- No elements found. Consider changing the search query.
āļāļąāļāļĐāļ°:
Social media, Microsoft Office, Mandarin, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Bachelor s Degree or at least Diploma or equivalent in any discipline.
- Must have B2 level English Language proficiency (reading, writing, speaking and aural comprehension) https://www.coe.int/en/web/common-european-framework-reference-languages/level-descriptions.
- Essential Requirements: Experience of working in a high transactional role, in a KPI driven environment.
- A background in either content moderation, customer service or any other role that involves working with daily targets.
- You will have a track record that demonstrates your ability to perform multiple tasks while paying close attention to detail.
- Mentally and emotionally able to handle offensive or disturbing behaviour, language, and content.
- Availability to work rotational shifts.
- Must be able to speak, read and write the required language to support.
- Preferred requirements Deep familiarity with social media, internet laws, policy regulations and market knowledge.
- Content Moderation experience is preferred, but not essential.
- Bachelor's degree is preferred, however not essential.
- Technical Skills: Minimum typing speed of 40wpm with a 90% accuracy score.
- Computer literate and fully conversant in Microsoft Windows and Microsoft Office.
- Responsibilities:Review, classify and/or eliminate content uploaded by users, according to the parameters and policies defined by the client.
- Comply with the key performance indicators defined by the specific client operation and maintain a high level of quality in each case that you review.
- Make timely escalations in accordance with established procedures.
- Comply with corporate confidentiality policies and ensure the appropriate handling of customer information, to guarantee information security.
- Participate in continuous training programs established by the company for optimal development in the role.
- Comply with all instructions and procedures related and complementary to the role.
- Be attentive to the communications that arrive through the different communication channels of the company.
- At TP we care deeply about the Health and Wellness of our employees, and we provide a dedicated Trust & Safety wellness program to promote and support whole person wellness throughout your employment journey. We have dedicated Wellness teams for each account who work to integrate wellness across the entire employee experience and our moderation teams are strongly encouraged to actively participate in training, group sessions, planned activities and initiatives, to foster a culture of Wellness.
- TP is an equal opportunity employer and value diversity in our company. Therefore, we do not discriminate based on race, religion, national origin, gender, sexual orientation, age, marital status, veteran status, disability, or any other protected status.
āļāļąāļāļĐāļ°:
English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Review, classify and/or remove content according to client guidelines, using specific tools and channels.
- Understand and remain updated on changing client policies and guidelines.
- Investigate, resolve, and relay complex content issues to the broader Trust and Safety team.
- Serve as an advocate for the user community.
- Participate in process improvement initiatives that improve quality and efficiency of work.
- Participate in continuous training programs and workgroup discussions for optimal development in the role.
- Engage in conversation around socially sensitive topics with the purpose of keeping our communities safe.
- Basic Qualifications/Skills Needed.
- Strong coping, emotional resilience, and stress-management skills.
- Excellent comprehension and communication skills in English and Lao with strong proficiency in speaking, reading, and writing.
- Ability to perform duties objectively, devoid of inherent biases or personal beliefs, in the best interest of client policies.
- Strong attention to detail.
- Comfort synthesizing and analyzing information from multiple streams.
- Strong critical thinking and decision-making skills.
- Deep familiarity and passion for the internet, internet platforms, and internet culture.
- High affinity and cultural awareness of political and social situations regarding the relevant market and region that will be supported .
- Ability to work well individually and as part of a team.
- Ability to work differing rotations/shifts and non-standard work hours.
- Flexibility in meeting changing business needs in a fast-paced environment.
- Commitment to quality, efficiency, and effectiveness.
- Previous business process outsourcing, customer service, or content moderation experience is a plus.
- Shift timings/requirements to work weekends and holidays.
- Please note that this role requires you to work on shift rotational basis and you will be working 5 days/ week with 2 consecutive rest days.
āļāļąāļāļĐāļ°:
Legal, Procurement
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļģāļŦāļāļāđāļĨāļ°āļāļģāļāļąāļāļāļđāđāļĨāļāđāļĒāļāļēāļĒāļāđāļēāļ IT Governance, Cybersecurity, AI Governance.
- Ensure āļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļāļŠāļāļāļāļĨāđāļāļāļāļąāļāļĄāļēāļāļĢāļāļēāļ āđāļāđāļ ISO 27001, NIST, DJSI.
- āļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļ Legal, HR āđāļĨāļ° Procurement āđāļāļ·āđāļāđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļąāļāļāđāļāļāļģāļŦāļāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļāđāļĒāļāļēāļĒāļāļāļāđāļāļĢ.
- Information Security & Quality SystemāļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢ Information Security Management System (ISMS).
- āļāļģāļŦāļāļ Framework āļāđāļēāļ People, Process āđāļĨāļ° Technology.
- āļāļīāļāļāļēāļĄ Performance, Compliance āđāļĨāļ° Continuous Improvement.
- āļ§āļēāļāđāļāļ Quality System āļĢāļ°āļĒāļ° 3 āļāļĩ (Surveillance & Recertification Audit).
- Policy & Risk ManagementReview / Revamp Policy āđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļąāļāļāļāļŦāļĄāļēāļĒ (āđāļāđāļ PDPA).
- āļāļģ Risk & Operational Review āļāļĢāļāļāļāļĨāļļāļĄāļāļļāļāļŦāļāđāļ§āļĒāļāļēāļ.
- āļāļđāđāļĨ Contract āđāļĨāļ° Internal Policies āđāļŦāđāļāļąāļāļāđāļ Regulatory Changes.
- Audit & Certification ManagementāļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢ Internal & External Audit (āđāļāđāļ BSI).
- āđāļāļĢāļĩāļĒāļĄāļāļāļāđāļāļĢāļŠāļģāļŦāļĢāļąāļ ISO Certification āđāļĨāļ° Surveillance Audit.
- āļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļ Committee āđāļĨāļ° Stakeholders āļāļļāļāļāđāļēāļĒ.
- Strategic Planning & ExecutionāļāļąāļāļāļģāđāļāļāļāļĢāļ°āļāļģāļāļĩāđāļāļ·āđāļāļĢāļāļāļĢāļąāļāļĄāļēāļāļĢāļāļēāļ (ISO, NIST, DJSI).
- Ensure āļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāđāļāđāļāđāļāļāļēāļĄ Timeline (āđāļāđāļ āļāđāļāļāđāļŠāļĢāđāļāļ āļēāļĒāđāļāđāļāļ·āļāļāļāļĢāļāļāļēāļāļĄāļāļāļāļāļļāļāļāļĩ).
- āđāļāļ·āđāļāļĄāđāļĒāļāđāļāļāļāļēāļāļāļąāļ Business Impact āđāļĨāļ° Digital Strategy.
