- No elements found. Consider changing the search query.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
3 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Express, Good Communication Skills, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Define CCTV governance framework, SOPs, and monitoring standards.
- Monitor ground operations through 24-hour CCTV surveillance.
- Provide executive-level reporting on surveillance performance.
- Lead new site CCTV setup and system upgrades (e.g., resolution upgrades, storage expansion).
- Approve surveillance design based on risk assessment.
- Establish preventive maintenance programs.
- Monitor uptime, recording functionality, and vendor SLA.
- Ensure CCTV system availability across critical sites.
- Lead AI-enabled CCTV roadmap and pilot testing.
- Define AI use cases aligned to fraud and security risk.
- Improve detection accuracy and reduce false positives.
- Lead CCTV Command Center team.
- Manage vendors and system performance.
- Provide ad-hoc security support as requested, including.
- Requirements: Bachelor s degree in any related field (IT or engineering is advantageous).
- 3+ years in CCTV / Physical Security Operations.
- Experience leading multi-site CCTV implementation.
- Experience with AI surveillance systems is advantage.
- Good communication skills in both Thai and English for coordination with related teams.
- Basic proficiency in G-suite and documentation/report writing.
āļāļąāļāļĐāļ°:
System Security
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop AIA's information technology security procedures and overall cyber security framework.
- Evaluate, test, recommend, coordinate, monitor and maintain IT security policies, procedures and systems including access management for both hardware and software.
- Design, implement and troubleshoot various information systems and cyber security software to identify security risks and exposures.
- Determine the causes of security violations and suggest procedures to halt future incidents.
- Conduct evaluation and testing of hardware and software for possible impact on system security.
- Investigate and resolve security incidents such as intrusion, frauds, cyber-attacks or data leakage.
- Responsible for other relating tasks as assigned to align with business policy and build long term business growth.
- Explore opportunity to improve workflow and build healthy environment.
- Build a career with us as we help our customers and the community live Healthier, Longer, Better Lives.
- In accordance with recruitment policy and hiring standard of AIA (Thailand) Company Limited, after completing the selection process, you are required for criminal background check before joining the company. Your criminal record information will be retained according to the PDPA policy of the company. As per attached link
- https://www.aia.co.th/th/about-aia/privacy/candidate Build a career with us as we help our customers and the community live Healthier, Longer, Better Lives. You must provide all requested information, including Personal Data, to be considered for this career opportunity. Failure to provide such information may influence the processing and outcome of your application. You are responsible for ensuring that the information you submit is accurate and up-to-date.
āļāļąāļāļĐāļ°:
Social media, Microsoft Office, Mandarin, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Bachelor s Degree or at least Diploma or equivalent in any discipline.
- Must have B2 level English Language proficiency (reading, writing, speaking and aural comprehension) https://www.coe.int/en/web/common-european-framework-reference-languages/level-descriptions.
- Essential Requirements: Experience of working in a high transactional role, in a KPI driven environment.
- A background in either content moderation, customer service or any other role that involves working with daily targets.
- You will have a track record that demonstrates your ability to perform multiple tasks while paying close attention to detail.
- Mentally and emotionally able to handle offensive or disturbing behaviour, language, and content.
- Availability to work rotational shifts.
- Must be able to speak, read and write the required language to support.
- Preferred requirements Deep familiarity with social media, internet laws, policy regulations and market knowledge.
- Content Moderation experience is preferred, but not essential.
- Bachelor's degree is preferred, however not essential.
- Technical Skills: Minimum typing speed of 40wpm with a 90% accuracy score.
- Computer literate and fully conversant in Microsoft Windows and Microsoft Office.
- Responsibilities:Review, classify and/or eliminate content uploaded by users, according to the parameters and policies defined by the client.
- Comply with the key performance indicators defined by the specific client operation and maintain a high level of quality in each case that you review.
- Make timely escalations in accordance with established procedures.
- Comply with corporate confidentiality policies and ensure the appropriate handling of customer information, to guarantee information security.
- Participate in continuous training programs established by the company for optimal development in the role.
- Comply with all instructions and procedures related and complementary to the role.
- Be attentive to the communications that arrive through the different communication channels of the company.
- At TP we care deeply about the Health and Wellness of our employees, and we provide a dedicated Trust & Safety wellness program to promote and support whole person wellness throughout your employment journey. We have dedicated Wellness teams for each account who work to integrate wellness across the entire employee experience and our moderation teams are strongly encouraged to actively participate in training, group sessions, planned activities and initiatives, to foster a culture of Wellness.
- TP is an equal opportunity employer and value diversity in our company. Therefore, we do not discriminate based on race, religion, national origin, gender, sexual orientation, age, marital status, veteran status, disability, or any other protected status.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Define, review, and integrate application security requirements across applications and platforms..
- Review and provide input into application security technical architecture, ensuring security considerations are embedded into final design decisions..
- Act as a security architecture lead, owning security decisions across multiple teams and workstreams..
- Collaborate with cross functional teams (architecture, development, infrastructure, and delivery) to ensure security is integrated throughout the SDLC..
- Conduct application security risk assessments, identify vulnerabilities, and recommend appropriate mitigation strategies..
- Provide solutions to cross team security challenges, addressing both technical and business risks..
- Develop and maintain application security standards, policies, and procedures..
- Stay up to date with emerging security threats, technologies, and best practices to continuously improve application security posture..
- Provide guidance, mentoring, and training to team members on application security principles and best practices..
- Act as a trusted advisor to stakeholders, providing security recommendations and influencing key architectural decisions..
- Required Skills & ExperienceStrong experience in Application Security Architecture or Application Security Lead roles..
- Expert proficiency in Application Security, including secure design, threat modeling, and vulnerability management..
- Experience performing application security assessments and translating findings into actionable remediation plans..
- Strong understanding of enterprise application architectures and system integration..
- Proven ability to work across multiple teams and influence architectural and security decisions.
- Strong analytical, problem solving, and communication skills.
- Nice to HaveExperience in enterprise or financial services environments..
- Exposure to digital transformation or large scale platform initiatives..
- Knowledge of secure integration patterns, APIs, and modern application platforms.
- Background in consulting or project based delivery environments..
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāļąāļāļāļāļąāļāļāļēāļāļāļļāļāļāļāļāļĒāđāļēāļāđāļāđāļēāđāļāļĩāļĒāļĄ āļāļĨāļđāļāļāļąāļāđāļŦāđāļāļļāļāļāļāļĒāļķāļāļĄāļąāđāļāđāļāļāļēāļĢāļāļĢāļ°āļāļāļāļŠāļąāļĄāļĄāļēāļāļĩāļ āļāļĒāđāļēāļāļĄāļĩāļāļĢāļĢāļĐāļąāļāļ āļīāļāļēāļĨāļāļĩāđāļāļĩ.
- āđāļĢāļēāđāļŦāđāļāļ§āļēāļĄāļŠāļģāļāļąāļāļāđāļāļāļēāļĢāļāļąāļāļāļēāļĻāļąāļāļĒāļ āļēāļāļāļāļąāļāļāļēāļāđāļāļāļļāļāđ āļāđāļēāļ āļāđāļ§āļĒāđāļāļĢāđāļāļĢāļĄāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāļļāļāļ āļēāļāđāļŦāđāđāļŦāļĄāļēāļ°āļŠāļĄāļāļąāļāđāļāđāļĨāļ°āļāļ āđāļāļ·āđāļāļĒāļāļĢāļ°āļāļąāļāļāļēāļĢāļāļģāļāļēāļāļāļāļāļāļāļąāļāļāļēāļāļāļĒāđāļēāļāļĄāļ·āļāļāļēāļāļĩāļ.
- āļŠāļģāļāļąāļāļāļēāļāđāļŦāļāđāļāļāļāļāļēāļāļāļēāļ āļāļđāļāļāļāļāđāļāļāđāļŦāđāđāļāđāļ Smart Office and Smart Display Solution āļāļĩāđāļĄāļĩāļāļ§āļēāļĄāļŦāļĢāļđāļŦāļĢāļē āļāļąāļāļŠāļĄāļąāļĒ āđāļĨāļ°āļāļĢāļ°āļŦāļĒāļąāļāļāļĨāļąāļāļāļēāļ.
- āļāļ§āļēāļĄāļāļāļāļļāđāļāđāļāļāļāļĩāđāļāđāļāļ āļāļ·āļāļŦāļąāļ§āđāļāđāļāļāļēāļĢāļāļđāđāļĨāļāļāļąāļāļāļēāļāđāļŦāļĄāđāļāļĩāđāļāđāļēāļ§āđāļāđāļēāļĄāļēāđāļāļāļĢāļāļāļāļĢāļąāļ§āļāļāļāđāļĢāļē.
- āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļāļāļēāļĢāļāļģāļāļēāļāļĒāļąāļāđāļāđāļāļāļĩāļāļŦāļāļķāđāļāļŠāļīāđāļāļāļĩāđāļŠāļģāļāļąāļāļŠāļđāļāļŠāļļāļāļāļāļāļāļļāļĢāļāļīāļāļāļīāđāļāļĢāđāļĨāļĩāļĒāļĄ āļāļąāļāļāļąāđāļāļāļāļąāļāļāļēāļāļāļēāļāļāļēāļāļāļļāļāļāļāļāļķāļāļāđāļāļāļāđāļēāļāļāļēāļĢāļāļāļĢāļĄāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāđāļĨāļ°āļāļēāļāļĩāļ§āļāļāļēāļĄāļąāļĒāļāļĒāđāļēāļāđāļāđāļĄāļāđāļ.
- āļāļāļąāļāļāļēāļāļŠāļāļēāļĒāđāļāđāļāđāļāļąāļāđāļāļĢāđāļāļĢāļĄāļāļĢāļ°āļāļąāļāļŠāļļāļāļ āļēāļ OPD/IPD āđāļĨāļ°āđāļĢāļēāļĒāļąāļāđāļŦāđāđāļāļīāļāļāđāļ§āļĒāđāļŦāļĨāļ·āļāļāđāļēāļĢāļąāļāļĐāļēāļāļĒāļēāļāļēāļĨāļŠāļģāļŦāļĢāļąāļāļāļļāļāļāļēāļĢāļĩ.
- Work life balance āļāļ·āļāļŠāļīāđāļāļŠāļģāļāļąāļ āđāļ§āļĨāļēāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāļĒāļ·āļāļŦāļĒāļļāđāļāļāļģāđāļŦāđāļāļļāļāļāļąāļāļŠāļĢāļĢāđāļ§āļĨāļēāđāļāđāļāļĒāđāļēāļāļĨāļāļāļąāļ§.
āļāļąāļāļĐāļ°:
ISO 27001
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļ§āļēāļāđāļāļāđāļĨāļ°āļāļąāļāļāļēāļāđāļĒāļāļēāļĒ āļĄāļēāļāļĢāļāļēāļ āđāļĨāļ°āđāļāļ§āļāļēāļāļāđāļēāļ Cyber Security āđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļąāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļĄāļēāļāļĢāļāļēāļāļŠāļēāļāļĨ.
- āļāļĢāļīāļŦāļēāļĢāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļēāļāđāļāđāļāļāļĢāđ (Cyber Risk Assessment) āļĢāļ§āļĄāļāļķāļāļāļđāđāļĨāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļĄāļĄāļēāļāļĢāļāļēāļ āđāļāđāļ ISO 27001, PDPA, NIST.
- āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāđāļŦāļāļļāļāļēāļĢāļāđāļāđāļēāļ Cyber Security (Incident Response) āđāļāđāļ āļāļēāļĢāđāļāļĄāļāļĩāļāļēāļāđāļŪāļāđāļāļāļĢāđ, Ransomware, Data Breach.
- āļāļĢāļ§āļāļāļąāļ āļāđāļāļāļāļąāļ āđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāļ āļąāļĒāļāļļāļāļāļēāļĄāļāļēāļāđāļāđāļāļāļĢāđ āļāđāļēāļāļĢāļ°āļāļ āđāļāđāļ Firewall, IDS/IPS, SIEM, Endpoint Security.
- āļ§āļīāđāļāļĢāļēāļ°āļŦāđāļ āļąāļĒāļāļļāļāļāļēāļĄāđāļāļīāļāļĢāļļāļ āļāļīāļāļāļēāļĄāđāļāļāđāļāđāļĨāļĒāļĩāđāļŦāļĄāđ āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāļāļ Third-Party Vendors.
- āļāļđāđāļĨāđāļĨāļ°āļŠāļāļąāļāļŠāļāļļāļāļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāļāđāļēāļ Cyber Security āļĢāļ§āļĄāļāļķāļāļāļēāļĢāļāļąāļāļāļģāđāļāļāļŠāļēāļĢ āļĢāļēāļĒāļāļēāļ āđāļĨāļ°āļāļ°āđāļāļĩāļĒāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļ.
- āļ§āļēāļāđāļāļāđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāđāļāļĢāļāļāļēāļĢāļāļīāļāļāļąāđāļāļĢāļ°āļāļ Cyber Security āļĢāļ§āļĄāļāļķāļāđāļāļāļāļēāļĢāļĨāļāļāļļāļāđāļāļ·āđāļāļĢāļāļāļĢāļąāļāļ āļąāļĒāļāļļāļāļāļēāļĄ.
- āļāļąāļāļāļēāļāļąāļāļĐāļ°āļāļĩāļĄāļāļēāļ āļĄāļāļāļŦāļĄāļēāļĒ āļāļīāļāļāļēāļĄ āđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāļēāļĢāļāļģāļāļēāļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāļāļĨāļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāđāļĨāļ°āļāļ§āļēāļĄāļāļ·āļāļŦāļāđāļēāđāļāļĢāļāļāļēāļĢāļāđāļēāļ Cyber Security.
- āļāļĢāļīāļāļāļēāļāļĢāļĩāļāđāļēāļāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļŦāļĢāļ·āļāļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđ āļŠāļēāļāļēāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāđāļāļĩāļĒāļāđāļāđāļē.
- āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļāļāļĒāđāļēāļāļāđāļāļĒ 10 āļāļĩ āđāļĨāļ°āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāđāļēāļ Cyber Security āļāļĒāđāļēāļāļāđāļāļĒ 6 āļāļĩ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĢāļīāļŦāļēāļĢāđāļĨāļ°āļāļđāđāļĨāļāļĩāļĄāļāļēāļ.
- āļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļ Cyber Security āđāļāđāļ Network Security, Endpoint Security, Cloud & Application Security, Incident Response.
- āļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļĄāļēāļāļĢāļāļēāļāļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ āđāļāđāļ PDPA, GDPR, ISO/IEC 27001, NIST.
- āļāļąāļāļĐāļ°āļāđāļēāļ Risk Management, Policy Development, Communication āđāļĨāļ° Training.
- Contact Information:-.
- K. Sawarin.
- Office of Human Capital.
- DIGITAL AND TECHNOLOGY SERVICES CO., LTD.
- F.Y.I Center 2525 Rama IV Rd, Khlong Tan, Khlong Toei, Bangkok 10110.
- MRT QSNCC Station Exit 1.
āļāļąāļāļĐāļ°:
Legal, Procurement
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļģāļŦāļāļāđāļĨāļ°āļāļģāļāļąāļāļāļđāđāļĨāļāđāļĒāļāļēāļĒāļāđāļēāļ IT Governance, Cybersecurity, AI Governance.
- Ensure āļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļāļŠāļāļāļāļĨāđāļāļāļāļąāļāļĄāļēāļāļĢāļāļēāļ āđāļāđāļ ISO 27001, NIST, DJSI.
- āļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļ Legal, HR āđāļĨāļ° Procurement āđāļāļ·āđāļāđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļąāļāļāđāļāļāļģāļŦāļāļāļāļāļŦāļĄāļēāļĒāđāļĨāļ°āļāđāļĒāļāļēāļĒāļāļāļāđāļāļĢ.
- Information Security & Quality SystemāļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢ Information Security Management System (ISMS).
- āļāļģāļŦāļāļ Framework āļāđāļēāļ People, Process āđāļĨāļ° Technology.
- āļāļīāļāļāļēāļĄ Performance, Compliance āđāļĨāļ° Continuous Improvement.
- āļ§āļēāļāđāļāļ Quality System āļĢāļ°āļĒāļ° 3 āļāļĩ (Surveillance & Recertification Audit).
- Policy & Risk ManagementReview / Revamp Policy āđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļąāļāļāļāļŦāļĄāļēāļĒ (āđāļāđāļ PDPA).
- āļāļģ Risk & Operational Review āļāļĢāļāļāļāļĨāļļāļĄāļāļļāļāļŦāļāđāļ§āļĒāļāļēāļ.
- āļāļđāđāļĨ Contract āđāļĨāļ° Internal Policies āđāļŦāđāļāļąāļāļāđāļ Regulatory Changes.
- Audit & Certification ManagementāļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢ Internal & External Audit (āđāļāđāļ BSI).
- āđāļāļĢāļĩāļĒāļĄāļāļāļāđāļāļĢāļŠāļģāļŦāļĢāļąāļ ISO Certification āđāļĨāļ° Surveillance Audit.
- āļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļ Committee āđāļĨāļ° Stakeholders āļāļļāļāļāđāļēāļĒ.
- Strategic Planning & ExecutionāļāļąāļāļāļģāđāļāļāļāļĢāļ°āļāļģāļāļĩāđāļāļ·āđāļāļĢāļāļāļĢāļąāļāļĄāļēāļāļĢāļāļēāļ (ISO, NIST, DJSI).
- Ensure āļāļēāļĢāļāļģāđāļāļīāļāļāļēāļāđāļāđāļāđāļāļāļēāļĄ Timeline (āđāļāđāļ āļāđāļāļāđāļŠāļĢāđāļāļ āļēāļĒāđāļāđāļāļ·āļāļāļāļĢāļāļāļēāļāļĄāļāļāļāļāļļāļāļāļĩ).
- āđāļāļ·āđāļāļĄāđāļĒāļāđāļāļāļāļēāļāļāļąāļ Business Impact āđāļĨāļ° Digital Strategy.
- Stakeholder & Committee ManagementāļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļāļāļđāđāļāļĢāļīāļŦāļēāļĢāļĢāļ°āļāļąāļāļŠāļđāļāđāļĨāļ°āļāļāļ°āļāļĢāļĢāļĄāļāļēāļĢāļāļĢāļīāļĐāļąāļ.
- āđāļāđāļāļāļąāļ§āļāļĨāļēāļāļĢāļ°āļŦāļ§āđāļēāļ D&T, Techno āđāļĨāļ°āļŦāļāđāļ§āļĒāļāļēāļāļāđāļēāļ āđ.
- āļŠāļĢāđāļēāļ Alignment āļāļąāđāļ§āļāļąāđāļāļāļāļāđāļāļĢāļāđāļēāļ Security & Compliance.
- QualificationsRequiredāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļĢāļ°āļāļąāļ Senior / Executive āļāđāļēāļ IT Governance / Cybersecurity / Risk / Compliance.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĢāļāļāđāļēāļ ISO 27001 / NIST / IT Governance Framework.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļ PDPA / Regulatory / Legal Compliance.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļĢāļīāļŦāļēāļĢāļāļĩāļĄ āđāļĨāļ°āļāļąāļāđāļāļĨāļ·āđāļāļāļāļāļāđāļāļĢāļāļāļēāļāđāļŦāļāđ.
- PreferredāļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļđāđāļĨ Audit (Internal / External / Certification).
- āđāļāļĒāļāļģāļāļēāļāļĢāđāļ§āļĄāļāļąāļ Committee āļŦāļĢāļ·āļ Board Level.
- āđāļāđāļēāđāļāļāđāļēāļ Digital Transformation āđāļĨāļ° Enterprise IT.
- Contact Information:-.
- K. Sawarin.
- Office of Human Capital.
- DIGITAL AND TECHNOLOGY SERVICES CO., LTD.
- F.Y.I Center 2525 Rama IV Rd, Khlong Tan, Khlong Toei, Bangkok 10110.
- MRT QSNCC Station Exit 1.
āļāļąāļāļĐāļ°:
Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Validates, classifies, priorities and opens ticket.
- Acting as focal contact point for report security incidents.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Provide daily summary reports of security incidents.
- Responds to security alerts generate within the SLA time window.
- Follow-up and tracking security incidents base on team process.
- Examine network topologies to understand data flows through the network.
- Validate security incidents alerts against network traffic using packet analysis tools.
- Isolate or remove malware.
- Identify applications and operating systems of a network device based on network traffic.
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.
- Notify cybersecurity service provider team members of suspected cyber incidents, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Who are we looking for?.
- Knowledge of computer networking concepts and protocols, and network security methodologies.
- Analytical and problem-solving skills are required.
- Knowledge of network traffic analysis methods.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Experience in IT Security, Network Security or Security Compliance.
- Knowledge of common security tools such as anti-virus, firewall and intrusion detection system.
- Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. Able to work in shift.
- Location: Head Office: Chatuchak, SJ Infinite One Business Complex
āļāļąāļāļĐāļ°:
Teamwork, Compliance, Problem Solving, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Work in Shift.
- We are looking for a highly proficient Cyber Security Consultant who has the professional knowledge and skill to drive and enhance our security solutions in any field at MFEC Cyber Security Operation Center (CSOC) for our large enterprise customers.
- What we want?.
- To find the most efficient way to create and to manage every cyber security solution for multiple clients.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Work in Shift.
- Who are we looking for?.
- 1-3 Years or experience in Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Strong knowledge and experience with various IT security such as Incident Handler, Forensic Examiner, Forensic Analyst is a plus.
- Excellent knowledge in Security Product (Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Proficiency in English both written and spoken.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak, Lao Peng Nguan Building
āļāļąāļāļĐāļ°:
Industry trends, Cloud Computing, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Provide consultancy advice to business and project teams to ensure security standards and requirements are considered and implemented.
- Perform deep dive reviews focused on Cybersecurity Risk, Technology Risk, and Emerging Risk.
- Effective management of all technology risk and cybersecurity framework including technology policies and standards based on the Group's risk appetite.
- Closely monitor technology and cyber related KPIs, KRIs, KCIs and drive remediation actions as Group perspective.
- Timely update on all material technology risk and cybersecurity topics including a set of risk indicators to the relevant Group Risk Committees and forums.
- Oversight the result of control testing from subsidiaries to ensure Cybersecurity and technology controls meet internal and external compliance requirements.
- Conduct technology risk assessments: Identify and evaluate potential risks Management with the organization's technology systems, infrastructure, and processes. Assess the adequacy of controls, identify vulnerabilities, and recommend risk mitigation strategies.
- Develop and implement risk management strategies: Collaborate with stakeholders to develop comprehensive risk management strategies that align with business objectives and regulatory requirements. Implement controls and procedures to mitigate identified risks effectively.
- Monitor technology risk exposure: Continuously monitor technology systems, networks, and processes to identify emerging risks, vulnerabilities, and trends. Stay up-to-date with industry developments, emerging technologies, and regulatory changes to proactively address potential risks.
- Perform risk analysis and reporting: Analyze risk assessment findings, internal control evaluations, and audit reports to identify trends, root causes, and areas of improvement. Prepare detailed reports on risk exposure, mitigation strategies, and recommendations for management and relevant stakeholders.
- Collaborate with cross-functional teams: Work closely with IT teams, compliance officers, cybersecurity professionals, and other stakeholders to develop and implement risk management frameworks, policies, and procedures. Provide guidance and recommendations on technology-related risk management activities.
- Conduct technology risk training and awareness programs: Develop and deliver training programs to educate employees on technology risk management best practices, policies, and procedures. Raise awareness about emerging threats and provide guidance on incident response protocols.
- Assist in incident response and recovery: Support the organization in managing technology-related incidents, including data breaches, system failures, and cybersecurity threats. Coordinate response efforts, assist in recovery measures, and contribute to post-incident reviews and lessons learned.
- Stay updated on industry standards and regulations: Keep abreast of industry trends, emerging technologies, and regulatory requirements related to technology risk management. Provide recommendations on incorporating best practices into the organization's risk management framework.
- Minimum of 5 years experience in Technology and Cyber Risk.
- Bachelor s degree or above in related discipline.
- Working experience or familiar in a group public company.
- Understanding of regulatory requirements such as BOT, OIC, and SEC; industry standards such as COBIT, NIST, ISO27001, ITIL, and PCIDSS.
- Experience in one or more emerging technologies such as Artificial Intelligence, Machine Learning, Distributed Ledger Technology, Robotic Process Automation, Cloud computing.
- Excellent communication and relationship building skills; proven ability to influence senior management.
- Good command of written and spoken in English is preferable.
āļāļąāļāļĐāļ°:
Contracts, Network Administration, Project Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Designs and plans network solutions, including LAN, WAN, data center, and cloud networks.
- Develops network architectures that meet the organization's current and future requirements.
- Configures, deploys, and manages network devices such as routers, switches, firewalls, load balancers, and wireless controllers.
- Implements and maintains network services and protocols.
- Implements and enforces network security measures, including firewalls, intrusion detection/prevention systems, access controls, and VPNs.
- Diagnoses and resolves complex network issues, utilizing advanced troubleshooting techniques and network monitoring tools.
- Analyzes network performance data to identify and address bottlenecks and irregularities.
- Optimizes network performance by analyzing traffic patterns, adjusting configurations, and implementing quality of service (QoS) measures.
- Creates and maintains comprehensive network documentation, including network diagrams, configurations, standard operating procedures, and incident reports.
- Collaborates with cross-functional teams, including systems administrators, security teams, application developers, and business stakeholders.
- Manages/participates in network-related projects, including network upgrades, migrations, and expansions.
- Develops project plans, define objectives, and ensure successful project execution.
- Stays updated with emerging networking technologies and industry trend.
- Works with vendors to evaluate, procure, and manage networking equipment, services, and support contracts.
- Utilizes network monitoring and analysis tools to proactively monitor network health, identify issues, and respond to incidents.
- Erforms any other related task as required.
- To thrive in this role, you need to have: Seasoned understanding of networking concepts, protocols, architectures, and services.
- Seasoned proficiency in configuring and managing network devices such as routers, switches, firewalls, load balancers, and wireless controllers.
- Seasoned knowledge of network protocols and technologies such as BGP, OSPF, VLANs, VPNs, QoS, and security protocols.
- Seasoned experience with network monitoring and analysis tools.
- Strong documentation and communication skills to convey technical information effectively.
- Seasoned proficiency in network administration and configuration tools.
- Analytical problem-solving skills to diagnose and resolve complex network issues.
- Strong project management skills to lead and contribute to network projects.
- Seasoned familiarity with network security principles and best practices.
- Academic qualifications and certifications: Bachelor's degree or equivalent in Information Technology, Computer Science, or a related field.
- Network Administration certification (Azure, Google, Amazon) preferred.
- Relevant certifications such as CompTIA Network+, Cisco Certified Network Associate (CCNA), or Juniper Networks Certified Associate (JNCIA) are beneficial.
- Relevant certifications such as Cisco Certified Internetwork Expert (CCIE), Juniper Networks Certified Internet Expert (JNCIE), or equivalent certifications are preferred.
- Required experience: Seasoned relevant experience in network engineering or a related role.
- Seasoned experience working in a networking environment.
- Seasoned experience with network security.
- Seasoned WAN and LAN experience.
- Seasoned experience in wireless equipment, protocols, standards, and wireless LAN design.
- Seasoned experience with cloud networking (AWS, Azure, etc.).
- Hybrid Working About NTT DATA
- NTT DATA is a $30+ billion business and technology services leader, serving 75% of the Fortune Global 100. We are committed to accelerating client success and positively impacting society through responsible innovation. We are one of the world s leading AI and digital infrastructure providers, with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. Our consulting and industry solutions help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have experts in more than 50 countries. We also offer clients access to a robust ecosystem of innovation centers as well as established and start-up partners. NTT DATA is part of NTT Group, which invests over $3 billion each year in R&D.
- Equal Opportunity Employer
- NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today.
- Third parties fraudulently posing as NTT DATA recruiters.
- NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters whether in writing or by phone in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an @nttdata.com email address. If you suspect any fraudulent activity, please contact us.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop, implement, and enforce robust Security Policies and procedures to protect company assets, employees, and customers.
- Manage and optimize Access Control (AC) systems across all bank premises.
- Lead Incident Response efforts, including investigation, resolution, and reporting of security breaches or emergencies.
- Conduct regular Threat Assessment to identify potential security vulnerabilities and develop mitigation strategies.
- Ensure full Regulatory Compliance with all relevant security laws, regulations, and industry standards, including Regulatory Compliance Management.
- Oversee and manage the bank's Security Operations, including surveillance, patrols, and security personnel deployment.
- Implement and maintain effective Risk Management strategies to identify, assess, and mitigate security risks.
- Plan and execute Emergency Management protocols, including drills and crisis communication.
- Conduct Investigative Skills for security incidents, thefts, and other breaches.
- Develop and deliver comprehensive Security Trainings for all employees, including Health And Safety (H&S) Training.
- Evaluate and implement new Security Technologies to enhance the bank's security posture.
- Demonstrate strong Accountability for the overall security performance and outcomes of the bank.
- Job Qualifications Proven experience in a senior security management role, preferably within the financial services industry.
- Extensive knowledge and practical experience in Access Control (AC) systems.
- Demonstrated ability in Incident Response and crisis management.
- Strong understanding of Regulatory Compliance and Regulatory Compliance Management frameworks.
- Expertise in Risk Management methodologies and threat assessment.
- Proficiency in Security Operations and policy enforcement.
- Excellent Investigative Skills with a keen eye for detail.
- Experience in developing and delivering Security Trainings, including Health And Safety (H&S) Training.
- Familiarity with various Security Technologies and their application.
- Strong leadership, communication, and interpersonal skills.
- High level of Accountability and integrity.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
āļāļąāļāļĐāļ°:
Teamwork, Compliance, Problem Solving
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- IT Solutions & Services.
- Work with Passion, Professional and Teamwork.
- Grow up in Career path.
- We are looking for talented Cyber Security Engineer to find the most efficient way to create and to manage every cyber security solution for multiple clients.
- What we want?.
- To propose improvement to infrastructure and security systems and may present them to customer s upper management.
- Plan and carry out a customer s information security strategy to be the healthy security architectures for any IT project.
- To implement security system and ensure compliance with corporate cyber security policies and procedures.
- To provide professional supervision and guidance to security teams.
- Works with other business units, partners, and customers to maintain secure methods of security management.
- Who are we looking for?.
- Experience in IT infrastructure or Cyber Security field.
- Great awareness of Cyber Security trends and new technology update.
- Knowledge in Security Management is advantage. Excellent knowledge in Security Product (Antivirus/Firewall/VPN, IPS/IDS), Security Platform, Endpoint Solution, and Network Security solution is a plus.
- Excellent problem solving and analytical skill, planning and organizing skill and customer oriented.
- Security Profession Certification is a plus.
- Knowledge in AI and the ability to use AI-related tools and technologies.
- MFEC OKR:- As MFEC People, you will be a part of our talent team. Besides your main responsibilities, you do have special projects as part of OKR. However, the percentages will be different according to the positions and teams.
- Location: Branch: Chatuchak
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Compliance, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Invite and give in the moment feedback in a constructive manner.
- Share and collaborate effectively with others.
- Identify and make suggestions for improvements when problems and/or opportunities arise.
- Handle, manipulate and analyse data and information responsibly.
- Follow risk management and compliance procedures.
- Keep up-to-date with developments in area of specialism.
- Communicate confidently in a clear, concise and articulate manner - verbally and in the materials I produce.
- Build and maintain an internal and external network.
- Seek opportunities to learn about how PwC works as a global network of firms.
- Uphold the firm's code of ethics and business conduct.
- Bachelor s degree in Computer Engineering, Computer Science, Information Systems or a related field.
- 0-2 years of experience.
- Be able to utilize your well-rounded skills and experience related to industries to steer your projects to a successful outcome.
- Team player with strong interpersonal, communication skills.
- Be able to work both independently and as part of a team with professionals at all levels.
- Proficiency in spoken and written English & Thai.
- We thank all applicants. Please note that only short-listed candidates will be contacted for interviews.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
- Job Posting End Date.
āļāļąāļāļĐāļ°:
Internal Audit
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļĢāļ§āļāļāļēāļĄ internal control āļāļđāđāļĨāļāļļāļāļŦāļāđāļ§āļĒāļāļēāļāđāļāļĩāđāļĒāļ§āļāļąāļāļĢāļ°āļāļ Application āļ āļēāļāļĢāļ§āļĄāļĄāļĩāļāļąāđāļ Cyber security + Application control (asset control).
- āļĢāđāļ§āļĄāļāļąāļāļāļģāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ (Audit Program) āļŦāļāđāļ§āļĒāļĢāļąāļāļāļĢāļ§āļāļāļĩāđāļĢāļąāļāļāļīāļāļāļāļāđāļĨāļ°āļāļģāļŦāļāļāļ§āļīāļāļĩāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļāļ·āđāļāđāļŦāđāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāļĢāļĨāļļāļāļēāļĄāļ§āļąāļāļāļļāļāļĢāļ°āļŠāļāļāđ.
- āļāļāļīāļāļąāļāļīāļāļēāļāļāļĢāļ§āļāļŠāļāļāļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒāđāļŦāđāļŠāļāļāļāļĨāđāļāļāļāļēāļĄāđāļāļ§āļāļēāļāļāļēāļĢāļāļĢāļ§āļŠāļāļāļāļĩāđāđāļāđāļĢāļąāļāļāļēāļĢāđāļŦāđāļāļāļāļ āđāļĨāļ°āļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļ āļēāļĒāđāļ.
- āļĢāļ§āļāļĢāļ§āļĄ āļ§āļīāđāļāļĢāļēāļ°āļŦāđ āļāļĢāļ°āđāļĄāļīāļāļāļĨāļāđāļāļĄāļđāļĨāļāļĩāđāđāļāđāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļ āļāļķāļāļāļ§āļēāļĄāđāļāļĩāļĒāļāļāļāđāļĨāļ°āļāļ§āļēāļĄāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļāļāļāļāļĢāļ°āļāļāļāļ§āļāļāļļāļĄāļ āļēāļĒāđāļ.
- āļāđāļ§āļĒāđāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļĢāļ°āļāļ IT āđāļāļ·āđāļāļāđāļāļŦāļēāļāļąāļāļŦāļēāđāļĨāļ°āļāđāļāļāļāļāļĢāđāļāļ āļāļĢāđāļāļĄāļāļģāđāļŠāļāļāđāļāļ§āļāļēāļāđāļāļāļēāļĢāļāļĢāļąāļāļāļĢāļļāļāđāļĨāļ°āļāļąāļāļāļēāļĢāļ°āļāļ IT.
- āļ§āļēāļāđāļāļāļāļēāļĢāļāđāļēāđāļāļīāļāļāļēāļĢāļāļēāļĄāļāļĢāļ°āļāļ§āļāļāļēāļĢāđāļĨāļ°āļāļąāđāļāļāļāļāđāļāļāļēāļĢāļĢāļ°āļāļļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāđāļāļĢāļ°āļāļāļŠāļēāļĢāļŠāļāđāļāļĻāļāļāļāļāļāļāđāļāļĢ.
- āļāļĢāļīāļāļāļēāļāļĢāļĩ āđāļāļŠāļēāļāļē āđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ, āļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđ, āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđ.
- Computer Engineer, Computer Science, Information Technology.
- āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāļāđāļēāļāđāļāļāļāļīāļāđāļāļĩāđāļĒāļ§āļāļąāļāļŠāļ āļēāļāđāļ§āļāļĨāđāļāļĄāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ āļŦāļĢāļ·āļ IT Security.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļāļĢāļ°āđāļĄāļīāļ/āļāļĢāļ§āļāļŠāļāļ āļĢāļ°āļāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻāļŦāļĢāļ·āļāļĢāļ°āļāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļ§āļēāļĄāđāļŠāļĩāđāļĒāļāļāđāļēāļāđāļāļāđāļāđāļĨāļĒāļĩāļŠāļēāļĢāļŠāļāđāļāļĻ 2-3 āļāļĩ.
- āļāđāļēāļāļāļēāļĢāļāļķāļāļāļāļĢāļĄāļāđāļēāļ IT Governance āļŦāļĢāļ·āļ IT Best Practice āļŦāļĢāļ·āļāļĄāļēāļāļĢāļāļēāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļŠāļēāļĢāļŠāļāđāļāļĻ (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ).
- āđāļāđāļĢāļąāļāđāļāļĢāļąāļāļĢāļāļāļāļļāļāļ§āļļāļāļīāļāđāļēāļ IT Audit āļŦāļĢāļ·āļāļāđāļēāļ Security (āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ)..
- āļ§āļąāļ-āđāļ§āļĨāļē āļāļģāļāļēāļ: 8.30 - 17.00 āļ-āļĻ.
- āļŠāļāļēāļāļāļĩāđāļāļģāļāļēāļ: āļāļēāļāļēāļĢāđāļŠāļāđāļŠāļĄ āļāļāļļāļāļąāļāļĢ.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop and implement comprehensive security policies and procedures aligned with organizational standards to ensure robust protection of personnel and assets.
- Lead and coordinate security operations including physical surveillance, access control systems, and emergency response protocols.
- Manage security clearance administration and conduct thorough investigations of security incidents and loss prevention cases.
- Collaborate with law enforcement agencies and internal stakeholders to maintain a secure workplace environment.
- Oversee facility safety programs including fire prevention and emergency preparedness initiatives.
- Proven track record in facilities security management and safety program implementation.
- Strong knowledge of security systems, surveillance techniques, and emergency response protocols.
- Demonstrated ability to develop and enforce security policies and procedures.
- Outstanding leadership skills with experience in managing security personnel.
- Excellent analytical and problem-solving capabilities with strong attention to detail.
- Lead strategic security initiatives that directly impact organizational success.
- Opportunity to build and mentor high-performing security teams.
- Professional development through industry-leading security management practices.
- Dynamic work environment with exposure to cutting-edge security technologies.
- Collaborative culture focused on innovation and continuous improvement.
- Let us learn about you! Apply today.
- Looking to make an IMPACT with your career?.
- When you are thinking about joining a new team, culture matters. At Schneider Electric, our values and behaviors are the foundation for creating a great culture to support business success. We believe that our IMPACT values - Inclusion, Mastery, Purpose, Action, Curiosity, Teamwork - starts with us.
- IMPACT is also your invitation to join Schneider Electric where you can contribute to turning sustainability ambition into actions, no matter what role you play. It is a call to connect your career with the ambition of achieving a more resilient, efficient, and sustainable world.
- We are looking for IMPACT Makers; exceptional people who turn sustainability ambitions into actions at the intersection of automation, electrification, and digitization. We celebrate IMPACT Makers and believe everyone has the potential to be one.
- Become an IMPACT Maker with Schneider Electric - apply today!.
- 36 billion global revenue
- 13% organic growth
- 150 000+ employees in 100+ countries
- 1 on the Global 100 World s most sustainable corporations.
- You must submit an online application to be considered for any position with us. This position will be posted until filled.
- Schneider Electric aspires to be the most inclusive and caring company in the world, by providing equitable opportunities to everyone, everywhere, and ensuring all employees feel uniquely valued and safe to contribute their best. We mirror the diversity of the communities in which we operate, and inclusion is one of our core values. We believe our differences make us stronger as a company and as individuals and we are committed to championing inclusivity in everything we do.At Schneider Electric, we uphold the highest standards of ethics and compliance, and we believe that trust is a foundational value. Our Trust Charter is our Code of Conduct and demonstrates our commitment to ethics, safety, sustainability, quality and cybersecurity, underpinning every aspect of our business and our willingness to behave and respond respectfully and in good faith to all our stakeholders. You can find out more about our Trust Charter here
- Schneider Electric is an Equal Opportunity Employer. It is our policy to provide equal employment and advancement opportunities in the areas of recruiting, hiring, training, transferring, and promoting all qualified individuals regardless of race, religion, color, gender, disability, national origin, ancestry, age, military status, sexual orientation, marital status, or any other legally protected characteristic or conduct.
āļāļąāļāļĐāļ°:
Power BI
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļģāđāļāļīāļāļāļēāļĢāļĢāļ°āļāļąāļāļĢāđāļēāļāļāđāļēāļŦāļĢāļ·āļāļāļĨāļīāļāļ āļąāļāļāđāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļąāļāļāļĩāļĄāđāļēāļŠāļĩāļāđāļēāļ āđ āļāļēāļĄāļāļĩāđāļĢāļ°āļāļļāđāļ āļ.āļĢ.āļ. āļĄāļēāļāļĢāļāļēāļĢāļāđāļāļāļāļąāļāđāļĨāļ°āļāļĢāļēāļāļāļĢāļēāļĄāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļēāļāđāļāļāđāļāđāļĨāļĒāļĩ (āļāļāļąāļāļāļĩāđ 2) āļ.āļĻ. 2568 āđāļĨāļ°āļāļāļŦāļĄāļēāļĒāļāļ·āđāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āđāļŦāđāđāļĨāđāļ§āđāļŠāļĢāđāļāļ āļēāļĒāđāļāđāļ§āļĨāļēāļāļĩāđāļāļģāļŦāļāļ.
- āļŠāļ·āļāļŠāļ§āļāđāļĨāļ°āļāļĒāļēāļĒāļāļĨāļāļĪāļāļīāļāļĢāļĢāļĄāļāļēāļĢāļĢāļąāļāļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļŦāļēāļĢāļāļĩāđāļāđāļēāļŠāļāļŠāļąāļĒāļāļāļāļĢāđāļēāļāļāđāļēāļāļĩāđāļāļēāļāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļēāļĢāļāļļāļāļĢāļīāļāļŦāļĢāļ·āļāļāļąāļāļāļĩāļĄāđāļē āđāļāļ·āđāļāļāļģāđāļāļīāļāļāļēāļĢāļĢāļ°āļāļąāļāļŦāļĢāļ·āļāļĒāļāđāļĨāļīāļāļāļēāļĄāđāļāļ§āļāļēāļāļāļĩāđāļāļāļēāļāļēāļĢāļāļģāļŦāļāļ.
- āļĢāļąāļāđāļĢāļ·āđāļāļāļāļĢāļāļĩāļāļēāļĢāļāļāļīāđāļŠāļāļĢāļēāļĒāļāļēāļĢāđāļāđāļāļąāļāļĢ āļĢāļēāļĒāļāļēāļĢāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļĢāđāļēāļāļāđāļēāļāļĩāđāļĢāļąāļāļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļēāļĢāļāļĩāđāđāļāđāļēāļāđāļēāļĒāļāļļāļāļĢāļīāļ āļĢāļ§āļĄāļāļķāļ āļĢāļēāļĒāļāļēāļĢāđāļāđ Wallet Application āļāļģāļĢāļ°āļāđāļēāļŠāļīāļāļāđāļēāđāļĨāļ°āļāļĢāļīāļāļē ...
- āļŠāļ·āļāļŠāļ§āļāļāļĢāļāļĩāļāļēāļĢāļāļĢāļ°āļāļģāļāļļāļāļĢāļīāļāļāļĩāđāļāļģāđāļŦāđāļāļāļēāļāļēāļĢāđāļāđāļĢāļąāļāļāļ§āļēāļĄāđāļŠāļĩāļĒāļŦāļēāļĒ āļāļąāđāļāļāđāļāļāļāļēāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļēāļŠāļĄāļēāļāļīāļ āļŦāļĢāļ·āļ Wallet Application āļāļĢāđāļāļĄāļāļīāļāļāļēāļĄāļāļ§āļēāļĄāđāļŠāļĩāļĒāļŦāļēāļĒāļāļ·āļāđāļŦāđāđāļāđāļāļāļēāļāļēāļĢ āđāļĨāļ°āđāļāđāļāļāļ§āļēāļĄāļāļģāđāļāļīāļāļāļāļĩāļāđāļāļāļāļąāļāļāļēāļāļŠāļāļāļŠāļ§āļāđāļŦāđāļāļģāđāļāļīāļāļāļāļĩāļāļąāļāļāļđāđāļāļĢāļ°āļāļģāļāļļāļāļĢāļīāļ āļĢāļ§āļĄāļāļķāļāļāļīāļāļāļēāļĄāļāļĨāļāļāļāļ§āđāļēāļāļāļĩāļāļ°āļāļķāļāļāļĩāđāļŠāļļāļ.
- āļ§āļīāđāļāļĢāļēāļ°āļŦāđāļāđāļāļĄāļđāļĨāļĢāļđāļāđāļāļāļāđāļēāļ āđ āļāļāļāļāļēāļĢāļāļļāļāļĢāļīāļ āļāļąāđāļāļāđāļāļāļāļēāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļēāļŠāļĄāļēāļāļīāļ āļŦāļĢāļ·āļ Wallet Application āđāļāļ·āđāļāļāļģāļŦāļāļāđāļāļ§āļāļēāļāļāļēāļĢāļāđāļāļāļāļąāļāđāļĨāļ°āļāļĢāļēāļāļāļĢāļēāļĄāļāļēāļĢāļāļļāļāļĢāļīāļāļāļĩāđāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāđāļĨāļ°āļŠāļĢāļļāļāļāļĨāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāđāļāļ·āđāļāļāļģāđāļŠāļāļāđāļāđāļāļđāđāļāļąāļāļāļąāļāļāļąāļāļāļē Head of Card & Merchant Fraud Investigation.
- āļāļļāļāļŠāļĄāļāļąāļāļī: āļŠāļģāđāļĢāđāļāļāļēāļĢāļĻāļķāļāļĐāļēāļĢāļ°āļāļąāļāļāļĢāļīāļāļāļēāļāļĢāļĩāļāļķāđāļāđāļāđāļāļŠāļēāļāļēāļāļīāļāļīāļĻāļēāļŠāļāļĢāđ āļĢāļąāļāļĻāļēāļŠāļāļĢāđ āđāļĻāļĢāļĐāļāļĻāļēāļŠāļāļĢāđ āļŠāļąāļāļāļĄāļĻāļēāļŠāļāļĢāđ āļāļĢāļīāļŦāļēāļĢāļāļļāļĢāļāļīāļ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļ·āđāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāļ·āđāļāļāļēāļāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĨāļīāļāļ āļąāļāļāđāļāļāļēāļāļēāļĢ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļŠāļ·āļāļŠāļ§āļāļŠāļāļāļŠāļ§āļāļŦāļĢāļ·āļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāļĢāļāļĩāļāļļāļāļĢāļīāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļąāļāļāļąāļāļĢāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđ āļĢāđāļēāļāļāđāļē Wallet Application āļŦāļĢāļ·āļāļāļĢāļīāļāļēāļĢāļāļēāļāļāļīāđāļĨāđāļāļāļĢāļāļāļīāļāļŠāđāļāļ·āđāļ āđ āļāļāļāļāļāļēāļāļēāļĢ āđāļĄāđāļāđāļāļĒāļāļ§āđāļē 1 āļāļĩ.
- āļĄāļĩāļāļąāļāļĐāļ°āļ āļēāļĐāļēāļāļąāļāļāļĪāļĐāļāļąāđāļāļāđāļēāļāļāļąāļ āļāļđāļ āļāđāļēāļ āđāļĨāļ°āđāļāļĩāļĒāļāđāļāļĢāļ°āļāļąāļāļāļĩ.
- āļŠāļēāļĄāļēāļĢāļāđāļāđāļāļāļĄāļāļīāļ§āđāļāļāļĢāđāđāļāđāļāļĩ āđāļāļĒāđāļāļāļēāļ° MS Excel āđāļĨāļ° Power BI āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāļāļąāļāļāļģ Presentation āđāļāļ·āđāļāļāļģāđāļŠāļāļāļāđāļāļĄāļđāļĨāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ.
- āļŠāļēāļĄāļēāļĢāļāļāļāļīāļāļąāļāļīāļāļēāļāļāļāļāļŠāļāļēāļāļāļĩāđ āļŦāļĢāļ·āļāļāđāļēāļāļāļąāļāļŦāļ§āļąāļ āđāļĨāļ°āļāļāļāđāļ§āļĨāļēāļāļģāļāļēāļĢāđāļāđāļāļēāļĄāļāļ§āļēāļĄāļāļģāđāļāđāļāļāļāļāļāļēāļ.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and oversee Security Operations Center (SOC) activities.
- Manage and coordinate incident response processes across the organization.
- Develop and maintain incident response playbooks and procedures.
- Perform threat intelligence analysis and monitor evolving cyber threat landscapes.
- Conduct security risk analysis and recommend mitigation strategies.
- Collaborate with IT, Risk, Compliance, and Business Units to enhance cybersecurity posture.
- Provide strategic cybersecurity guidance and recommendations to management.
- Mentor and coach SOC and Incident Response team members.
- Support internal and external security audits and compliance activities..
- Bachelor s degree or higher in Cybersecurity, Information Technology, or related field.
- Minimum 7 years of experience in cybersecurity roles.
- Proven experience managing SOC or Incident Response teams.
- Strong knowledge of threat detection, incident handling, and digital forensics.
- Strong understanding of security frameworks and standards such as ISO 27001, NIST, and MITRE ATT&CK.
- Strong analytical, investigative, and problem-solving skills.
- Leadership and team management capabilities.
āļāļąāļāļĐāļ°:
ISO 27001, DevOps, Swift
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Manage end-to-end cryptographic key lifecycle (generation, distribution, rotation, backup, archival, destruction).
- Administer and operate Hardware Security Modules (HSMs), preferably Thales Luna HSM.
- Define and enforce key management policies and procedures aligned with banking regulations and industry standards (e.g., PCI DSS, ISO 27001).
- Support encryption key integration across banking applications, core systems, payment systems, and digital channels.
- Conduct key ceremonies and maintain audit logs.
- Vault & Secrets Management.
- Administer enterprise vault platforms (e.g., HashiCorp Vault or similar).
- Manage secrets lifecycle (API keys, certificates, tokens, database credentials).
- Configure access control policies, role-based access, and segregation of duties.
- Integrate vault solutions with applications, DevOps pipelines, and cloud/on-prem infrastructure.
- Monitor vault security posture and perform regular health checks.
- Security & Compliance.
- Ensure compliance with regulatory requirements (BOT, PCI DSS, SWIFT CSP, etc.).
- Perform risk assessments related to cryptographic controls.
- Support audit activities and provide evidence for internal/external auditors.
- Participate in incident response related to key compromise or vault breaches.
- Architecture & Improvement.
- Contribute to cryptographic architecture design and secure key management framework.
- Support post-quantum cryptography transition planning (if applicable).
- Recommend best practices and continuous improvements for key and secrets management.
- Apply now if you have these advantages.
- Bachelor s degree or higher in computer science/ data science or any related field.
- Minimum of 3-7 years of experience in Information Security or Cryptography (Banking Financial industries are advantage).
- 3-7+ years of experience in Information Security or Cryptography.
- Hands-on experience with HSM (Thales Luna preferred).
- Experience in Vault or Secrets Management platforms (e.g., HashiCorp Vault).
- Experience in banking or financial services environment is highly preferred..
- Strong understanding of cryptographic principles (PKI, symmetric/asymmetric encryption, TLS, key wrapping, key derivation).
- Experience with key lifecycle management processes.
- Knowledge of PKI, certificate management, and CA integration.
- Familiarity with PCI DSS encryption requirements.
- Scripting skills (e.g., Bash, Python, PowerShell) are a plus.
- Why join Krungsri?.
- As a part of MUFG (Mitsubishi UFJ Financial Group), we a truly a global bank with networks all over the world.
- We offer a striking work-life balance culture with hybrid work policies (3 days in office per week).
- Unbelievable benefits such as attractive bonuses, employee loan with special rates and many more..
- Apply now before this role is close. **.
- FB: Krungsri Career(http://bit.ly/FacebookKrungsriCareer [link removed]).
- LINE: Krungsri Career (http://bit.ly/LineKrungsriCareer [link removed]).
- Talent Acquisition Department
- Bank of Ayudhya Public Company Limited
- 1222 Rama III Rd., Bangpongpang, Yannawa, Bangkok 10120.
- āļŦāļĄāļēāļĒāđāļŦāļāļļ āļāļāļēāļāļēāļĢāļĄāļĩāļāļ§āļēāļĄāļāļģāđāļāđāļāđāļĨāļ°āļāļ°āļĄāļĩāļāļąāđāļāļāļāļāļāļēāļĢāļāļĢāļ§āļāļŠāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāđāļāļĩāđāļĒāļ§āļāļąāļāļāļĢāļ°āļ§āļąāļāļīāļāļēāļāļāļēāļāļĢāļĢāļĄāļāļāļāļāļđāđāļŠāļĄāļąāļāļĢ āļāđāļāļāļāļĩāđāļāļđāđāļŠāļĄāļąāļāļĢāļāļ°āđāļāđāļĢāļąāļāļāļēāļĢāļāļīāļāļēāļĢāļāļēāđāļāđāļēāļĢāđāļ§āļĄāļāļēāļāļāļąāļāļāļāļēāļāļēāļĢāļāļĢāļļāļāļĻāļĢāļĩāļŊ.
- Remark: The bank needs to and will have a process for verifying personal information related to the criminal history of applicants before they are considered for employment with the bank..
- Applicants can read the Personal Data Protection Announcement of the Bank's Human Resources Function by typing the link from the image that stated below.
- EN (https://krungsri.com/b/privacynoticeen).
- āļāļđāđāļŠāļĄāļąāļāļĢāļŠāļēāļĄāļēāļĢāļāļāđāļēāļāļāļĢāļ°āļāļēāļĻāļāļēāļĢāļāļļāđāļĄāļāļĢāļāļāļāđāļāļĄāļđāļĨāļŠāđāļ§āļāļāļļāļāļāļĨāļŠāđāļ§āļāļāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨāļāļāļāļāļāļēāļāļēāļĢāđāļāđāđāļāļĒāļāļēāļĢāļāļīāļĄāļāđāļĨāļīāļāļāđāļāļēāļāļĢāļđāļāļ āļēāļāļāļĩāđāļāļĢāļēāļāļāļāđāļēāļāļĨāđāļēāļ.
- āļ āļēāļĐāļēāđāļāļĒ (https://krungsri.com/b/privacynoticeth).
āļāļąāļāļĐāļ°:
Network Infrastructure, SAP, Assurance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Participate in the development of IT Audit Programs within assigned areas, covering IT security, applications, and IT processes (e.g., network infrastructure, operating systems, data centers, SAP, and retail systems). Assess whether security risks and vulnerabilities are properly identified and mitigated. Coordinate audit scope and effectiveness with business units and external IT/security specialists..
- Contribute to the design of detailed audit testing procedures in alignment with the approved Audit Program, including the definition of audit scope, sample sizes, audit ...
- Execute audit assignments as assigned by supervisors, performing detailed testing in accordance with established audit methodologies and procedures..
- Review and consolidate audit results, working papers, and supporting evidence prepared by team members in order to analyze audit findings and determine whether further audit procedures or expanded testing are required..
- Evaluate and analyze audit findings, including root causes and risks, and provide recommendations for improvement. Prepare and consolidate audit reports for submission to management for review and consideration..
- Bachelor s degree or higher in Management Information Systems, Information Technology, Computer Science, or other related fields..
- At least 5 years of experience in internal auditing, with a focus on IT audit, IT security controls, or IT-related assurance functions, or other relevant experience (e.g., information security, IT risk and control, IT governance, or IT quality assurance)..
- Strong leadership skills, with the ability to work effectively as part of a team and adapt to changing work environments..
- Strong analytical and systematic thinking skills..
- Proactive and innovative mindset, with the ability to initiate improvements..
- Effective communication and coordination skills..
- Proficiency in computer applications, including MS Office and SAP ERP..
- Professional certifications such as CISA, CISSP, CISM, or other relevant technical certifications will be considered an advantage..
- Working location: The Mall Ramkhamhaeng (Headquarter).
- 1
- 2
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2026
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ
