āļ›āļĢāļ°āļāļēāļĻāļ‡āļēāļ™āļ™āļĩāđ‰āļŦāļĄāļ”āļ­āļēāļĒāļļāđāļĨāđ‰āļ§

Responsibilities:

  • Identify and evaluate areas for improvement in detection, prevention, and cyber incident response.
  • Work closely with stakeholders to develop and follow up on remediation plans.
  • Provide expert consultation on mitigating strategies and actionable remediation plans to asset owners.
  • Collaborate with various teams to create, implement, and monitor effective remediation strategies.
  • Apply knowledge of IT infrastructure, with experience as a system administrator or system engineer, to enhance cybersecurity measures.
  • Utilize an understanding of offensive and defensive cybersecurity strategies (e.g., red and blue teams).
  • Perform penetration testing or demonstrate a strong understanding of penetration testing methodologies to assess the security of IT systems
  • Use computer forensic tools to examine and analyze electronic media in suspected hacking cases.
  • Conduct tasks related to malware analysis and reverse engineering to identify and mitigate threats.
  • Define a course of action if a security problem exists and explain in detailed technical reports what occurred when an incident happens, including the reasons it occurred, and the response taken.
  • Document incidents thoroughly, providing detailed technical reports that include the cause of the incident, and the response measures implemented.
  • Build relationships with other entities responsible for conducting cyber threat analyses, ensuring effective collaboration and information sharing.

Qualifications:

  • Bachelor’s degree / master’s degree or higher in Computer Engineering, Information Technology, Computer science or related field.
  • Proficiency with SIEM, UBA, and SOAR tools.
  • Experience with system monitoring tools.
  • Coding ability in C, C++, C#, Java, ASM, PERL, PHP, and PowerShell.
  • Knowledge of backup and archiving techniques.
  • Use of enterprise system monitoring tools.
  • Understanding of cloud computing.
  • Proficiency in UNIX.
  • Knowledge of network communication (IP/TCP).
  • Familiarity with computer hardware systems.
  • Experience with web-based application security.
  • Strong knowledge of Windows and Linux Operating Systems.
  • Experience in identifying and evaluating cybersecurity risks and providing actionable insights.
  • Previous experience as a penetration tester (pentester) is highly beneficial.
  • Experience as a system administrator/system engineer is advantageous.
  • Familiarity with computer forensic tools and techniques.
  • Experience in malware analysis and reverse engineering.
  • Ability to work well under pressure while handling multiple tasks.

 

Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒāļ—āļĩāđˆāļˆāļģāđ€āļ›āđ‡āļ™
  • 7 āļ›āļĩ
āļĢāļ°āļ”āļąāļšāļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™
  • āļĢāļ°āļ”āļąāļšāđ€āļˆāđ‰āļēāļŦāļ™āđ‰āļēāļ—āļĩāđˆ
  • āļĢāļ°āļ”āļąāļšāļŦāļąāļ§āļŦāļ™āđ‰āļēāļ‡āļēāļ™
āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™
  • 60,000 - 90,000 THB, āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰
āļŠāļēāļĒāļ‡āļēāļ™
  • āđ„āļ­āļ—āļĩ / āđ€āļ‚āļĩāļĒāļ™āđ‚āļ›āļĢāđāļāļĢāļĄ
  • āļ§āļīāļĻāļ§āļāļĢāļĢāļĄ
āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™
  • āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļāļĩāđˆāļĒāļ§āļāļąāļšāļšāļĢāļīāļĐāļąāļ—

āļˆāļģāļ™āļ§āļ™āļžāļ™āļąāļāļ‡āļēāļ™:2000-5000 āļ„āļ™
āļ›āļĢāļ°āđ€āļ āļ—āļšāļĢāļīāļĐāļąāļ—:āļāļēāļĢāđ€āļ‡āļīāļ™āđāļĨāļ°āļāļēāļĢāļ˜āļ™āļēāļ„āļēāļĢ
āļ—āļĩāđˆāļ•āļąāđ‰āļ‡āļšāļĢāļīāļĐāļąāļ—:āļāļĢāļļāļ‡āđ€āļ—āļž
āđ€āļ§āđ‡āļšāđ„āļ‹āļ•āđŒ:www.cimbthai.com
āļāđˆāļ­āļ•āļąāđ‰āļ‡āđ€āļĄāļ·āđˆāļ­āļ›āļĩ:1998
āļ„āļ°āđāļ™āļ™:4/5

āļ˜āļ™āļēāļ„āļēāļĢ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ āđ„āļ—āļĒ āļ āļēāļĒāđƒāļ•āđ‰āļāļĨāļļāđˆāļĄāļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ (CIMB Group) āļ˜āļ™āļēāļ„āļēāļĢāļŠāļēāļāļĨāļ—āļĩāđˆāļĄāļĩāļŠāļģāļ™āļąāļāļ‡āļēāļ™āđƒāļŦāļāđˆāļ­āļĒāļđāđˆāđƒāļ™āļāļĢāļļāļ‡āļāļąāļ§āļĨāļēāļĨāļąāļĄāđ€āļ›āļ­āļĢāđŒ āļ›āļĢāļ°āđ€āļ—āļĻāļĄāļēāđ€āļĨāđ€āļ‹āļĩāļĒ āļ‹āļķāđˆāļ‡āđ€āļ›āđ‡āļ™āļŦāļ™āļķāđˆāļ‡āđƒāļ™āļ˜āļ™āļēāļ„āļēāļĢāđ€āļžāļ·āđˆāļ­āļāļēāļĢāļĨāļ‡āļ—āļļāļ™āļ—āļĩāđˆāđƒāļŦāļāđˆāļ—āļĩāđˆāļŠāļļāļ”āđƒāļ™āđ€āļ­āđ€āļŠāļĩāļĒ āļĄāļĩāļĢāļēāļāļāļēāļ™āļ­āļĒāļđāđˆāđƒāļ™āļ­āļēāđ€āļ‹āļĩāļĒāļ™āđāļĨāļ°āļĄāļĩāļ„āļ§āļēāļĄāļĢāļđāđ‰āļ„āļ§āļēāļĄāđ€āļŠāļĩāđˆāļĒāļ§āļŠāļēāļāļ—āļĩāđˆāļŦāļĨāļēāļāļŦāļĨāļēāļĒāļˆāļēāļāļ—āļąāđˆāļ§āļ—āļąāđ‰āļ‡āļ āļđāļĄāļīāļ āļēāļ„ āļžāļĢāđ‰āļ­āļĄāļĄāļļāđˆāļ‡āļĄāļąāļ™āļ—āļĩāđˆāļˆāļ°āļŠāļĢāđ‰āļēāļ‡āļŠāļĢāļĢ ...

āļ­āđˆāļēāļ™āļ•āđˆāļ­

āļĢāđˆāļ§āļĄāļ‡āļēāļ™āļāļąāļšāđ€āļĢāļē:

We look for individuals with a thirst for challenge, a sound educational background and outstanding capabilities. Well-rounded, multi-disciplined persons with high intelligence, energy and integrity are welcome to be part of this forward thinking and fast moving organisation.

āđ€ ...

āļ­āđˆāļēāļ™āļ•āđˆāļ­

āđ€āļ‚āļ•āļ—āļĩāđˆāļ•āļąāđ‰āļ‡āļ—āļĩāđˆāļ—āļģāļ‡āļēāļ™: āļ›āļ—āļļāļĄāļ§āļąāļ™
āļŠāļģāļ™āļąāļāļ‡āļēāļ™āđƒāļŦāļāđˆ: 44 āļ–āļ™āļ™āļŦāļĨāļąāļ‡āļŠāļ§āļ™ āđāļ‚āļ§āļ‡āļĨāļļāļĄāļžāļīāļ™āļĩ āđ€āļ‚āļ•āļ›āļ—āļļāļĄāļ§āļąāļ™ āļāļĢāļļāļ‡āđ€āļ—āļžāļĄāļŦāļēāļ™āļ„āļĢ 10330
Display map

āļŠāļ§āļąāļŠāļ”āļīāļāļēāļĢ

  • āļāļēāļĢāļžāļąāļ’āļ™āļēāđ€āļžāļ·āđˆāļ­āļ„āļ§āļēāļĄāđ€āļ›āđ‡āļ™āļĄāļ·āļ­āļ­āļēāļŠāļĩāļž
  • āļ›āļĢāļ°āļāļąāļ™āļ—āļąāļ™āļ•āļāļĢāļĢāļĄ
  • āļāļ­āļ‡āļ—āļļāļ™āļŠāļģāļĢāļ­āļ‡āđ€āļĨāļĩāđ‰āļĒāļ‡āļŠāļĩāļž
  • āļ—āļģāļ‡āļēāļ™ 5 āļ§āļąāļ™/āļŠāļąāļ›āļ”āļēāļŦāđŒ
  • āļ›āļĢāļ°āļāļąāļ™āļŠāļąāļ‡āļ„āļĄ
  • āļ›āļĢāļ°āļāļąāļ™āļŠāļļāļ‚āļ āļēāļž
  • āđ‚āļšāļ™āļąāļŠāļ‚āļķāđ‰āļ™āļ­āļĒāļđāđˆāļāļąāļšāļœāļĨāļ‡āļēāļ™
  • āļ›āļĢāļ°āļāļąāļ™āļŠāļĩāļ§āļīāļ•
  • āđ‚āļšāļ™āļąāļŠāļ‚āļķāđ‰āļ™āļ­āļĒāļđāđˆāļāļąāļšāļœāļĨāļ›āļĢāļ°āļāļ­āļšāļāļēāļĢ
  • āļāļķāļāļ­āļšāļĢāļĄ
  • āļāļēāļĢāļ—āļģāļ‡āļēāļ™āđāļšāļšāđ„āļŪāļšāļĢāļīāļ”
āļ—āļĩāđˆ WorkVenture āđ€āļĢāļēāđƒāļŦāđ‰āļĄāļđāļĨāđ€āļŠāļīāļ‡āđ€āļāļĩāđˆāļĒāļ§āļāļąāļšāļšāļĢāļīāļĐāļąāļ— āļ˜āļ™āļēāļ„āļēāļĢ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ āđ„āļ—āļĒ āļˆāļģāļāļąāļ” (āļĄāļŦāļēāļŠāļ™) āđ‚āļ”āļĒāļĄāļĩāļ‚āđ‰āļ­āļĄāļđāļĨāļ—āļĩāđˆāđ€āļāļĩāđˆāļĒāļ§āļ‚āđ‰āļ­āļ‡ āļ•āļąāđ‰āļ‡āđāļ•āđˆāļ āļēāļžāļšāļĢāļĢāļĒāļēāļāļēāļĻāļāļēāļĢāļ—āļģāļ‡āļēāļ™ āļĢāļđāļ›āļ–āđˆāļēāļĒāļ‚āļ­āļ‡āļ—āļĩāļĄāļ‡āļēāļ™ āđ„āļ›āļˆāļ™āļ–āļķāļ‡āļĢāļĩāļ§āļīāļ§āđ€āļŠāļīāļ‡āļĨāļķāļāļ‚āļ­āļ‡āļāļēāļĢāļ—āļģāļ‡āļēāļ™āļ—āļĩāđˆāļ™āļąāđˆāļ™ āļ‹āļķāđˆāļ‡āļ‚āđ‰āļ­āļĄāļđāļĨāļ—āļļāļāļ­āļĒāđˆāļēāļ‡āļšāļ™āļŦāļ™āđ‰āļēāļ‚āļ­āļ‡āļšāļĢāļīāļĐāļąāļ— āļ˜āļ™āļēāļ„āļēāļĢ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ āđ„āļ—āļĒ āļˆāļģāļāļąāļ” (āļĄāļŦāļēāļŠāļ™) āļĄāļĩāļžāļ™āļąāļāļ‡āļēāļ™āļ—āļĩāđˆāļāļģāļĨāļąāļ‡āļ—āļģāļ‡āļēāļ™āļ—āļĩāđˆāļšāļĢāļīāļĐāļąāļ— āļ˜āļ™āļēāļ„āļēāļĢ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ āđ„āļ—āļĒ āļˆāļģāļāļąāļ” (āļĄāļŦāļēāļŠāļ™) āļŦāļĢāļ·āļ­āđ€āļ„āļĒāļ—āļģāļ‡āļēāļ™āļ—āļĩāđˆāļ™āļąāđˆāļ™āļˆāļĢāļīāļ‡āđ† āđ€āļ›āđ‡āļ™āļ„āļ™āđƒāļŦāđ‰āļ‚āđ‰āļ­āļĄāļđāļĨāļˆāļĢāļīāļ‡āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ­āđ‡āļ™āļ„āļ­āļ™āđ€āļ‹āđ‡āļ›āļ•āđŒāļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ„āļžāļĩāđ€āļ­āđ‡āļ™āđāļĨāļ™āļ”āđŒāļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ­āļ‹āļĩāļšāļĩāļ‹āļĩāļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ­āļīāļŠāļīāļ•āļąāļ™