- Stakeholder & Committee ManagementāļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļāļāļđāđāļāļĢāļīāļŦāļēāļĢāļĢāļ°āļāļąāļāļŠāļđāļāđāļĨāļ°āļāļāļ°āļāļĢāļĢāļĄāļāļēāļĢāļāļĢāļīāļĐāļąāļ.
- āđāļāđāļāļāļąāļ§āļāļĨāļēāļāļĢāļ°āļŦāļ§āđāļēāļ D&T, Techno āđāļĨāļ°āļŦāļāđāļ§āļĒāļāļēāļāļāđāļēāļ āđ.
- āļŠāļĢāđāļēāļ Alignment āļāļąāđāļ§āļāļąāđāļāļāļāļāđāļāļĢāļāđāļēāļ Security & Compliance.
- QualificationsRequiredāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļĢāļ°āļāļąāļ Senior / Executive āļāđāļēāļ IT Governance / Cybersecurity / Risk / Compliance.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĢāļāļāđāļēāļ ISO 27001 / NIST / IT Governance Framework.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļ PDPA / Regulatory / Legal Compliance.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĢāļīāļŦāļēāļĢāļāļĩāļĄ āđāļĨāļ°āļāļąāļāđāļāļĨāļ·āđāļāļāļāļāļāđāļāļĢāļāļāļēāļāđāļŦāļāđ.
- PreferredāļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļđāđāļĨ Audit (Internal / External / Certification).
- āđāļāļĒāļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļ Committee āļŦāļĢāļ·āļ Board Level.
- āđāļāđāļēāđāļāļāđāļēāļ Digital Transformation āđāļĨāļ° Enterprise IT.
- Contact Information:-.
- K. Sawarin.
- Office of Human Capital.
- DIGITAL AND TECHNOLOGY SERVICES CO., LTD.
- F.Y.I Center 2525 Rama IV Rd, Khlong Tan, Khlong Toei, Bangkok 10110.
- MRT QSNCC Station Exit 1.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Microsoft Office
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Serve as the main point of contact for gathering evidence, CCTV footage, and relevant information for assigned fraud cases.
- Coordinate with other relevant teams to prepare for interrogation sessions.
- Participate in the interrogation sessions of offenders,witnesses, and/or other relevant parties.
- Draft investigation reports.
- Act as a CCTV real-time monitor as requested or assigned by the supervisor.
- Participate in security-related projects and tasks as assigned.
- Requirements: Bachelor's degree in Laws, Political Science or related field. (Fresh Graduate is welcome.).
- Availability to work in the office 5 days a week and 1 day from home.
- Minimum of 0-2 years of experience in Fraud Investigation, Fraud Prevention, Loss Prevention, Government Affairs, Government Relations, or Risk Management-related positions.
- Experience in the logistics industry is a plus.
- Previous experience as a Police/Military Official or other government official is advantageous.
- Familiarity with reviewing CCTV footage.
- Skills in offender interrogation or interviewing.
- Strong analytical and problem-solving abilities.
- Excellent interpersonal skills.
- Proficient in GSuite or Microsoft Office.
- Must have a private vehicle and a valid driver's license.
- Availability to be on-call for emergency issues.
āļāļąāļāļĐāļ°:
ISO 27001
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļ§āļēāļāđāļāļāđāļĨāļ°āļāļąāļāļāļēāļāđāļĒāļāļēāļĒ āļĄāļēāļāļĢāļāļēāļ āđāļĨāļ°āđāļāļ§āļāļēāļāļāđāļēāļ Cyber Security āđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļąāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļĄāļēāļāļĢāļāļēāļāļŠāļēāļāļĨ.
- āļāļĢāļīāļŦāļēāļĢāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļēāļāđāļāđāļāļāļĢāđ (Cyber Risk Assessment) āļĢāļ§āļĄāļāļķāļāļāļđāđāļĨāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļĄāļĄāļēāļāļĢāļāļēāļ āđāļāđāļ ISO 27001, PDPA, NIST.
- āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāđāļŦāļāļļāļāļēāļĢāļāđāļāđāļēāļ Cyber Security (Incident Response) āđāļāđāļ āļāļēāļĢāđāļāļĄāļāļĩāļāļēāļāđāļŪāļāđāļāļāļĢāđ, Ransomware, Data Breach.
- āļāļĢāļ§āļāļāļąāļ āļāđāļāļāļāļąāļ āđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāļ āļąāļĒāļāļļāļāļāļēāļĄāļāļēāļāđāļāđāļāļāļĢāđ āļāđāļēāļāļĢāļ°āļāļ āđāļāđāļ Firewall, IDS/IPS, SIEM, Endpoint Security.
- āļ§āļīāđāļāļĢāļēāļ°āļŦāđāļ āļąāļĒāļāļļāļāļāļēāļĄāđāļāļīāļāļĢāļļāļ āļāļīāļāļāļēāļĄāđāļāļāđāļāđāļĨāļĒāļĩāđāļŦāļĄāđ āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāļāļ Third-Party Vendors.
- āļāļđāđāļĨāđāļĨāļ°āļŠāļāļąāļāļŠāļāļļāļāļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāļāđāļēāļ Cyber Security āļĢāļ§āļĄāļāļķāļāļāļēāļĢāļāļąāļāļāļģāđāļāļāļŠāļēāļĢ āļĢāļēāļĒāļāļēāļ āđāļĨāļ°āļāļ°āđāļāļĩāļĒāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļ.
- āļ§āļēāļāđāļāļāđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāđāļāļĢāļāļāļēāļĢāļāļīāļāļāļąāđāļāļĢāļ°āļāļ Cyber Security āļĢāļ§āļĄāļāļķāļāđāļāļāļāļēāļĢāļĨāļāļāļļāļāđāļāļ·āđāļāļĢāļāļāļĢāļąāļāļ āļąāļĒāļāļļāļāļāļēāļĄ.
- āļāļąāļāļāļēāļāļąāļāļĐāļ°āļāļĩāļĄāļāļēāļ āļĄāļāļāļŦāļĄāļēāļĒ āļāļīāļāļāļēāļĄ āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāļēāļĢāļāļģāļāļēāļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāļāļĨāļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāđāļĨāļ°āļāļ§āļēāļĄāļāļ·āļāļŦāļāđāļēāđāļāļĢāļāļāļēāļĢāļāđāļēāļ Cyber Security.
- āļāļĢāļīāļāļāļēāļāļĢāļĩāļāđāļēāļāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļŦāļĢāļ·āļāļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđ āļŠāļēāļāļēāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāđāļāļĩāļĒāļāđāļāđāļē.
- āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļāļāļĒāđāļēāļāļāđāļāļĒ 10 āļāļĩ āđāļĨāļ°āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāđāļēāļ Cyber Security āļāļĒāđāļēāļāļāđāļāļĒ 6 āļāļĩ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĢāļīāļŦāļēāļĢāđāļĨāļ°āļāļđāđāļĨāļāļĩāļĄāļāļēāļ.
- āļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļ Cyber Security āđāļāđāļ Network Security, Endpoint Security, Cloud & Application Security, Incident Response.
- āļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļĄāļēāļāļĢāļāļēāļāļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ āđāļāđāļ PDPA, GDPR, ISO/IEC 27001, NIST.
- āļāļąāļāļĐāļ°āļāđāļēāļ Risk Management, Policy Development, Communication āđāļĨāļ° Training.
- Contact Information:-.
- K. Sawarin.
- Office of Human Capital.
- DIGITAL AND TECHNOLOGY SERVICES CO., LTD.
- F.Y.I Center 2525 Rama IV Rd, Khlong Tan, Khlong Toei, Bangkok 10110.
- MRT QSNCC Station Exit 1.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Define, review, and integrate application security requirements across applications and platforms..
- Review and provide input into application security technical architecture, ensuring security considerations are embedded into final design decisions..
- Act as a security architecture lead, owning security decisions across multiple teams and workstreams..
- Collaborate with cross functional teams (architecture, development, infrastructure, and delivery) to ensure security is integrated throughout the SDLC..
- Conduct application security risk assessments, identify vulnerabilities, and recommend appropriate mitigation strategies..
- Provide solutions to cross team security challenges, addressing both technical and business risks..
- Develop and maintain application security standards, policies, and procedures..
- Stay up to date with emerging security threats, technologies, and best practices to continuously improve application security posture..
- Provide guidance, mentoring, and training to team members on application security principles and best practices..
- Act as a trusted advisor to stakeholders, providing security recommendations and influencing key architectural decisions..
- Required Skills & ExperienceStrong experience in Application Security Architecture or Application Security Lead roles..
- Expert proficiency in Application Security, including secure design, threat modeling, and vulnerability management..
- Experience performing application security assessments and translating findings into actionable remediation plans..
- Strong understanding of enterprise application architectures and system integration..
- Proven ability to work across multiple teams and influence architectural and security decisions.
- Strong analytical, problem solving, and communication skills.
- Nice to HaveExperience in enterprise or financial services environments..
- Exposure to digital transformation or large scale platform initiatives..
- Knowledge of secure integration patterns, APIs, and modern application platforms.
- Background in consulting or project based delivery environments..
āļāļąāļāļĐāļ°:
Power BI
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļģāđāļāļīāļāļāļēāļĢāļĢāļ°āļāļąāļāļĢāđāļēāļāļāđāļēāļŦāļĢāļ·āļāļāļĨāļīāļāļ āļąāļāļāđāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļąāļāļāļĩāļĄāđāļēāļŠāļĩāļāđāļēāļ āđ āļāļēāļĄāļāļĩāđāļĢāļ°āļāļļāđāļ āļ.āļĢ.āļ. āļĄāļēāļāļĢāļāļēāļĢāļāđāļāļāļāļąāļāđāļĨāļ°āļāļĢāļēāļāļāļĢāļēāļĄāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļēāļāđāļāļāđāļāđāļĨāļĒāļĩ (āļāļāļąāļāļāļĩāđ 2) āļ.āļĻ. 2568 āđāļĨāļ°āļāļāļŦāļĄāļēāļĒāļāļ·āđāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āđāļŦāđāđāļĨāđāļ§āđāļŠāļĢāđāļāļ āļēāļĒāđāļāđāļ§āļĨāļēāļāļĩāđāļāļģāļŦāļāļ.
- āļŠāļ·āļāļŠāļ§āļāđāļĨāļ°āļāļĒāļēāļĒāļāļĨāļāļĪāļāļīāļāļĢāļĢāļĄāļāļēāļĢāļĢāļąāļāļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāļāļĩāđāļāđāļēāļŠāļāļŠāļąāļĒāļāļāļāļĢāđāļēāļāļāđāļēāļāļĩāđāļāļēāļāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļēāļĢāļāļļāļāļĢāļīāļāļŦāļĢāļ·āļāļāļąāļāļāļĩāļĄāđāļē āđāļāļ·āđāļāļāļģāđāļāļīāļāļāļēāļĢāļĢāļ°āļāļąāļāļŦāļĢāļ·āļāļĒāļāđāļĨāļīāļāļāļēāļĄāđāļāļ§āļāļēāļāļāļĩāđāļāļāļēāļāļēāļĢāļāļģāļŦāļāļ.
- āļĢāļąāļāđāļĢāļ·āđāļāļāļāļĢāļāļĩāļāļēāļĢāļāļāļīāđāļŠāļāļĢāļēāļĒāļāļēāļĢāđāļāđāļāļąāļāļĢ āļĢāļēāļĒāļāļēāļĢāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļĢāđāļēāļāļāđāļēāļāļĩāđāļĢāļąāļāļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļēāļĢāļāļĩāđāđāļāđāļēāļāđāļēāļĒāļāļļāļāļĢāļīāļ āļĢāļ§āļĄāļāļķāļ āļĢāļēāļĒāļāļēāļĢāđāļāđ Wallet Application āļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļē ...
- āļŠāļ·āļāļŠāļ§āļāļāļĢāļāļĩāļāļēāļĢāļāļĢāļ°āļāļģāļāļļāļāļĢāļīāļāļāļĩāđāļāļģāđāļŦāđāļāļāļēāļāļēāļĢāđāļāđāļĢāļąāļāļāļ§āļēāļĄāđāļŠāļĩāļĒāļŦāļēāļĒ āļāļąāđāļāļāđāļāļāļāļēāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļēāļŠāļĄāļēāļāļīāļ āļŦāļĢāļ·āļ Wallet Application āļāļĢāđāļāļĄāļāļīāļāļāļēāļĄāļāļ§āļēāļĄāđāļŠāļĩāļĒāļŦāļēāļĒāļāļ·āļāđāļŦāđāđāļāđāļāļāļēāļāļēāļĢ āđāļĨāļ°āđāļāđāļāļāļ§āļēāļĄāļāļģāđāļāļīāļāļāļāļĩāļāđāļāļāļāļąāļāļāļēāļāļŠāļāļāļŠāļ§āļāđāļŦāđāļāļģāđāļāļīāļāļāļāļĩāļāļąāļāļāļđāđāļāļĢāļ°āļāļģāļāļļāļāļĢāļīāļ āļĢāļ§āļĄāļāļķāļāļāļīāļāļāļēāļĄāļāļĨāļāļāļāļ§āđāļēāļāļāļĩāļāļ°āļāļķāļāļāļĩāđāļŠāļļāļ.
- āļ§āļīāđāļāļĢāļēāļ°āļŦāđāļāđāļāļĄāļđāļĨāļĢāļđāļāđāļāļāļāđāļēāļ āđ āļāļāļāļāļēāļĢāļāļļāļāļĢāļīāļ āļāļąāđāļāļāđāļāļāļāļēāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļēāļŠāļĄāļēāļāļīāļ āļŦāļĢāļ·āļ Wallet Application āđāļāļ·āđāļāļāļģāļŦāļāļāđāļāļ§āļāļēāļāļāļēāļĢāļāđāļāļāļāļąāļāđāļĨāļ°āļāļĢāļēāļāļāļĢāļēāļĄāļāļēāļĢāļāļļāļāļĢāļīāļāļāļĩāđāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāđāļĨāļ°āļŠāļĢāļļāļāļāļĨāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļāļ·āđāļāļāļģāđāļŠāļāļāđāļāđāļāļđāđāļāļąāļāļāļąāļāļāļąāļāļāļē Head of Card & Merchant Fraud Investigation.
- āļāļļāļāļŠāļĄāļāļąāļāļī: āļŠāļģāđāļĢāđāļāļāļēāļĢāļĻāļķāļāļĐāļēāļĢāļ°āļāļąāļāļāļĢāļīāļāļāļēāļāļĢāļĩāļāļķāđāļāđāļāđāļāļŠāļēāļāļēāļāļīāļāļīāļĻāļēāļŠāļāļĢāđ āļĢāļąāļāļĻāļēāļŠāļāļĢāđ āđāļĻāļĢāļĐāļāļĻāļēāļŠāļāļĢāđ āļŠāļąāļāļāļĄāļĻāļēāļŠāļāļĢāđ āļāļĢāļīāļŦāļēāļĢāļāļļāļĢāļāļīāļ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļ·āđāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāļ·āđāļāļāļēāļāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĨāļīāļāļ āļąāļāļāđāļāļāļēāļāļēāļĢ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļŠāļ·āļāļŠāļ§āļāļŠāļāļāļŠāļ§āļāļŦāļĢāļ·āļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāļāļĩāļāļļāļāļĢāļīāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļē Wallet Application āļŦāļĢāļ·āļāļāļĢāļīāļāļēāļĢāļāļēāļāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđāļāļ·āđāļ āđ āļāļāļāļāļāļēāļāļēāļĢ āđāļĄāđāļāđāļāļĒāļāļ§āđāļē 1 āļāļĩ.
- āļĄāļĩāļāļąāļāļĐāļ°āļ āļēāļĐāļēāļāļąāļāļāļĪāļĐāļāļąāđāļāļāđāļēāļāļāļąāļ āļāļđāļ āļāđāļēāļ āđāļĨāļ°āđāļāļĩāļĒāļāđāļāļĢāļ°āļāļąāļāļāļĩ.
- āļŠāļēāļĄāļēāļĢāļāđāļāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđāđāļāđāļāļĩ āđāļāļĒāđāļāļāļēāļ° MS Excel āđāļĨāļ° Power BI āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāļāļąāļāļāļģ Presentation āđāļāļ·āđāļāļāļģāđāļŠāļāļāļāđāļāļĄāļđāļĨāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļŠāļēāļĄāļēāļĢāļāļāļāļīāļāļąāļāļīāļāļēāļāļāļāļāļŠāļāļēāļāļāļĩāđ āļŦāļĢāļ·āļāļāđāļēāļāļāļąāļāļŦāļ§āļąāļ āđāļĨāļ°āļāļāļāđāļ§āļĨāļēāļāļģāļāļēāļĢāđāļāđāļāļēāļĄāļāļ§āļēāļĄāļāļģāđāļāđāļāļāļāļāļāļēāļ.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
āļāļąāļāļĐāļ°:
Industry trends, Cloud Computing, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Provide consultancy advice to business and project teams to ensure security standards and requirements are considered and implemented.
- Perform deep dive reviews focused on Cybersecurity Risk, Technology Risk, and Emerging Risk.
- Effective management of all technology risk and cybersecurity framework including technology policies and standards based on the Group's risk appetite.
- Closely monitor technology and cyber related KPIs, KRIs, KCIs and drive remediation actions as Group perspective.
- Timely update on all material technology risk and cybersecurity topics including a set of risk indicators to the relevant Group Risk Committees and forums.
- Oversight the result of control testing from subsidiaries to ensure Cybersecurity and technology controls meet internal and external compliance requirements.
- Conduct technology risk assessments: Identify and evaluate potential risks Management with the organization's technology systems, infrastructure, and processes. Assess the adequacy of controls, identify vulnerabilities, and recommend risk mitigation strategies.
- Develop and implement risk management strategies: Collaborate with stakeholders to develop comprehensive risk management strategies that align with business objectives and regulatory requirements. Implement controls and procedures to mitigate identified risks effectively.
- Monitor technology risk exposure: Continuously monitor technology systems, networks, and processes to identify emerging risks, vulnerabilities, and trends. Stay up-to-date with industry developments, emerging technologies, and regulatory changes to proactively address potential risks.
- Perform risk analysis and reporting: Analyze risk assessment findings, internal control evaluations, and audit reports to identify trends, root causes, and areas of improvement. Prepare detailed reports on risk exposure, mitigation strategies, and recommendations for management and relevant stakeholders.
- Collaborate with cross-functional teams: Work closely with IT teams, compliance officers, cybersecurity professionals, and other stakeholders to develop and implement risk management frameworks, policies, and procedures. Provide guidance and recommendations on technology-related risk management activities.
- Conduct technology risk training and awareness programs: Develop and deliver training programs to educate employees on technology risk management best practices, policies, and procedures. Raise awareness about emerging threats and provide guidance on incident response protocols.
- Assist in incident response and recovery: Support the organization in managing technology-related incidents, including data breaches, system failures, and cybersecurity threats. Coordinate response efforts, assist in recovery measures, and contribute to post-incident reviews and lessons learned.
- Stay updated on industry standards and regulations: Keep abreast of industry trends, emerging technologies, and regulatory requirements related to technology risk management. Provide recommendations on incorporating best practices into the organization's risk management framework.
- Minimum of 5 years experience in Technology and Cyber Risk.
- Bachelor s degree or above in related discipline.
- Working experience or familiar in a group public company.
- Understanding of regulatory requirements such as BOT, OIC, and SEC; industry standards such as COBIT, NIST, ISO27001, ITIL, and PCIDSS.
- Experience in one or more emerging technologies such as Artificial Intelligence, Machine Learning, Distributed Ledger Technology, Robotic Process Automation, Cloud computing.
- Excellent communication and relationship building skills; proven ability to influence senior management.
- Good command of written and spoken in English is preferable.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and oversee Security Operations Center (SOC) activities.
- Manage and coordinate incident response processes across the organization.
- Develop and maintain incident response playbooks and procedures.
- Perform threat intelligence analysis and monitor evolving cyber threat landscapes.
- Conduct security risk analysis and recommend mitigation strategies.
- Collaborate with IT, Risk, Compliance, and Business Units to enhance cybersecurity posture.
- Provide strategic cybersecurity guidance and recommendations to management.
- Mentor and coach SOC and Incident Response team members.
- Support internal and external security audits and compliance activities..
- Bachelor s degree or higher in Cybersecurity, Information Technology, or related field.
- Minimum 7 years of experience in cybersecurity roles.
- Proven experience managing SOC or Incident Response teams.
- Strong knowledge of threat detection, incident handling, and digital forensics.
- Strong understanding of security frameworks and standards such as ISO 27001, NIST, and MITRE ATT&CK.
- Strong analytical, investigative, and problem-solving skills.
- Leadership and team management capabilities.
āļāļąāļāļĐāļ°:
ISO 27001, DevOps, Swift
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Manage end-to-end cryptographic key lifecycle (generation, distribution, rotation, backup, archival, destruction).
- Administer and operate Hardware Security Modules (HSMs), preferably Thales Luna HSM.
- Define and enforce key management policies and procedures aligned with banking regulations and industry standards (e.g., PCI DSS, ISO 27001).
- Support encryption key integration across banking applications, core systems, payment systems, and digital channels.
- Conduct key ceremonies and maintain audit logs.
- Vault & Secrets Management.
- Administer enterprise vault platforms (e.g., HashiCorp Vault or similar).
- Manage secrets lifecycle (API keys, certificates, tokens, database credentials).
- Configure access control policies, role-based access, and segregation of duties.
- Integrate vault solutions with applications, DevOps pipelines, and cloud/on-prem infrastructure.
- Monitor vault security posture and perform regular health checks.
- Security & Compliance.
- Ensure compliance with regulatory requirements (BOT, PCI DSS, SWIFT CSP, etc.).
- Perform risk assessments related to cryptographic controls.
- Support audit activities and provide evidence for internal/external auditors.
- Participate in incident response related to key compromise or vault breaches.
- Architecture & Improvement.
- Contribute to cryptographic architecture design and secure key management framework.
- Support post-quantum cryptography transition planning (if applicable).
- Recommend best practices and continuous improvements for key and secrets management.
- Apply now if you have these advantages.
- Bachelor s degree or higher in computer science/ data science or any related field.
- Minimum of 3-7 years of experience in Information Security or Cryptography (Banking Financial industries are advantage).
- 3-7+ years of experience in Information Security or Cryptography.
- Hands-on experience with HSM (Thales Luna preferred).
- Experience in Vault or Secrets Management platforms (e.g., HashiCorp Vault).
- Experience in banking or financial services environment is highly preferred..
- Strong understanding of cryptographic principles (PKI, symmetric/asymmetric encryption, TLS, key wrapping, key derivation).
- Experience with key lifecycle management processes.
- Knowledge of PKI, certificate management, and CA integration.
- Familiarity with PCI DSS encryption requirements.
- Scripting skills (e.g., Bash, Python, PowerShell) are a plus.
- Why join Krungsri?.
- As a part of MUFG (Mitsubishi UFJ Financial Group), we a truly a global bank with networks all over the world.
- We offer a striking work-life balance culture with hybrid work policies (3 days in office per week).
- Unbelievable benefits such as attractive bonuses, employee loan with special rates and many more..
- Apply now before this role is close. **.
- FB: Krungsri Career(http://bit.ly/FacebookKrungsriCareer [link removed]).
- LINE: Krungsri Career (http://bit.ly/LineKrungsriCareer [link removed]).
- Talent Acquisition Department
- Bank of Ayudhya Public Company Limited
- 1222 Rama III Rd., Bangpongpang, Yannawa, Bangkok 10120.
- āļŦāļĄāļēāļĒāđāļŦāļāļļ āļāļāļēāļāļēāļĢāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāđāļĨāļ°āļāļ°āļĄāļĩāļāļąāđāļāļāļāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāļđāđāļŠāļĄāļąāļāļĢ āļāđāļāļāļāļĩāđāļāļđāđāļŠāļĄāļąāļāļĢāļāļ°āđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāđāļāđāļēāļĢāđāļ§āļĄāļāļēāļāļāļąāļāļāļāļēāļāļēāļĢāļāļĢāļļāļāļĻāļĢāļĩāļŊ.
- Remark: The bank needs to and will have a process for verifying personal information related to the criminal history of applicants before they are considered for employment with the bank..
- Applicants can read the Personal Data Protection Announcement of the Bank's Human Resources Function by typing the link from the image that stated below.
- EN (https://krungsri.com/b/privacynoticeen).
- āļāļđāđāļŠāļĄāļąāļāļĢāļŠāļēāļĄāļēāļĢāļāļāđāļēāļāļāļĢāļ°āļāļēāļĻāļāļēāļĢāļāļļāđāļĄāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļŠāđāļ§āļāļāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨāļāļāļāļāļāļēāļāļēāļĢāđāļāđāđāļāļĒāļāļēāļĢāļāļīāļĄāļāđāļĨāļīāļāļāđāļāļēāļāļĢāļđāļāļ āļēāļāļāļĩāđāļāļĢāļēāļāļāļāđāļēāļāļĨāđāļēāļ.
- āļ āļēāļĐāļēāđāļāļĒ (https://krungsri.com/b/privacynoticeth).
āļāļąāļāļĐāļ°:
ISO 27001, Python, PowerShell
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŋ60,000 - āļŋ80,000, āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Bachelor's degree in Computer Science, Information Security, or a related field.
- 5 years of experience in IT security and governance.
- Strong understanding of IT security principles, practices, and technologies.
- Knowledge of relevant security standards and regulations (e.g., ISO 27001, NIST, GDPR, HIPAA, PCI DSS).
- Experience with risk assessment and vulnerability management.
- Experience with security incident response and management.
- Strong analytical and problem-solving skills.
- Excellent communication and interpersonal skills.
- Ability to work independently and as part of a team..
- Relevant certifications (e.g., CISSP, CISM, CISA, Security+).
- Experience with cloud security (AWS, Azure, GCP) and On-Premises.
- Experience with security information and event management (SIEM) systems.
- Experience with scripting languages (e.g., Python, PowerShell).
- Experience with penetration testing.
- Ability to maintain confidentiality and handle sensitive information.
- Ability to adapt to changing technologies and security threats.
- Strong attention to detail and organizational skills.
- Ability to create and maintain clear and concise documentation..
- āđāļāļāļąāļŠāļāļĢāļ°āļāļģāļāļĩ.
- āļĨāļēāļāļąāļāļĢāđāļāļ āđāļĄāļ·āđāļāļāđāļāļāļāļĨāļāļāļāļēāļ.
- āļĨāļē Workcation.
- āļāļāļāļāļļāļāļŠāļģāļĢāļāļāđāļĨāļĩāđāļĒāļāļāļĩāļ.
- āļāļĢāļ°āļāļąāļāļŠāļąāļāļāļĄ / āļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ / āļāļĢāļ°āļāļąāļāļāļĩāļ§āļīāļ / āļāļĢāļ°āļāļąāļāļāļļāļāļąāļāļīāđāļŦāļāļļ.
- āļ§āļąāļāļŦāļĒāļļāļāļāļēāļĄāļāļāļŦāļĄāļēāļĒ (āđāļĄāđāļāđāļāļĒāļāļ§āđāļē 13āļ§āļąāļ).
- āļĨāļēāļŦāļĒāļļāļāđāļāđāļāļ·āļāļāđāļāļīāļ.
- āļāļĢāļ§āļāļŠāļļāļāļ āļēāļāļāļĢāļ°āļāļģāļāļĩ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļŠāļĄāļĢāļŠ.
- āļŠāļīāļāļāļīāļāļļāļāļāđāļāļĨāļēāđāļĨāļĩāđāļĒāļāļāļļāļāļĢ.
- āđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāļēāļāļāļāļīāļ.
- Co working Space.
- āļāļīāļāđāļāļ.
- Point āđāļĨāļāļāļāļāļĢāļēāļāļ§āļąāļĨ.
- āļāļĢāļīāļāļēāļĢāļāļĢāļķāļāļĐāļēāļāļąāļāļāļīāļāļ§āļīāļāļĒāļēāļāļāļāđāļĨāļāđ..
- āļāļēāļĢāđāļāļīāļāļāļēāļ.
- BTS: āļŠāļāļēāļāļĩāļŦāļĄāļāļāļīāļ, āļŦāđāļēāđāļĒāļāļĨāļēāļāļāļĢāđāļēāļ§.
- MRT: āļŠāļāļēāļāļĩāļāļŦāļĨāđāļĒāļāļīāļ.
- āļāļĢāļīāļāļēāļĢāđāļĢāļĩāļĒāļāļĢāļāļāđāļēāļ App MuvMi..
- āļāļīāļāļāļēāļĄāļāđāļēāļ§āļŠāļēāļĢāļāļēāļ SC ASSET āđāļāđāļāļĩāđ.
- http://insidesc.scasset.com/..
āļāļąāļāļĐāļ°:
English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Review, classify and/or remove content according to client guidelines, using specific tools and channels.
- Understand and remain updated on changing client policies and guidelines.
- Investigate, resolve, and relay complex content issues to the broader Trust and Safety team.
- Serve as an advocate for the user community.
- Participate in process improvement initiatives that improve quality and efficiency of work.
- Participate in continuous training programs and workgroup discussions for optimal development in the role.
- Engage in conversation around socially sensitive topics with the purpose of keeping our communities safe.
- Basic Qualifications/Skills Needed.
- Strong coping, emotional resilience, and stress-management skills.
- Excellent comprehension and communication skills in English and Mongolian with strong proficiency in speaking, reading, and writing.
- Ability to perform duties objectively, devoid of inherent biases or personal beliefs, in the best interest of client policies.
- Strong attention to detail.
- Comfort synthesizing and analyzing information from multiple streams.
- Strong critical thinking and decision-making skills.
- Deep familiarity and passion for the internet, internet platforms, and internet culture.
- High affinity and cultural awareness of political and social situations regarding the relevant market and region that will be supported .
- Ability to work well individually and as part of a team.
- Ability to work differing rotations/shifts and non-standard work hours.
- Flexibility in meeting changing business needs in a fast-paced environment.
- Commitment to quality, efficiency, and effectiveness.
- Previous business process outsourcing, customer service, or content moderation experience is a plus.
- Shift timings/requirements to work weekends and holidays.
- Please note that this role requires you to work on shift rotational basis and you will be working 5 days/ week with 2 consecutive rest days.
āļāļąāļāļĐāļ°:
Internal Audit
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļĢāļ§āļāļāļēāļĄ internal control āļāļđāđāļĨāļāļļāļāļŦāļāđāļ§āļĒāļāļēāļāđāļāļĩāđāļĒāļ§āļāļąāļāļĢāļ°āļāļ Application āļ āļēāļāļĢāļ§āļĄāļĄāļĩāļāļąāđāļ Cyber security + Application control (asset control).
- āļĢāđāļ§āļĄāļāļąāļāļāļģāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ (Audit Program) āļŦāļāđāļ§āļĒāļĢāļąāļāļāļĢāļ§āļāļāļĩāđāļĢāļąāļāļāļīāļāļāļāļāđāļĨāļ°āļāļģāļŦāļāļāļ§āļīāļāļĩāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļāļ·āđāļāđāļŦāđāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāļĢāļĨāļļāļāļēāļĄāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđ.
- āļāļāļīāļāļąāļāļīāļāļēāļāļāļĢāļ§āļāļŠāļāļāļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒāđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļēāļĄāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļŠāļāļāļāļĩāđāđāļāđāļĢāļąāļāļāļēāļĢāđāļŦāđāļāļāļāļ āđāļĨāļ°āļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļ āļēāļĒāđāļ.
- āļĢāļ§āļāļĢāļ§āļĄ āļ§āļīāđāļāļĢāļēāļ°āļŦāđ āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāđāļāļĄāļđāļĨāļāļĩāđāđāļāđāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ āļāļķāļāļāļ§āļēāļĄāđāļāļĩāļĒāļāļāļāđāļĨāļ°āļāļ§āļēāļĄāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļāļāļāļāļĢāļ°āļāļāļāļ§āļāļāļļāļĄāļ āļēāļĒāđāļ.
- āļāđāļ§āļĒāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļĢāļ°āļāļ IT āđāļāļ·āđāļāļāđāļāļŦāļēāļāļąāļāļŦāļēāđāļĨāļ°āļāđāļāļāļāļāļĢāđāļāļ āļāļĢāđāļāļĄāļāļģāđāļŠāļāļāđāļāļ§āļāļēāļāđāļāļāļēāļĢāļāļĢāļąāļāļāļĢāļļāļāđāļĨāļ°āļāļąāļāļāļēāļĢāļ°āļāļ IT.
- āļ§āļēāļāđāļāļāļāļēāļĢāļāđāļēāđāļāļīāļāļāļēāļĢāļāļēāļĄāļāļĢāļ°āļāļ§āļāļāļēāļĢāđāļĨāļ°āļāļąāđāļāļāļāļāđāļāļāļēāļĢāļĢāļ°āļāļļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāđāļāļĢāļ°āļāļāļŠāļēāļĢāļŠāļāđāļāļĻāļāļāļāļāļāļāđāļāļĢ.
- āļāļĢāļīāļāļāļēāļāļĢāļĩ āđāļāļŠāļēāļāļē āđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ, āļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđ.
- Computer Engineer, Computer Science, Information Technology.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļāđāļāļāļāļīāļāđāļāļĩāđāļĒāļ§āļāļąāļāļŠāļ āļēāļāđāļ§āļāļĨāđāļāļĄāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļŦāļĢāļ·āļ IT Security.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļāļĢāļ°āđāļĄāļīāļ/āļāļĢāļ§āļāļŠāļāļ āļĢāļ°āļāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻāļŦāļĢāļ·āļāļĢāļ°āļāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ 2-3 āļāļĩ.
- āļāđāļēāļāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāđāļēāļ IT Governance āļŦāļĢāļ·āļ IT Best Practice āļŦāļĢāļ·āļāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļŠāļēāļĢāļŠāļāđāļāļĻ (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ).
- āđāļāđāļĢāļąāļāđāļāļĢāļąāļāļĢāļāļāļāļļāļāļ§āļļāļāļīāļāđāļēāļ IT Audit āļŦāļĢāļ·āļāļāđāļēāļ Security (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ)..
- āļ§āļąāļ-āđāļ§āļĨāļē āļāļģāļāļēāļ: 8.30 - 17.00 āļ-āļĻ.
- āļŠāļāļēāļāļāļĩāđāļāļģāļāļēāļ: āļāļēāļāļēāļĢāđāļŠāļāđāļŠāļĄ āļāļāļļāļāļąāļāļĢ.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāļąāļāļāļāļąāļāļāļēāļāļāļļāļāļāļāļāļĒāđāļēāļāđāļāđāļēāđāļāļĩāļĒāļĄ āļāļĨāļđāļāļāļąāļāđāļŦāđāļāļļāļāļāļāļĒāļķāļāļĄāļąāđāļāđāļāļāļēāļĢāļāļĢāļ°āļāļāļāļŠāļąāļĄāļĄāļēāļāļĩāļ āļāļĒāđāļēāļāļĄāļĩāļāļĢāļĢāļĐāļąāļāļ āļīāļāļēāļĨāļāļĩāđāļāļĩ.
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāđāļāļāļēāļĢāļāļąāļāļāļēāļĻāļąāļāļĒāļ āļēāļāļāļāļąāļāļāļēāļāđāļāļāļļāļāđ āļāđāļēāļ āļāđāļ§āļĒāđāļāļĢāđāļāļĢāļĄāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāļļāļāļ āļēāļāđāļŦāđāđāļŦāļĄāļēāļ°āļŠāļĄāļāļąāļāđāļāđāļĨāļ°āļāļ āđāļāļ·āđāļāļĒāļāļĢāļ°āļāļąāļāļāļēāļĢāļāļģāļāļēāļāļāļāļāļāļāļąāļāļāļēāļāļāļĒāđāļēāļāļĄāļ·āļāļāļēāļāļĩāļ.
- āļŠāļģāļāļąāļāļāļēāļāđāļŦāļāđāļāļāļāļāļēāļāļāļēāļ āļāļđāļāļāļāļāđāļāļāđāļŦāđāđāļāđāļ Smart Office and Smart Display Solution āļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļŦāļĢāļđāļŦāļĢāļē āļāļąāļāļŠāļĄāļąāļĒ āđāļĨāļ°āļāļĢāļ°āļŦāļĒāļąāļāļāļĨāļąāļāļāļēāļ.
- āļāļ§āļēāļĄāļāļāļāļļāđāļāđāļāļāļāļĩāđāļāđāļāļ āļāļ·āļāļŦāļąāļ§āđāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļāļąāļāļāļēāļāđāļŦāļĄāđāļāļĩāđāļāđāļēāļ§āđāļāđāļēāļĄāļēāđāļāļāļĢāļāļāļāļĢāļąāļ§āļāļāļāđāļĢāļē.
- āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļāļāļēāļĢāļāļģāļāļēāļāļĒāļąāļāđāļāđāļāļāļĩāļāļŦāļāļķāđāļāļŠāļīāđāļāļāļĩāđāļŠāļģāļāļąāļāļŠāļđāļāļŠāļļāļāļāļāļāļāļļāļĢāļāļīāļāļāļīāđāļāļĢāđāļĨāļĩāļĒāļĄ āļāļąāļāļāļąāđāļāļāļāļąāļāļāļēāļāļāļēāļāļāļēāļāļāļļāļāļāļāļāļķāļāļāđāļāļāļāđāļēāļāļāļēāļĢāļāļāļĢāļĄāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļĨāļ°āļāļēāļāļĩāļ§āļāļāļēāļĄāļąāļĒāļāļĒāđāļēāļāđāļāđāļĄāļāđāļ.
- āļāļāļąāļāļāļēāļāļŠāļāļēāļĒāđāļāđāļāđāļāļąāļāđāļāļĢāđāļāļĢāļĄāļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ OPD/IPD āđāļĨāļ°āđāļĢāļēāļĒāļąāļāđāļŦāđāđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāđāļēāļĢāļąāļāļĐāļēāļāļĒāļēāļāļēāļĨāļŠāļģāļŦāļĢāļąāļāļāļļāļāļāļēāļĢāļĩ.
- Work life balance āļāļ·āļāļŠāļīāđāļāļŠāļģāļāļąāļ āđāļ§āļĨāļēāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāļĒāļ·āļāļŦāļĒāļļāđāļāļāļģāđāļŦāđāļāļļāļāļāļąāļāļŠāļĢāļĢāđāļ§āļĨāļēāđāļāđāļāļĒāđāļēāļāļĨāļāļāļąāļ§.
āļāļąāļāļĐāļ°:
Network Infrastructure, SAP, Assurance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Participate in the development of IT Audit Programs within assigned areas, covering IT security, applications, and IT processes (e.g., network infrastructure, operating systems, data centers, SAP, and retail systems). Assess whether security risks and vulnerabilities are properly identified and mitigated. Coordinate audit scope and effectiveness with business units and external IT/security specialists..
- Contribute to the design of detailed audit testing procedures in alignment with the approved Audit Program, including the definition of audit scope, sample sizes, audit ...
- Execute audit assignments as assigned by supervisors, performing detailed testing in accordance with established audit methodologies and procedures..
- Review and consolidate audit results, working papers, and supporting evidence prepared by team members in order to analyze audit findings and determine whether further audit procedures or expanded testing are required..
- Evaluate and analyze audit findings, including root causes and risks, and provide recommendations for improvement. Prepare and consolidate audit reports for submission to management for review and consideration..
- Bachelor s degree or higher in Management Information Systems, Information Technology, Computer Science, or other related fields..
- At least 5 years of experience in internal auditing, with a focus on IT audit, IT security controls, or IT-related assurance functions, or other relevant experience (e.g., information security, IT risk and control, IT governance, or IT quality assurance)..
- Strong leadership skills, with the ability to work effectively as part of a team and adapt to changing work environments..
- Strong analytical and systematic thinking skills..
- Proactive and innovative mindset, with the ability to initiate improvements..
- Effective communication and coordination skills..
- Proficiency in computer applications, including MS Office and SAP ERP..
- Professional certifications such as CISA, CISSP, CISM, or other relevant technical certifications will be considered an advantage..
- Working location: The Mall Ramkhamhaeng (Headquarter).
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop and implement comprehensive security policies and procedures aligned with organizational standards to ensure robust protection of personnel and assets.
- Lead and coordinate security operations including physical surveillance, access control systems, and emergency response protocols.
- Manage security clearance administration and conduct thorough investigations of security incidents and loss prevention cases.
- Collaborate with law enforcement agencies and internal stakeholders to maintain a secure workplace environment.
- Oversee facility safety programs including fire prevention and emergency preparedness initiatives.
- Proven track record in facilities security management and safety program implementation.
- Strong knowledge of security systems, surveillance techniques, and emergency response protocols.
- Demonstrated ability to develop and enforce security policies and procedures.
- Outstanding leadership skills with experience in managing security personnel.
- Excellent analytical and problem-solving capabilities with strong attention to detail.
- Lead strategic security initiatives that directly impact organizational success.
- Opportunity to build and mentor high-performing security teams.
- Professional development through industry-leading security management practices.
- Dynamic work environment with exposure to cutting-edge security technologies.
- Collaborative culture focused on innovation and continuous improvement.
- Let us learn about you! Apply today.
- Looking to make an IMPACT with your career?.
- When you are thinking about joining a new team, culture matters. At Schneider Electric, our values and behaviors are the foundation for creating a great culture to support business success. We believe that our IMPACT values - Inclusion, Mastery, Purpose, Action, Curiosity, Teamwork - starts with us.
- IMPACT is also your invitation to join Schneider Electric where you can contribute to turning sustainability ambition into actions, no matter what role you play. It is a call to connect your career with the ambition of achieving a more resilient, efficient, and sustainable world.
- We are looking for IMPACT Makers; exceptional people who turn sustainability ambitions into actions at the intersection of automation, electrification, and digitization. We celebrate IMPACT Makers and believe everyone has the potential to be one.
- Become an IMPACT Maker with Schneider Electric - apply today!.
- 36 billion global revenue
- 13% organic growth
- 150 000+ employees in 100+ countries
- 1 on the Global 100 World s most sustainable corporations.
- You must submit an online application to be considered for any position with us. This position will be posted until filled.
- Schneider Electric aspires to be the most inclusive and caring company in the world, by providing equitable opportunities to everyone, everywhere, and ensuring all employees feel uniquely valued and safe to contribute their best. We mirror the diversity of the communities in which we operate, and inclusion is one of our core values. We believe our differences make us stronger as a company and as individuals and we are committed to championing inclusivity in everything we do.At Schneider Electric, we uphold the highest standards of ethics and compliance, and we believe that trust is a foundational value. Our Trust Charter is our Code of Conduct and demonstrates our commitment to ethics, safety, sustainability, quality and cybersecurity, underpinning every aspect of our business and our willingness to behave and respond respectfully and in good faith to all our stakeholders. You can find out more about our Trust Charter here
- Schneider Electric is an Equal Opportunity Employer. It is our policy to provide equal employment and advancement opportunities in the areas of recruiting, hiring, training, transferring, and promoting all qualified individuals regardless of race, religion, color, gender, disability, national origin, ancestry, age, military status, sexual orientation, marital status, or any other legally protected characteristic or conduct.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Security Risk Management: Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Establishment of Policies, Standards, and Procedures:Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Communication and Collaboration with Technology Team:Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Essential Skills & PrerequisitesA positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as the expert in project teams. PERSONAL SKILLS: Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Why Ascend Money?Contribute to a safer digital world.
- Gain hands-on experience with cutting-edge cybersecurity challenges.
- Grow your career in a dynamic, fast-moving environment.
- Don t miss this opportunity to be part of something big! Apply now and take the next step with Ascend Money.
- Apply Now: CLICK
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Compliance, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Invite and give in the moment feedback in a constructive manner.
- Share and collaborate effectively with others.
- Identify and make suggestions for improvements when problems and/or opportunities arise.
- Handle, manipulate and analyse data and information responsibly.
- Follow risk management and compliance procedures.
- Keep up-to-date with developments in area of specialism.
- Communicate confidently in a clear, concise and articulate manner - verbally and in the materials I produce.
- Build and maintain an internal and external network.
- Seek opportunities to learn about how PwC works as a global network of firms.
- Uphold the firm's code of ethics and business conduct.
- Bachelor s degree in Computer Engineering, Computer Science, Information Systems or a related field.
- 0-2 years of experience.
- Be able to utilize your well-rounded skills and experience related to industries to steer your projects to a successful outcome.
- Team player with strong interpersonal, communication skills.
- Be able to work both independently and as part of a team with professionals at all levels.
- Proficiency in spoken and written English & Thai.
- We thank all applicants. Please note that only short-listed candidates will be contacted for interviews.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
- Job Posting End Date.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop, implement, and enforce robust Security Policies and procedures to protect company assets, employees, and customers.
- Manage and optimize Access Control (AC) systems across all bank premises.
- Lead Incident Response efforts, including investigation, resolution, and reporting of security breaches or emergencies.
- Conduct regular Threat Assessment to identify potential security vulnerabilities and develop mitigation strategies.
- Ensure full Regulatory Compliance with all relevant security laws, regulations, and industry standards, including Regulatory Compliance Management.
- Oversee and manage the bank's Security Operations, including surveillance, patrols, and security personnel deployment.
- Implement and maintain effective Risk Management strategies to identify, assess, and mitigate security risks.
- Plan and execute Emergency Management protocols, including drills and crisis communication.
- Conduct Investigative Skills for security incidents, thefts, and other breaches.
- Develop and deliver comprehensive Security Trainings for all employees, including Health And Safety (H&S) Training.
- Evaluate and implement new Security Technologies to enhance the bank's security posture.
- Demonstrate strong Accountability for the overall security performance and outcomes of the bank.
- Job Qualifications Proven experience in a senior security management role, preferably within the financial services industry.
- Extensive knowledge and practical experience in Access Control (AC) systems.
- Demonstrated ability in Incident Response and crisis management.
- Strong understanding of Regulatory Compliance and Regulatory Compliance Management frameworks.
- Expertise in Risk Management methodologies and threat assessment.
- Proficiency in Security Operations and policy enforcement.
- Excellent Investigative Skills with a keen eye for detail.
- Experience in developing and delivering Security Trainings, including Health And Safety (H&S) Training.
- Familiarity with various Security Technologies and their application.
- Strong leadership, communication, and interpersonal skills.
- High level of Accountability and integrity.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
- 1
- 2
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2026
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ
