- No elements found. Consider changing the search query.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
3 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop and implement comprehensive security policies and procedures in compliance with laws and regulations and Shopee regional's security standards.
- Monitor and assess potential security risks, establish preventive measures, and minimize the occurrence of security incidents.
- Coordinate and lead the security team, conducting regular training to build skills and competence of security manpower.
- Maintain a good relationship with local law enforcement agencies to handle potential security incidents and ensure compliance.
- Managing facility and infrastructure support in build up cctv coverage in place ensuring it has managed function as intended including CCTV monitoring.
- Execute security protocol to manage and enforce the compliance of parties involved.
- Summarize monthly KPI and set a monthly meeting with security management team.
- A dequate security manpower is managed during campaign and BAU days.
- To develop body searching standard, frisking process and thief management.
- Guard tour management system.
- Monitor and evaluate the daily, weekly and monthly performance of Security Leaders and Guards to ensure: Perform additional duties as assigned by the reporting manager.
- Requirements:Bachelor's degree or above in Security Management, Occupational health and Safety, or related fields.
- More than 3 years of experience in security management, with a preference for experience in logistics and supply chain/E-commerce business.
- Familiarity with Thai security regulations and International's security management system with strong risk assessment capabilities.
- Qualified TAPA FSR (if applicable) would be advantageous.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Implement, configure, and maintain cybersecurity tools including SIEM, EDR/XDR, and network security solutions.
- Monitor, analyze, and respond to security alerts and incidents.
- Perform log monitoring and security event analysis to detect suspicious or malicious activities.
- Collaborate with IT Infrastructure and Application teams to implement security controls and best practices.
- Perform tuning and optimization of security tools to improve detection accuracy and reduce false positives.
- Conduct vulnerability assessments and support remediation activities.
- Develop and maintain technical documentation, standard operating procedures, playbook, and security guidelines.
- Support incident investigation, forensic analysis, and root cause analysis activities..
- Bachelor s degree in Information Technology, Computer Science, Cybersecurity, or related field.
- 2-5 years of experience in cybersecurity or IT security roles.
- o SIEM platforms
- o Endpoint Detection & Response solutions (e.g., SentinelOne, CrowdStrike)
- o Firewall and Network Security solutions (e.g., Palo Alto)
- Strong understanding of networking, operating systems, and security architecture.
- Strong analytical and problem-solving skills.
- Good teamwork and communication skills.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and oversee Security Operations Center (SOC) activities.
- Manage and coordinate incident response processes across the organization.
- Develop and maintain incident response playbooks and procedures.
- Perform threat intelligence analysis and monitor evolving cyber threat landscapes.
- Conduct security risk analysis and recommend mitigation strategies.
- Collaborate with IT, Risk, Compliance, and Business Units to enhance cybersecurity posture.
- Provide strategic cybersecurity guidance and recommendations to management.
- Mentor and coach SOC and Incident Response team members.
- Support internal and external security audits and compliance activities..
- Bachelor s degree or higher in Cybersecurity, Information Technology, or related field.
- Minimum 7 years of experience in cybersecurity roles.
- Proven experience managing SOC or Incident Response teams.
- Strong knowledge of threat detection, incident handling, and digital forensics.
- Strong understanding of security frameworks and standards such as ISO 27001, NIST, and MITRE ATT&CK.
- Strong analytical, investigative, and problem-solving skills.
- Leadership and team management capabilities.
āļāļąāļāļĐāļ°:
Industry trends, Cloud Computing, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Provide consultancy advice to business and project teams to ensure security standards and requirements are considered and implemented.
- Perform deep dive reviews focused on Cybersecurity Risk, Technology Risk, and Emerging Risk.
- Effective management of all technology risk and cybersecurity framework including technology policies and standards based on the Group's risk appetite.
- Closely monitor technology and cyber related KPIs, KRIs, KCIs and drive remediation actions as Group perspective.
- Timely update on all material technology risk and cybersecurity topics including a set of risk indicators to the relevant Group Risk Committees and forums.
- Oversight the result of control testing from subsidiaries to ensure Cybersecurity and technology controls meet internal and external compliance requirements.
- Conduct technology risk assessments: Identify and evaluate potential risks Management with the organization's technology systems, infrastructure, and processes. Assess the adequacy of controls, identify vulnerabilities, and recommend risk mitigation strategies.
- Develop and implement risk management strategies: Collaborate with stakeholders to develop comprehensive risk management strategies that align with business objectives and regulatory requirements. Implement controls and procedures to mitigate identified risks effectively.
- Monitor technology risk exposure: Continuously monitor technology systems, networks, and processes to identify emerging risks, vulnerabilities, and trends. Stay up-to-date with industry developments, emerging technologies, and regulatory changes to proactively address potential risks.
- Perform risk analysis and reporting: Analyze risk assessment findings, internal control evaluations, and audit reports to identify trends, root causes, and areas of improvement. Prepare detailed reports on risk exposure, mitigation strategies, and recommendations for management and relevant stakeholders.
- Collaborate with cross-functional teams: Work closely with IT teams, compliance officers, cybersecurity professionals, and other stakeholders to develop and implement risk management frameworks, policies, and procedures. Provide guidance and recommendations on technology-related risk management activities.
- Conduct technology risk training and awareness programs: Develop and deliver training programs to educate employees on technology risk management best practices, policies, and procedures. Raise awareness about emerging threats and provide guidance on incident response protocols.
- Assist in incident response and recovery: Support the organization in managing technology-related incidents, including data breaches, system failures, and cybersecurity threats. Coordinate response efforts, assist in recovery measures, and contribute to post-incident reviews and lessons learned.
- Stay updated on industry standards and regulations: Keep abreast of industry trends, emerging technologies, and regulatory requirements related to technology risk management. Provide recommendations on incorporating best practices into the organization's risk management framework.
- Minimum of 5 years experience in Technology and Cyber Risk.
- Bachelor s degree or above in related discipline.
- Working experience or familiar in a group public company.
- Understanding of regulatory requirements such as BOT, OIC, and SEC; industry standards such as COBIT, NIST, ISO27001, ITIL, and PCIDSS.
- Experience in one or more emerging technologies such as Artificial Intelligence, Machine Learning, Distributed Ledger Technology, Robotic Process Automation, Cloud computing.
- Excellent communication and relationship building skills; proven ability to influence senior management.
- Good command of written and spoken in English is preferable.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāļąāļāļāļāļąāļāļāļēāļāļāļļāļāļāļāļāļĒāđāļēāļāđāļāđāļēāđāļāļĩāļĒāļĄ āļāļĨāļđāļāļāļąāļāđāļŦāđāļāļļāļāļāļāļĒāļķāļāļĄāļąāđāļāđāļāļāļēāļĢāļāļĢāļ°āļāļāļāļŠāļąāļĄāļĄāļēāļāļĩāļ āļāļĒāđāļēāļāļĄāļĩāļāļĢāļĢāļĐāļąāļāļ āļīāļāļēāļĨāļāļĩāđāļāļĩ.
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāđāļāļāļēāļĢāļāļąāļāļāļēāļĻāļąāļāļĒāļ āļēāļāļāļāļąāļāļāļēāļāđāļāļāļļāļāđ āļāđāļēāļ āļāđāļ§āļĒāđāļāļĢāđāļāļĢāļĄāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāļļāļāļ āļēāļāđāļŦāđāđāļŦāļĄāļēāļ°āļŠāļĄāļāļąāļāđāļāđāļĨāļ°āļāļ āđāļāļ·āđāļāļĒāļāļĢāļ°āļāļąāļāļāļēāļĢāļāļģāļāļēāļāļāļāļāļāļāļąāļāļāļēāļāļāļĒāđāļēāļāļĄāļ·āļāļāļēāļāļĩāļ.
- āļŠāļģāļāļąāļāļāļēāļāđāļŦāļāđāļāļāļāļāļēāļāļāļēāļ āļāļđāļāļāļāļāđāļāļāđāļŦāđāđāļāđāļ Smart Office and Smart Display Solution āļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļŦāļĢāļđāļŦāļĢāļē āļāļąāļāļŠāļĄāļąāļĒ āđāļĨāļ°āļāļĢāļ°āļŦāļĒāļąāļāļāļĨāļąāļāļāļēāļ.
- āļāļ§āļēāļĄāļāļāļāļļāđāļāđāļāļāļāļĩāđāļāđāļāļ āļāļ·āļāļŦāļąāļ§āđāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļāļąāļāļāļēāļāđāļŦāļĄāđāļāļĩāđāļāđāļēāļ§āđāļāđāļēāļĄāļēāđāļāļāļĢāļāļāļāļĢāļąāļ§āļāļāļāđāļĢāļē.
- āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļāļāļēāļĢāļāļģāļāļēāļāļĒāļąāļāđāļāđāļāļāļĩāļāļŦāļāļķāđāļāļŠāļīāđāļāļāļĩāđāļŠāļģāļāļąāļāļŠāļđāļāļŠāļļāļāļāļāļāļāļļāļĢāļāļīāļāļāļīāđāļāļĢāđāļĨāļĩāļĒāļĄ āļāļąāļāļāļąāđāļāļāļāļąāļāļāļēāļāļāļēāļāļāļēāļāļāļļāļāļāļāļāļķāļāļāđāļāļāļāđāļēāļāļāļēāļĢāļāļāļĢāļĄāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļĨāļ°āļāļēāļāļĩāļ§āļāļāļēāļĄāļąāļĒāļāļĒāđāļēāļāđāļāđāļĄāļāđāļ.
- āļāļāļąāļāļāļēāļāļŠāļāļēāļĒāđāļāđāļāđāļāļąāļāđāļāļĢāđāļāļĢāļĄāļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ OPD/IPD āđāļĨāļ°āđāļĢāļēāļĒāļąāļāđāļŦāđāđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāđāļēāļĢāļąāļāļĐāļēāļāļĒāļēāļāļēāļĨāļŠāļģāļŦāļĢāļąāļāļāļļāļāļāļēāļĢāļĩ.
- Work life balance āļāļ·āļāļŠāļīāđāļāļŠāļģāļāļąāļ āđāļ§āļĨāļēāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāļĒāļ·āļāļŦāļĒāļļāđāļāļāļģāđāļŦāđāļāļļāļāļāļąāļāļŠāļĢāļĢāđāļ§āļĨāļēāđāļāđāļāļĒāđāļēāļāļĨāļāļāļąāļ§.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement and maintain enterprise network support business solutions
- Installing, configuring, designing and support LANs, WANs, WLAN, Firewall, Telephone, Internet and datacenter systems (Cisco, HPE, Palo Auto, Fortinet, ETC.)
- Participation in the documentation processes including network diagrams, staff contacts, vendor contacts, utilization of monitoring/resource/inventory management tools.
- Responsible for External Audit, ISO 27001 and ISO27032.
- Contribute and lead related projects to achieve goals within timeframes.
- Collaborate with cross functional team, vendors and product professionals to effectively troubleshooting and resolve issue with root cause analysis to ensure networks, application and customer service can operate smoothly with efficiency
- Monitor networks performance and connectivity to ensure all services are readiness..
- Bachelor Degree in Computer Sciences, Computer Engineering or related fields
- 3-5 years experience in related field
- Demonstrated in depth knowledge of LAN, WLAN, WAN, OT/IT Network, Firewall, Telephone, Routing protocols with OSPF & BGP and SD-WAN technologies
- Familiar to Cisco, HPE, Palo Auto, Fortinet product with strong knowledge switching, routing, WLAN, 802.1X, network security and datacenter system.
- Good command of English and good communication skill
- Good analytical skill and problem solving skill
- Excellent service mind with positive action
- The desire to work as part of a team in supporting an enterprise level infrastructure..
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Security Design, Big Data, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Shape The Future with Confidence.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
āļāļąāļāļĐāļ°:
Automation
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Monitors client infrastructure and solutions.
- Identifies problems and errors prior to or when they occur.
- Routinely identifies common incidents and opportunities for avoidance as well as general opportunities for incident reduction.
- Investigates first line incidents assigned and identifies the root cause of incidents and problems.
- Provides telephonic or chat support to clients when required.
- Schedules maintenance activity windows for patching and configuration changes.
- Follows the required handover procedures for shift changes to ensure service continuity.
- Reports and escalates incidents where necessary.
- Ensures the efficient and comprehensive resolutions of incidents and requests.
- Updates existing knowledge articles or create new ones.
- Identifies opportunities for work optimization including opportunities for automation of work, request fulfilment, incident resolution, and other general process improvement opportunities.
- May also contribute to / support on project work as and when required.
- May work on implementing and delivering Disaster Recovery functions and tests.
- Performs any other related task as required.
- Ability to communicate and work across different cultures and social groups.
- Ability to plan activities and projects well in advance, and takes into account possible changing circumstances.
- Ability to maintain a positive outlook at work.
- Ability to work well in a pressurized environment.
- Ability to work hard and put in longer hours when it is necessary.
- Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting.
- Ability to adapt to changing circumstances.
- Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey.
- Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience).
- CCNA or relevant level 1 Network Security certification is good to have. Certifications carry additional weight on a candidate s qualification for the role.
- Entry-level experience with troubleshooting and providing the support required in security / network/ data center/ systems/ storage administration and monitoring Services within a medium to large ICT organization.
- Basic knowledge of management agents, redundancy concepts, and products within the supported technical domain (such as Security, Network, Data Centre, Telephony, etc.).
- Working knowledge of ITIL processes.
- On-site Working About NTT DATA
- NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
- Equal Opportunity Employer
- NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Entry-level experience with troubleshooting and providing support in security, network, DATA centre, systems, or storage administration and monitoring services within a medium to large ICT organization.
- Working knowledge of ITIL processes.
- Skills in active listening techniques such as paraphrasing, probing for further relevant information, and refraining from interrupting.
- Highly disciplined in handling of tickets on day-to-day basis. Act promptly as per defined Sop s.
- Try to resolve as many tickets as possible using available Knowledge articles or provided Sop s.
- Good understanding of using ITSM tools.
- Ability to communicate and work across different cultures and social groups.
- Capacity to plan activities and projects well in advance, adapting to changing circumstances as needed.
- Positive outlook and ability to perform well under pressure.
- Eagerness to work diligently and extend hours when necessary.
- Client-centric approach, always putting clients at the forefront of interactions.
- Bachelor's degree or equivalent qualification in IT/Computing or demonstrated equivalent work experience.
- On-site Working About NTT DATA
- NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo.
- Equal Opportunity Employer
- NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
āļāļąāļāļĐāļ°:
Network Infrastructure, Analytical Thinking, Teamwork
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Install, configure, and maintain network infrastructure tools (proxies and reverse-proxies), to ensure a secure and reliable access to corporate resources while following the security policies.
- Implement configuration changes.
- Provide timely subject matter expertise for incidents and requests related to remote access tools.
- Maintain the procedures for these tools.
- Collaborate with internal technical teams, customers, and external strategic partners to deliver and improve high-quality secure networks supporting Accor s global Information System.
- Engage with the whole Cyber Security team to develop security policies, protocols, and procedures.
- Qualifications Bachelor's degree or higher in technology field.
- At least 5 years as a security engineer or architect (if run activities where part of the position), or network engineer - with hands on experience in security solutions.
- Security industry certifications and/or security vendors specific trainings are a plus.
- Mandatory experience with Zscaler, McAfee,.
- Mandatory experience with Imperva, F5.
- Strong knowledge of networking technologies, network security, and network monitoring solutions as well as Zero Trust approach.
- In-depth knowledge of security protocols and principles.
- Knowledge of cloud security principles, such as AWS or Azure.
- Knowledge of security systems, including EPP and EDR, content filtering, authentication systems, and reverse proxies.
- Analytical Thinking: Ability to analyze complex issues and quickly devise effective solutions fitting the business context. Attention to details.
- Communication: Excellent communication skills to convey technical information to both technical and non-technical stakeholders.
- Proactive Approach: A problem-solving mindset with a proactive approach to identify and address security challenges.
- Collaboration: Strong teamwork and collaboration skills to work effectively across departments.
- Continuous Learning: Eagerness to stay updated with the latest security trends and technologies.
- Additional Information This position is based in Bangkok reporting to management in France.
- Worldwide interaction with time zone difference to manage.
āļāļąāļāļĐāļ°:
Teamwork, Compliance, Problem Solving, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Work in Shift.
- We are looking for a highly proficient Cyber Security Consultant who has the professional knowledge and skill to drive and enhance our security solutions in any field at MFEC Cyber Security Operation Center (CSOC) for our large enterprise customers.
- What we want?.
- To find the most efficient way to create and to manage every cyber security solution for multiple clients.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Work in Shift.
- Who are we looking for?.
- 1-3 Years or experience in Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Strong knowledge and experience with various IT security such as Incident Handler, Forensic Examiner, Forensic Analyst is a plus.
- Excellent knowledge in Security Product (Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Proficiency in English both written and spoken.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak, Lao Peng Nguan Building
āļāļąāļāļĐāļ°:
Teamwork, Compliance, Problem Solving
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Grow up in Career path.
- We are looking for talented Cyber Security Engineer to find the most efficient way to create and to manage every cyber security solution for multiple clients.
- What we want?.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Who are we looking for?.
- Experience in IT infrastructure or Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Knowledge in Security Management is advantage. Excellent knowledge in Security Product (Antivirus/Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution is a plus.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak
āļāļąāļāļĐāļ°:
Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Validates, classifies, priorities and opens ticket.
- Acting as focal contact point for report security incidents.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of security incidents.
- Responds to security alerts generate within the SLA time window.
- Follow-up and tracking security incidents base on team process.
- Examine network topologies to understand data flows through the network.
- Validate security incidents alerts against network traffic using packet analysis tools.
- Isolate or remove malware.
- Identify applications and operating systems of a network device based on network traffic.
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
- Notify cybersecurity service provider team members of suspected cyber incidents, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Who are we looking for?.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Analytical and problem-solving skills are required.
- Knowledge of network traffic analysis methods.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Experience in IT Security, Network Security or Security Compliance.
- Knowledge of common security tools such as anti-virus, firewall and intrusion detection system.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Able to work in shift.
- Location: Head Office: Chatuchak, SJ Infinite One Business Complex
āļāļąāļāļĐāļ°:
Risk Management, Kubernetes, Docker
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
- Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
- Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
- Develop and enforce policies for secure coding, data protection, and incident response.
- Implement robust authentication and authorization mechanisms.
- Conduct regular security assessments, including penetration testing and code reviews.
- Monitor, detect, and respond to security incidents using advanced tools and methodologies.
- Enhance infrastructure security using Kubernetes, Docker, and cloud platforms (GCP, AWS).
- Stay current on emerging threats, vulnerabilities, and security trends, and recommend actionable insights to improve defenses.
- Champion security awareness across the organization, including training sessions and knowledge-sharing activities.
- Ensure compliance with relevant security standards and regulations such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Basic QualificationsProven expertise in application security, cloud security, and infrastructure security.
- Proficiency in securing systems built with technologies such as Node.js, Golang, Elixir, Python, React, Svelte, or Flutter.
- Experience with tools like Docker, Kubernetes, and cloud services (GCP, AWS).
- Strong understanding of cryptographic principles and secure communication protocols.
- Familiarity with CI/CD pipelines and secure DevOps practices.
- Hands-on experience with security tools for vulnerability scanning, penetration testing, and threat detection.
- Deep understanding of database security, especially with PostgreSQL or other relational or non-relational databases.
- Strong analytical and problem-solving skills with a security-first mindset.
- Excellent communication skills and the ability to collaborate effectively in Agile teams.
- Self-motivation, adaptability, and a strong work ethic.
- Preferred Qualifications We re especially excited if you bring:Experience leading security initiatives or mentoring other engineers in security best practices.
- Expertise in compliance frameworks such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Advanced knowledge of security monitoring and incident response systems.
- Strong system design skills with a focus on secure architectures and long-term trade-offs.
- A proven track record of securing fast-paced, high-growth tech environments.
- A passion for securing user-centric products and contributing to their success.
- Perks & Benefits Flat Structure As we continue to grow fast, we strive to retain our culture where everyone is heard, contributes, and grows with the company..
- Work-life Harmony We believe that quality time outside of work is important to sustaining a healthy and happy lifestyle.
- Remote Work Hybrid-mode activated! It comes with the package: flexibility, focus and productivity!.
- Urban Office One breath from Phrom Phong BTS. No sweat whatsoever! The office should also feel like a second home so we dedicated a lot of care and resources into building the best environment for you to wake up to every morning.
- Fun Workshop The best relationships are built over new experiences, that s why we have workshops filled with a range of activities for you to look forward to and enjoy.
- Game Tournament It s getting fun and competitive! Challenge doesn t only have to come from work. Own the championship and show the peeps how great of a gamer (and player) you are.
- Group Insurance Health comes first, we know, don t worry, we ve got you covered.
- Health & Wellness Only a healthy army wins the war. We invest to take care of you from physical, mental and happiness-level. Adopted health & wellness applications plus activities to make sure everyone here is on cloud nine
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Microsoft Office
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Serve as the main point of contact for gathering evidence, CCTV footage, and relevant information for assigned fraud cases.
- Coordinate with other relevant teams to prepare for interrogation sessions.
- Participate in the interrogation sessions of offenders,witnesses, and/or other relevant parties.
- Draft investigation reports.
- Act as a CCTV real-time monitor as requested or assigned by the supervisor.
- Participate in security-related projects and tasks as assigned.
- Requirements: Bachelor's degree in Laws, Political Science or related field. (Fresh Graduate is welcome.).
- Availability to work in the office 5 days a week and 1 day from home.
- Minimum of 0-2 years of experience in Fraud Investigation, Fraud Prevention, Loss Prevention, Government Affairs, Government Relations, or Risk Management-related positions.
- Experience in the logistics industry is a plus.
- Previous experience as a Police/Military Official or other government official is advantageous.
- Familiarity with reviewing CCTV footage.
- Skills in offender interrogation or interviewing.
- Strong analytical and problem-solving abilities.
- Excellent interpersonal skills.
- Proficient in GSuite or Microsoft Office.
- Must have a private vehicle and a valid driver's license.
- Availability to be on-call for emergency issues.
āļāļąāļāļĐāļ°:
Linux, Good Communication Skills, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Problem Solving, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Problem Solving, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Linux, Good Communication Skills, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up-to-date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Essential Skills & PrerequisitesBachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
- 1
- 2
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2025
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ
