the supervisor.
- Participate in security-related projects and tasks as assigned.
- Requirements: Bachelor's degree in Laws, Political Science or related field. (Fresh Graduate is welcome.).
- Availability to work in the office 5 days a week and 1 day from home.
- Minimum of 0-2 years of experience in Fraud Investigation, Fraud Prevention, Loss Prevention, Government Affairs, Government Relations, or Risk Management-related positions.
- Experience in the logistics industry is a plus.
- Previous experience as a Police/Military Official or other government official is advantageous.
- Familiarity with reviewing CCTV footage.
- Skills in offender interrogation or interviewing.
- Strong analytical and problem-solving abilities.
- Excellent interpersonal skills.
- Proficient in GSuite or Microsoft Office.
- Must have a private vehicle and a valid driver's license.
- Availability to be on-call for emergency issues.
āļāļąāļāļĐāļ°:
Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Validates, classifies, priorities and opens ticket.
- Acting as focal contact point for report security incidents.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of security incidents.
- Responds to security alerts generate within the SLA time window.
- Follow-up and tracking security incidents base on team process.
- Examine network topologies to understand data flows through the network.
- Validate security incidents alerts against network traffic using packet analysis tools.
- Isolate or remove malware.
- Identify applications and operating systems of a network device based on network traffic.
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
- Notify cybersecurity service provider team members of suspected cyber incidents, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Who are we looking for?.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Analytical and problem-solving skills are required.
- Knowledge of network traffic analysis methods.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Experience in IT Security, Network Security or Security Compliance.
- Knowledge of common security tools such as anti-virus, firewall and intrusion detection system.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Able to work in shift.
- Location: Head Office: Chatuchak, SJ Infinite One Business Complex
- 1
- 2
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2026
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ
