āļ›āļĢāļ°āļāļēāļĻāļ‡āļēāļ™āļ™āļĩāđ‰āļŦāļĄāļ”āļ­āļēāļĒāļļāđāļĨāđ‰āļ§

Job Description

  • Executes cybersecurity engineer tasks including, but not limited to, security patch management, security vulnerability management, and security configuration management.
  • Tests, implements, deploys, maintains, reviews, and administers the cybersecurity tools.
  • Assist in identifying, prioritizing, and coordinating the protection of critical cyber defense infrastructure and key resources.
  • Coordinate with Cyber Defense Analysts to manage and administer the updating of rules and signatures (e.g., intrusion detection/protection systems, antivirus, and content blacklists) for specialized cyber defense applications.
  • Identify potential conflicts with the implementation of any cyber defense tools (e.g., tool and signature testing and optimization).
  • Operates and maintains production information security systems.
  • Ensures proper cybersecurity documentation is in place regarding standard operating procedures.
  • Monitors the industry and external environment for emerging threats and advises relevant stakeholders on appropriate courses of action.
  • Oversees incident response planning and the investigation of security breaches and assists with any associated disciplinary, public relations, and legal matters.
  • Applies expert knowledge and skills to resolve problems, including support concepts and methods, problem isolation and troubleshooting procedures, system and file recovery processes, and operating system and network configurations.
  • Prepares and presents cogent and cohesive analyses and briefings advising management on new technological developments, techniques, and enhancements that result in increased time and cost efficiencies.
  • Provides advice and assistance to troubleshoot the most complex problems in a manner that minimizes interruptions in the ability to carry out critical business activities.
  • Supports rapid response teams in response to customer service problems resulting from catastrophic events such as virus infections or widespread power outages.
  • Supports the development of a formal cyber security risk assessment program.
  • Supports and assists in maintaining a vulnerability/gap/response assessment program.
  • Supports the ongoing maintenance of the cyber–Kill Chain for the company, focusing on phases of cyber-attack and remediation/mitigation for each phase.
  • Supports ongoing activities to develop, communicate, and support appropriate standards and risk controls associated with digital data.
  • Supports the development and maintenance of a company Data Protection program.
  • Responds to cybersecurity alerts
  • Cascade and leverage cybersecurity control and practice to the entire company group.


Qualifications

  • Bachelor’s or Master’s degree in Computer Engineering, MIS, IT, or a related field.
  • At least 2 years experience in computer security and 5 years in IT infrastructure.
  • Have a foundation in good information security practices.
  • Knowledge of International Security frameworks, Standards, and Guidelines, e.g., COBIT, NIST-800, ISO 27001, PCI-DSS, OWASP, etc.
  • Experience in Security tools, e.g., EDR, ATP, WAF, IPS/IDS, Deception, TI/TIP, Anti DDoS
  • Experience in Cloud Environments, e.g., Google Cloud, AWS, Microsoft Azure.
  • Experience with system and application security management and control.
  • Experience with system, network, and OS hardening techniques. (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
  • Experience with facilitating information security risk assessments.
  • Technical writing, documentation development, process mapping, and visual communication skills.
  • Hands-on experience with computer programming languages and/or scripting languages such as Python, Java, and Shell for automation.
  • Professional certificates related to work (e.g., CISSP, CISM, AWS Certified Security, or similar general security certification) are desirable
  • Talent to identify and create a broad vision for a security solution and to execute it;
  • Systems Thinking – the ability to see how parts interact with the whole (big picture thinking)
  • Proven experience of acting as an expert in project teams.
  • A positive, can-do attitude who naturally expresses a high degree of empathy to others.
  • Ability to explain your thoughts or findings also to non-technical professionals
  • Strong problem-solving and analytical abilities Able to work under minimal supervision, detail oriented
  • Excellent English (Spoken and Written).

Location: True Digital Park, Punnawithi

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒāļ—āļĩāđˆāļˆāļģāđ€āļ›āđ‡āļ™
  • 2 āļ›āļĩ
āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™
  • āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰
āļŠāļēāļĒāļ‡āļēāļ™
  • āļ§āļīāļĻāļ§āļāļĢāļĢāļĄ
āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™
  • āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 1
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 2
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 3
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 4
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 5
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 6
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 7
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 8
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 9
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 10
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 11
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 12
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 13
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 14
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 15
  • āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 16
keyboard_arrow_right

āđ€āļāļĩāđˆāļĒāļ§āļāļąāļšāļšāļĢāļīāļĐāļąāļ—

āļˆāļģāļ™āļ§āļ™āļžāļ™āļąāļāļ‡āļēāļ™:1000-2000 āļ„āļ™
āļ›āļĢāļ°āđ€āļ āļ—āļšāļĢāļīāļĐāļąāļ—:āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāļēāļĢāļŠāļ™āđ€āļ—āļĻ
āļ—āļĩāđˆāļ•āļąāđ‰āļ‡āļšāļĢāļīāļĐāļąāļ—:āļāļĢāļļāļ‡āđ€āļ—āļž
āđ€āļ§āđ‡āļšāđ„āļ‹āļ•āđŒ:www.ascendcorp.com
āļāđˆāļ­āļ•āļąāđ‰āļ‡āđ€āļĄāļ·āđˆāļ­āļ›āļĩ:2015
āļ„āļ°āđāļ™āļ™:4.5/5

Ascend Corporation, a spin-off from True Corporation under C.P. Group, is driving digital innovation across Southeast Asia. We’re transforming everyday life with our range of tech-driven services—spanning e-commerce, digital payments, cloud solutions, and more.

Our Key B ...

āļ­āđˆāļēāļ™āļ•āđˆāļ­

āļĢāđˆāļ§āļĄāļ‡āļēāļ™āļāļąāļšāđ€āļĢāļē:

Ascend Group isn’t just about digital innovation—we’re creating a vibrant space where you can truly thrive, right in the heart of Bangkok.

Our Workspace

â€Ē Central Location: Our headquarters spans two floors in t ...

āļ­āđˆāļēāļ™āļ•āđˆāļ­

āļŠāļģāļ™āļąāļāļ‡āļēāļ™āđƒāļŦāļāđˆ: AIA Capital Center Building, 18-19 th Floor, 89 Ratchadaphisek Road, Dindaeng, Bangkok 10400
Display map

āļŠāļ§āļąāļŠāļ”āļīāļāļēāļĢ

  • āļ—āļģāļ‡āļēāļ™ 5 āļ§āļąāļ™/āļŠāļąāļ›āļ”āļēāļŦāđŒ
  • āđ‚āļšāļ™āļąāļŠāļ‚āļķāđ‰āļ™āļ­āļĒāļđāđˆāļāļąāļšāļœāļĨāļ›āļĢāļ°āļāļ­āļšāļāļēāļĢ
  • āļ›āļĢāļ°āļāļąāļ™āļ—āļąāļ™āļ•āļāļĢāļĢāļĄ
  • āļŠāđˆāļ§āļ™āļĨāļ”āļžāļ™āļąāļāļ‡āļēāļ™
  • āļ›āļĢāļ°āļāļąāļ™āļŠāļļāļ‚āļ āļēāļž
  • āļ›āļĢāļ°āļāļąāļ™āļŠāļĩāļ§āļīāļ•
  • āļĨāļēāļ„āļĨāļ­āļ”
  • āļāļ­āļ‡āļ—āļļāļ™āļŠāļģāļĢāļ­āļ‡āđ€āļĨāļĩāđ‰āļĒāļ‡āļŠāļĩāļž
  • āļ›āļĢāļ°āļāļąāļ™āļŠāļąāļ‡āļ„āļĄ

āļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™āļ§āđˆāļēāļ‡āļ—āļĩāđˆāļ„āļļāļ“āļ™āđˆāļēāļˆāļ°āļŠāļ™āđƒāļˆ

āļ”āļđāļ‡āļēāļ™āļ—āļąāđ‰āļ‡āļŦāļĄāļ” >

āļ—āļĩāđˆ WorkVenture āđ€āļĢāļēāđƒāļŦāđ‰āļĄāļđāļĨāđ€āļŠāļīāļ‡āđ€āļāļĩāđˆāļĒāļ§āļāļąāļšāļšāļĢāļīāļĐāļąāļ— āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” āđ‚āļ”āļĒāļĄāļĩāļ‚āđ‰āļ­āļĄāļđāļĨāļ—āļĩāđˆāđ€āļāļĩāđˆāļĒāļ§āļ‚āđ‰āļ­āļ‡ āļ•āļąāđ‰āļ‡āđāļ•āđˆāļ āļēāļžāļšāļĢāļĢāļĒāļēāļāļēāļĻāļāļēāļĢāļ—āļģāļ‡āļēāļ™ āļĢāļđāļ›āļ–āđˆāļēāļĒāļ‚āļ­āļ‡āļ—āļĩāļĄāļ‡āļēāļ™ āđ„āļ›āļˆāļ™āļ–āļķāļ‡āļĢāļĩāļ§āļīāļ§āđ€āļŠāļīāļ‡āļĨāļķāļāļ‚āļ­āļ‡āļāļēāļĢāļ—āļģāļ‡āļēāļ™āļ—āļĩāđˆāļ™āļąāđˆāļ™ āļ‹āļķāđˆāļ‡āļ‚āđ‰āļ­āļĄāļđāļĨāļ—āļļāļāļ­āļĒāđˆāļēāļ‡āļšāļ™āļŦāļ™āđ‰āļēāļ‚āļ­āļ‡āļšāļĢāļīāļĐāļąāļ— āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” āļĄāļĩāļžāļ™āļąāļāļ‡āļēāļ™āļ—āļĩāđˆāļāļģāļĨāļąāļ‡āļ—āļģāļ‡āļēāļ™āļ—āļĩāđˆāļšāļĢāļīāļĐāļąāļ— āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” āļŦāļĢāļ·āļ­āđ€āļ„āļĒāļ—āļģāļ‡āļēāļ™āļ—āļĩāđˆāļ™āļąāđˆāļ™āļˆāļĢāļīāļ‡āđ† āđ€āļ›āđ‡āļ™āļ„āļ™āđƒāļŦāđ‰āļ‚āđ‰āļ­āļĄāļđāļĨāļˆāļĢāļīāļ‡āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ‹āļĩāļžāļĩāđāļ­āļĨāļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļŠāļ­āļĢāļēāļ•āļąāļ™āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ‚āļ‹āđ„āļ­āđ€āļ”āļĩāļĒāļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ WorkVenture Technologies