- No elements found. Consider changing the search query.


Skills:
Project Management, Linux, UNIX, English
Job type:
Full-time
Salary:
negotiable
- Manage CCII (Cloud, Cyber Security, IOT, ICT) project for single and multi-tower solution for Property, Retail, Conglomerate, and international customer segments.
- Be a committee of AIS bid management for validating large projects at TCV > 10MB.
- Manage project stakeholders to meet expectation and requirement.
- Communicate project progress to stakeholders.
- Plan and manage project issue and risk with proper actions.
- Plan and manage project to meet project objective, within timeline, project budget, scope and give customer satisfied.
- Manage project resource both internal delivery and external suppliers.
- Bachelor's degree or higher in computer science, business, or a related field.
- 8-15 years of project management and related experience.
- Strong in communication and stakeholder management.
- Project Management Professional certification preferred.
- Proven ability to solve problems creatively.
- Strong familiarity with project management software tools, methodologies, and best practices.
- Experience seeing projects through the full life cycle.
- Excellent analytical skills.
- Strong interpersonal skills and extremely resourceful.
- Proven ability to complete projects according to outlined scope, budget, and timeline.
- Engineering Specialist (Cyber Security).
- Oversee the implementation of cyber security solutions and services to ensure customer satisfaction and security effectiveness.
- Plan and establish procedures and systems that enhance operational efficiency.
- Delegate tasks effectively to team members to achieve organizational objectives.
- Strategically allocate resources to optimize project outcomes.
- Monitor and support staff in their work progress to ensure timely delivery of services.
- Evaluate staff performance through regular assessments and feedback mechanisms.
- Foster professional development among team members to enhance their skills and capabilities.
- Drive productivity and maintain high quality standards within the division.
- Provide guidance and coaching to staff to support exceptional service delivery.
- Bachelor s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Some positions may require a master s degree.
- Relevant work experience in cybersecurity roles, typically ranging from 3-7 years, depending on the seniority of the position. Hands-on experience with security technologies and methodologies is essential.
- Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), CompTIA Security+, Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA) may be preferred or required.
- Proficiency in network security, firewalls, intrusion detection systems, and VPN.
- Knowledge of operating systems (Windows, Linux, UNIX) and databases.
- Experience with security protocols (SSL, IPsec, etc.) and encryption.
- Familiarity with security frameworks and standards (NIST, ISO 27001, etc.).
- Knowledge of Compliance: Understanding of regulatory requirements and compliance standards (e.g., GDPR, HIPAA, PCI-DSS).
- Ability to work both independently and collaboratively in a team environment.
- Strong attention to detail and the ability to prioritize tasks effectively.
- Engineering/IT Specialist (Cyber Security)
- Design/Implement Cyber Security project for Private Cloud and Global Cloud (AWS and MS Azure).
- Solution integration and migration.
- Control suppliers in the assigned project.
- Do project quality control.
- Do project risk assessment and management.
- Do project UAT with customer.
- Create final project document.
- Do customer project training (OJT).
- At least 4 years of Cyber Security experience.
- Bachelor s degree in Computer Engineering, Information Technology, Computer Science or related fields.
- Experience in installation and operation Security product e.g. Firewall, IPS, SIEM, NAC, Anti-Virus, Endpoint.
- Knowledge on network security and cloud technology.
- Knowledge of monitoring tools (What s up gold, Zabbix, Nagios).
- Has valid Security product Certification e.g. Fortinet NSE3-7, Palo Alto PCNSA, PCNSE, Cisco CCNA, CCNP Security.
- Experienced in ITIL framework.
- Senior Engineer (System Infrastructure)
- Implement Server, Storage, Virtualization, Backup system for Enterprise customer.
- Hypervisor and Operating system configuration and customization.
- Network and firewall integration for Cloud infrastructure.
- Hand-over completed solution to related team.
- At least 3 years experience on Server, Storage, VMware and Veeam delivery.
- Strong knowledge of Cloud environment and Operating system. (Windows and Linux).
- Basic skill of Database and Middleware installation.
- Strong organizational skills and ability to take on multiple assignments.
- Experienced firewall and cloud network implementation.
- Ability to occasionally work or assign work during nights/weekends during critical incidents per on-call rotation or major project implementations.
- Good command of English.
- VMware VCP or Linux certificate knowledge is an advantage.
Skills:
Procurement, Cost Estimation, Budgeting
Job type:
Full-time
Salary:
negotiable
- Work under supervision to support engineering works in every asset life cycle including but not limited to concept selection, basic / detailed engineering, construction engineering, procurement support, operations and maintenance support, and decommissioning.
- Be present onsite or at the vendor/contractor premise to perform investigation, troubleshooting, audit, site survey, commissioning and/or acceptance test.
- Perform engineering studies which involves engineering calculation, cost estimation, ...
- Practice and learn to apply engineering concepts, methods, and technical knowledges to carry out the work assignment.
- Carry out engineering works adhering to cooperate/department standards, guidelines, work procedures, and practices.
- Practice and assist in technical administration of related service contracts / procurement of simple package/ well-defined contracts.
- To be trained intensively on the necessary fundamental E&P engineering concepts / methodologies.
- Participate in team discussion to build up the fundamental knowledge / capability of technical.
- Follow the company s SSHE policy and regulations in all works under his/her responsibilities.
- Undertake other duties as assigned including special projects.
- Bachelor s Degree in Engineering (Chemical Engineering, Mechanical Engineering and Instrumentation Engineering).
- Good command of both written and spoken English.
- Required TOEIC score 650 and up.
Skills:
ISO 27001
Job type:
Full-time
Salary:
negotiable
- Protect the organization's computer networks and systems against a range of cyber threats, such as hacking attempts, data breaches, and different types of cyber attacks. The
- responsibilities of this role include creating, deploying, and overseeing security strategies and technologies to defend the organization IT security.
- Lead the strategic direction, development, and implementation of cybersecurity solutions and practices to protect the organization from sophisticated cyber threats and ...
- Serve as the foremost cybersecurity expert within the organization, providing deep technical expertise and leadership in the design, evaluation, and optimization of complex security architectures.
- Develop comprehensive cybersecurity frameworks that align with industry best practices and regulatory standards, ensuring the organization's resilience against cyber attacks.
- Conduct sophisticated risk assessments and threat modeling exercises to identify potential security gaps and develop advanced strategies for mitigation and prevention.
- Lead the incident response and crisis management efforts for high-impact security breaches, coordinating with cross-functional teams to ensure rapid containment and recovery.
- Drive the adoption of cutting-edge security technologies and methodologies, including artificial intelligence and machine learning, to enhance detection and response capabilities.
- Establish and maintain strong relationships with external cybersecurity agencies, industry groups, and technology partners to stay abreast of emerging threats and trends.
- Develop and manage the cybersecurity budget, ensuring strategic allocation of resources to high-priority projects and initiatives.
- Advanced degree in Computer Science, Information Security, or a related field, with specialized knowledge in cybersecurity.
- A minimum of 5 years of experience in Infrastructure, 3 years of cybersecurity, with at least 2 years in a strategic leadership or management role overseeing cybersecurity functions.
- Professional cybersecurity certifications, such as CISSP, CISM, CCSP, or similar, are required.
- Proven expertise in developing and implementing cybersecurity strategies and architectures to protect complex enterprise environments.
- Other: Deep knowledge of the cybersecurity landscape, including emerging threats, advanced persistent threats (APT), regulatory requirements, and industry best practices.
- Other: ISO 27001.
Experience:
1 year required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Penetration Tester (Manual & Automate).
- Minimum years experience required.
- Over 1 years of Experience in related fields.
- Additional application instructions.
- Good Communication in English.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Experience:
7 years required
Skills:
System Security, Windows Server, Linux
Job type:
Full-time
Salary:
฿60,000 - ฿90,000, negotiable
- Identify and evaluate areas for improvement in detection, prevention, and cyber incident response.
- Work closely with stakeholders to develop and follow up on remediation plans.
- Provide expert consultation on mitigating strategies and actionable remediation plans to asset owners.
- Collaborate with various teams to create, implement, and monitor effective remediation strategies.
- Apply knowledge of IT infrastructure, with experience as a system administrator or system engineer, to enhance cybersecurity measures.
- Utilize an understanding of offensive and defensive cybersecurity strategies (e.g., red and blue teams).
- Perform penetration testing or demonstrate a strong understanding of penetration testing methodologies to assess the security of IT systems.
- Use computer forensic tools to examine and analyze electronic media in suspected hacking cases.
- Conduct tasks related to malware analysis and reverse engineering to identify and mitigate threats.
- Define a course of action if a security problem exists and explain in detailed technical reports what occurred when an incident happens, including the reasons it occurred, and the response taken.
- Document incidents thoroughly, providing detailed technical reports that include the cause of the incident, and the response measures implemented.
- Build relationships with other entities responsible for conducting cyber threat analyses, ensuring effective collaboration and information sharing.
- Bachelor s degree / master s degree or higher in Computer Engineering, Information Technology, Computer science or related field.
- Proficiency with SIEM, UBA, and SOAR tools.
- Experience with system monitoring tools.
- Coding ability in C, C++, C#, Java, ASM, PERL, PHP, and PowerShell.
- Knowledge of backup and archiving techniques.
- Use of enterprise system monitoring tools.
- Understanding of cloud computing.
- Proficiency in UNIX.
- Knowledge of network communication (IP/TCP).
- Familiarity with computer hardware systems.
- Experience with web-based application security.
- Strong knowledge of Windows and Linux Operating Systems.
- Experience in identifying and evaluating cybersecurity risks and providing actionable insights.
- Previous experience as a penetration tester (pentester) is highly beneficial.
- Experience as a system administrator/system engineer is advantageous.
- Familiarity with computer forensic tools and techniques.
- Experience in malware analysis and reverse engineering.
- Ability to work well under pressure while handling multiple tasks.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Experience:
3 years required
Skills:
System Security, Windows Server
Job type:
Full-time
Salary:
฿60,000 - ฿80,000, negotiable
- Provide input and security consultation in a project-based environment as well as assisting operational of IT Security components with functional security requirements.
- Evaluate new projects and applications as they relate to security architecture and design; audit existing deployments and analyse gaps against security practices and standards.
- Conduct application vulnerability assessment, secure code review, and security penetration testing for new projects, enhancement projects, and periodic assurance to com ...
- Implement and operate DevSecOps on projects/applications that use DevOps process.
- Track, enforce, and consult to resolution the closure of security risks including review plans and monitor progress or remedial actions according to security requirements, security design, application vulnerability, and penetration testing issues.
- Periodically review security requirements to align with Bank s policies and regulations.
- Support periodic security audits.
- Manage third parties involved in IT Security Advisory and Assurance.
- Bachelor's or Master s Degree in Computer Science, Engineering, Information Systems or equivalent.
- Minimum 3 years in IT Security Advisory, Security Assurance, Threat Hunting plus experience working in or closely with IT Application, Enterprise Architect, and IT Risk management.
- Knowledge of Security Framework and Concepts, Compliance, Risk and Regulations, PCI DSS, OWASP, COBIT.
- Experience in performing comprehensive and authoritative technical analysis of the security readiness and compliance of applications.
- The ability to oversee pentesting to find vulnerabilities in all elements of a security system, understand security vulnerabilities, secure code review and remediation.
- Data and information management, including classification, retention and destruction. It also means keeping corporate and personal data both private and secure while needed, and destroyed when it is no longer needed.
- Knowledge of all applicable laws and compliance frameworks to enforce compliance.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Experience:
8 years required
Skills:
Business Development, Assurance, Software Development, English
Job type:
Full-time
Salary:
negotiable
- Provide integrated services focused on IT security related to help clients develop a vision for their cybersecurity and privacy program.
- Design and build a sustainable and agile Cybersecurity program in responding to changes as a part of economic and business development where IT and Cyber are catalyst.
- Operate aspects of the program and provide an independent review and assurance of their program to Management or 3rd party stakeholders.
- Provide thought leadership and direction and contribute to the firm s intellectual property by driving the development of toolkits, methodologies, accelerators, and training.
- Build, retain, coach, and develop the team through superior leadership skills.
- Bachelor s or Master s degree in Management Information Systems, Computer Engineering, Computer Science and any related fields.
- Minimum 5-8 years of working experiences in Cyber Security or Technical Implementation experience working with Commercial Off the Shelf (COTS) products (IAM, SIEM, and other security products) leading sizable teams in development lifecycle.
- Strong knowledge of IT Security Domain concepts (e.g. Identity and Access Management, Asset Security, Network Security, Security Operations, Software Development Security).
- Strong project management, interpersonal, influencing, and advisory skills.
- Strong presentation and communication skill through leading or delivering a high impact presentation to senior executives.
- Flexibility to travel and work on out-of-town engagements and overseas assignments.
- Clear, articulate, and confident written and verbal communication in Thai and English.
- Professional Certificate (e.g. CISSP, CISA, CIPP, CEH, PMP).
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Desired Languages (If blank, desired languages not specified).
- English, Thai
- Travel Requirements.
- Up to 80%
- Available for Work Visa Sponsorship?.
- No
- Government Clearance Required?.
- No
Experience:
7 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Encourage everyone to have a voice and invite opinion from all, including quieter members of the team.
- Deal effectively with ambiguous and unstructured problems and situations.
- Initiate open and candid coaching conversations at all levels.
- Move easily between big picture thinking and managing relevant detail.
- Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required.
- Contribute technical knowledge in area of specialism.
- Contribute to an environment where people and technology thrive together to accomplish more than they could apart.
- Navigate the complexities of cross-border and/or diverse teams and engagements.
- Initiate and lead open conversations with teams, clients and stakeholders to build trust.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Security Operation Center (SOC).
- Minimum years experience required.
- 7 years of experiences and above.
- Additional application instructions.
- Good communication in english.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Influence, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance {+ 16 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
Skills:
Research, System Administration, Android
Job type:
Full-time
Salary:
negotiable
- Implements IT security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Protects IT system by defining access privileges, control structures, and required resources.
- Process & analyze to gain insights on past IT areas on, current or potential attacks and threats that pose a risk to the organization.
- Primary point of contact with Internal Audit. Periodically review, update, implement and communicate changes to IT policies and procedures and General IT Controls. Facilitate internal and external audit processes by participating in scoping discussions and walk-throughs, delivering evidence that controls are operating as defined, remediating deficiencies, and acting on recommendations.
- Safeguards IT infrastructure and system as well as information system assets by identifying and solving potential and actual security problems.
- Research cyber security topics and promote Cyber security awareness throughout Thaioil.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Relevant experience, especially in IT working environment.
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g., Netflow, FPC), and other attack artifacts in support of incident investigations.
- Experience with vulnerability scanning solutions.
- Familiarity with Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Have knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform.
- Understanding of mobile technology and OS (i.e., Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
- OTHER REQUIREMENTS.
Skills:
Risk Management, Software Development, Kubernetes
Job type:
Full-time
Salary:
negotiable
- Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
- Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
- Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
- Develop and enforce policies for secure coding, data protection, and incident response.
- Implement robust authentication and authorization mechanisms.
- Conduct regular security assessments, including penetration testing and code reviews.
- Monitor, detect, and respond to security incidents using advanced tools and methodologies.
- Enhance infrastructure security using Kubernetes, Docker, and cloud platforms (GCP, AWS).
- Stay current on emerging threats, vulnerabilities, and security trends, and recommend actionable insights to improve defenses.
- Champion security awareness across the organization, including training sessions and knowledge-sharing activities.
- Ensure compliance with relevant security standards and regulations such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Basic QualificationsProven expertise in application security, cloud security, and infrastructure security.
- Proficiency in securing systems built with technologies such as Node.js, Golang, Elixir, Python, React, Svelte, or Flutter.
- Experience with tools like Docker, Kubernetes, and cloud services (GCP, AWS).
- Strong understanding of cryptographic principles and secure communication protocols.
- Familiarity with CI/CD pipelines and secure DevOps practices.
- Hands-on experience with security tools for vulnerability scanning, penetration testing, and threat detection.
- Deep understanding of database security, especially with PostgreSQL or other relational or non-relational databases.
- Strong analytical and problem-solving skills with a security-first mindset.
- Excellent communication skills and the ability to collaborate effectively in Agile teams.
- Self-motivation, adaptability, and a strong work ethic.
- Preferred Qualifications We re especially excited if you bring:Experience leading security initiatives or mentoring other engineers in security best practices.
- Expertise in compliance frameworks such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Advanced knowledge of security monitoring and incident response systems.
- Strong system design skills with a focus on secure architectures and long-term trade-offs.
- A proven track record of securing fast-paced, high-growth tech environments.
- A passion for securing user-centric products and contributing to their success.
- Perks & Benefits Flat Structure As we continue to grow fast, we strive to retain our culture where everyone is heard, contributes, and grows with the company..
- Work-life Harmony We believe that quality time outside of work is important to sustaining a healthy and happy lifestyle.
- Remote Work Hybrid-mode activated! It comes with the package: flexibility, focus and productivity!.
- Urban Office One breath from Phrom Phong BTS. No sweat whatsoever! The office should also feel like a second home so we dedicated a lot of care and resources into building the best environment for you to wake up to every morning.
- Fun Workshop The best relationships are built over new experiences, that s why we have workshops filled with a range of activities for you to look forward to and enjoy.
- Game Tournament It s getting fun and competitive! Challenge doesn t only have to come from work. Own the championship and show the peeps how great of a gamer (and player) you are.
- Group Insurance Health comes first, we know, don t worry, we ve got you covered.
- Health & Wellness Only a healthy army wins the war. We invest to take care of you from physical, mental and happiness-level. Adopted health & wellness applications plus activities to make sure everyone here is on cloud nine
Experience:
1 year required
Skills:
Risk Management, Compliance
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
Experience:
3 years required
Skills:
Compliance, Legal, Risk Management
Job type:
Full-time
Salary:
negotiable
- Develop data security policy review, data security policy exceptions, and control risk mitigation processes.
- Define the security controls for access management lifecycle (i.e., requirement for creation, deletion, transfer and review).
- Operate:Advice on technology relating to Data Privacy and Protection (i.e., PDPA) related security controls implementation.
- Drive and support data security controls such as Data Loss Prevention (DLP), Data Masking, Data Encryption capabilities to protect sensitive data.
- Drive compliance (or collaborate with compliance team) to organization security policies, standards, metrics, and legal requirements.
- Communicate and enforce security policies, rules, and standards.
- Conduct impact assessment of data initiatives from a security point of view.
- Ensure the cryptographic keys and related components are safety and protection of confidential information.
- Resolve data security audit and risk findings.
- Review and develop security controls to current access controls policies and procedures.
- Provide requirements for create and manage roles, access rights (includes privileged access), authentication and identity within the environment.
- Conduct periodic review of user access.
- Review, approve and monitor the usage of privileged access.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Work experience in privacy, compliance, information security, auditing or a related field may also be an accepted alternative, according to Cybersecurity.
- Minimum 3 years of experience in and strong knowledge of privacy, data, operational risk management, information security, or related areas in IT.
- OTHER REQUIREMENTS.
Job type:
Full-time
Salary:
negotiable
Greenline Synergy provides the information security governance to the BDMS hospitals which is a framework of policies, practices, and strategies that align organizational resources toward protecting information through cybersecurity measures.
Skills:
Procurement, Safety Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Provide strategic planning and analysis for building management and security operations in the assigned scopes. The scope of responsibilities are include but not limit to:Overall planning and implement for improve building operations and facilities management i.e. the preventive and corrective maintenance program, efficient utility usage and alternative energy etc.
- Lead and advise MEP system for building and office renovation, operation and maintenance (O&M) for 4 sites under department responsibility.
- Develop and review procurement Term Of Reference (TOR) and contract for building management and security, include monitor the services performance in accordance with procurement and contract procedures.
- Source and analyse data for building and facility management benchmarking, cost effectiveness analysis, in order to improve process and seek new initiatives.
- Develop, review, and update building management and security standards, procedures, guidelines, process and systems.
- Develop and prepare work plans & budget (WPB). Plan and control budgets under his/her own responsibility in accordance with the approved WPB.
- Drive and be accountable for ISO team leader or focal point i.e. ISO41001 Facility Management, ISO14001 Environmental Management, ISO45001 Occupational Health and Safety Management to compliance with internationally standard and act as a focal point to obtain ISO and related certification in the future.
- Provide and utilize office space and facilities management, coordinate relevant parties for staff for seating arrangement, as well as provide technical advice on issues arise.
- Supervision and monitoring building management and security operations to ensure coverage of Safety Security Health and Environmental (SSHE) policy, regulations and Department s strategy for 4 sites under FFM responsibility. (PTTEP H.O., PTTEP Technology and Innovation Center (PTIC), PTTEP Rapid Scaled-Up Center (RASC), PTTEP Subsurface Research Center (PSRC)).
- Be responsible for special projects as assigned i.e. work process improvement, operations and maintenance office utility systems of PTTEP alternative office, etc.
- Professional Knowledge & Experiences.
- Bachelor s Degree in any fields preferably in Electrical/Mechanical Engineering, Facilities Management.
- Minimum 10-year experience in building and facility management.
- Good command of spoken and written English.
- Good computer skills in standard software (Word, Excel, Power Point, etc.).
- Good supervisory, leadership skills, and service-minded.
- Good communication/ interpersonal skills with excellent project management and analytical skills.
- Knowledge in Government Procurement and Supplies Management would be an advantage.
- Able to travel upcountry occasionally.
- Work Location.
- Bangkok-Thailand.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Skills:
Sales
Job type:
Full-time
Salary:
negotiable
- Be the security leader and expert for your assigned territory. Leads and plans for accounts across territories, does business analysis to pursue high-potential sales opportunities and manages the End-to-End Security business across the territory.
- Develop and maintain a strong pipeline of sales opportunities, ensuring that sales targets are met or exceeded.
- Build, own and manage CISO and other key C-stakeholders' relationships in your accounts driving awareness and excitement for Microsoft security platform value and influ ...
- Understand customer cloud and security initiatives, compete landscape as well as gaps between current and desired security posture. Capture the opportunity of customers journey to balance the need for security and employee productivity with the right process and visibility.
- Demo and whiteboard the cloud security solutions and the relevant security architecture. Lead and orchestrate V-Team to drive an end-to-end value selling from discovery to demonstrating and proving business value.
- Engage security partners to help scale and accelerate the sales cycle while also ensuring a deployment plan is in place for accelerated deployment with partner added value services.
- Perform ROI and TCO analysis and leverage various commercial offers and programs to build a compelling business case accelerating negotiations and deal closure. Drive to exceed quarterly and yearly revenue targets and other sales goals. Manage sales hygiene via accurate forecasting and deal updates within sales CRM.
- Completes required training and obtains relevant product and role certifications aligned to the role and workload/industry.
- Technical Expertise: Leads end-to-end Security conversations, shares best practices and key competitor knowledge across solution areas, and evaluates opportunities to make recommendations on pursuit or withdrawal. Exhibits outstanding operational excellence - including monthly/quarterly forecasting, building healthy pipeline, CRM entry and hygiene, opportunity management and virtual team orchestration.
- Experience driving new sales and new customers using innovative approaches, leveraging joint partnership events, social selling (LinkedIn) and networking.
- Enterprise customer level experience with cloud, security technologies (Identity and Access Management, Threat protection, Data protection, Cloud Security), and industry standards recommended.
- Sales Excellence: Leads and plans for strategic accounts in the assigned territory, does business analysis to pursue high-potential customers and manages the End-to-End Security business across the assigned territory. Completes required training and obtains relevant product and role certifications aligned to the role and workload/industry.
- Sales and Technology Exceed sales goals in an assigned sales territory.
- Demonstrated sales and partner management experience.
- Competes to win new market share.
- Significant experience delivering persuasive presentations to business decision makers..
- Required/minimum qualifications Bachelor's Degree in Computer Science, Information Technology, Business Administration, or related field AND 6+ years technology-related sales or account management experience OR.
- 7+ years technology-related sales or account management experience.
- Security Sales Experience: experience selling security solutions to CISO, CDO, CTO and other key C-level stakeholders.
- Understanding of cloud security technologies: Threat protection (Endpoint security, E-mail security, Incident Response, etc.), Kill Chain, CNAPP, SIEM., Multi-Cloud Security, Identity and Access management.
- Additional or preferred qualifications 6+ years solution or services sales experience. Master's Degree in Business Administration (i.e., MBA), Information Technology, or related field AND 5+ years technology-related sales or account management experience OR.
- Bachelor's Degree in Information Technology, or related field AND 8+ years technology-related sales or account management experience OR.
- 9+ years technology-related sales or account management experience.
- MCAPSRegionsASEAN Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.
Experience:
5 years required
Skills:
Research, ISO 27001, Enthusiastic, English
Job type:
Full-time
Salary:
negotiable
- Collect and analyze threat intelligence reports covering new threats, vulnerabilities, products.
- Conduct technical and operational threat intelligence research, both independently and as part of a wider team.
- Identify emerging threats, techniques and trends, the means of protecting or defending against them, and articulate these in a range of report formats to relevant stakeholders.
- Conduct deep-level analysis of malware, including how it is developed, functions, and employed.
- Support the Consulting and Managed CTI teams, Vulnerability Management, Incident Response and CSOC team with up-to-date technical intelligence, detection logic and situational awareness on current and emerging threats.
- Support Cybersecurity Posture Management to guarantee that a good cybersecurity posture is consistently maintained at an acceptable level. Liaison with external audit, internal audit, financial crime and associated consultants, and the group firm.
- Assist technology security team leaders/others in responding to cybersecurity incidents that have an impact on cybersecurity posture, in order to guarantee quick reaction, tracking, and proper maintenance.
- Assist in R&D and innovation on cybersecurity technology and approaches for continuous cybersecurity uplift.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 5 years of experience in Information Security or a related field.
- Knowledge of security technology e.g. WAF, SIEM, EDR, IAM, CSOC and Vulnerability Management.
- Experience in cloud cybersecurity technologies and services.
- Exposure to malware reverse engineering, network intrusion analysis, host intrusion analysis, log analysis, vulnerability research or digital forensics is preferred.
- Strong understanding of industry best practices and standards, including ISO 27001, NIST, and CIS is preferred.
- Relevant certifications such as CISSP, CISM, or CISA are a plus.
- Excellent communication and problem-analytical skills, with the ability to communicate complex security issues to non-technical stakeholders.
- Effective English for verbal, written communication.
- Enthusiastic, thriving, good interpersonal skills.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
3 years required
Skills:
Industry trends
Job type:
Full-time
Salary:
negotiable
- Risk Assessment & Analysis: Conduct comprehensive assessments of clients OT environments to identify vulnerabilities and recommend mitigation strategies.
- Security Strategy Development: Design and implement tailored OT security frameworks and policies in alignment with industry standards (NIST, ISA/IEC 62443, etc.).
- Stakeholder Engagement: Collaborate with cross-functional teams, including IT, operations, and management, to foster a culture of security awareness and resilience.
- Training & Mentorship: Provide training and mentorship to junior consultants and client teams on OT security best practices and emerging threats.
- Thought Leadership: Stay abreast of industry trends, emerging technologies, and regulatory changes; contribute to white papers, presentations, and client workshops.
- Your role as a leader
- At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We expect our people to embrace and live our purpose and shared values, challenging themselves everyday to identify issues that are most important to our clients, our people and the communities, and to make an impact that matters. In addition to living our purpose, Senior Consultants across our firm are expected to:Understand objectives for stakeholders, clients and Deloitte whilst aligning own performance to objectives and sets personal priorities.
- Develop themselves by actively seeking opportunities for growth, shares knowledge and experiences with others, and acts as a strong brand ambassador.
- Seek opportunities to challenge themselves, collaborate with others to deliver and takes accountability for results.
- Build relationships and communicates effectively in order to positively influence peers and stakeholders.
- Work effectively in diverse teams within a highly inclusive team culture where everyone is supported, respected and recognized for their contribution.
- Enough about us, let's talk about youBachelor s degree in Cybersecurity, Information Technology, Engineering, or a related field; a Master s degree is a plus.
- At least 3 years of experience in cybersecurity, with a focus on operational technology and industrial control systems (ICS).
- Relevant certifications such as CISSP, CISM or GICSP,.
- Deep understanding of relevant standards and guidelines.
- Proficiency in network security, vulnerability assessment tools, and incident response methodologies specific to OT environments.
- Strong knowledge of industrial control systems, SCADA systems, and PLCs.
- Experience with network segmentation, access control, and secure communication protocols.
- Exceptional verbal and written communication skills, with the ability to articulate complex concepts to technical and non-technical stakeholders alike.
- Strong analytical and problem-solving skills, with a proactive approach to identifying and addressing potential security issues.
- Due to volume of applications, we regret that only shortlisted candidates will be notified.
- Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. #LI-AA1 Requisition ID: 106367In Thailand, the services are provided by Deloitte Touche Tohmatsu Jaiyos Co., Ltd. and other related entities in Thailand ("Deloitte in Thailand"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website.
Experience:
3 years required
Skills:
Compliance, Project Management, Business Development
Job type:
Full-time
Salary:
negotiable
- Design, Implement, and Optimize Secure Landing Zones: Lead the creation and enhancement of secure landing zones across multiple cloud service providers (CSPs) such as AWS, Azure, and Google Cloud for clients in Southeast Asia.
- DevSecOps Pipelines: Architect and implement DevSecOps pipelines, integrating security controls into CI/CD processes to automate security and compliance testing.
- Infrastructure as Code (IaC): Design and deploy infrastructure as code using tools like Terraform, AWS CloudFormation, and Azure Resource Manager (ARM) templates to aut ...
- High Availability Architectures: Implement multi-region and high availability architectures to meet performance, scalability, and disaster recovery requirements.
- Security Configurations: Configure Web Application Firewalls (WAFs), DDoS protection (e.g., AWS Shield, Azure DDoS Protection), and network firewalls (e.g., AWS Network Firewall, Azure Firewall).
- Access Control: Implement role-based access control (RBAC), least privilege principles, and multi-factor authentication (MFA) across cloud environments.
- Cloud-Native Security Expertise: Provide subject matter expertise in cloud-native security technologies, including identity and access management (IAM), encryption, security monitoring, and vulnerability management.
- Project Management and Leadership: Ensure the successful delivery of cloud security solutions through strong project management and leadership.
- Business Development: Assist in business development efforts, including proposal creation and identifying opportunities to grow cloud security service offerings.
- Client Relationships: Build and nurture positive working relationships with clients, aiming to exceed their expectations.
- Engagement Profitability: Identify opportunities to improve engagement profitability.
- Mentorship: Mentor and develop junior staff, promoting knowledge sharing and skills development within the team.
- Your role as a leader At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We connect our purpose and shared values to identify issues as well as to make an impact that matters to our clients, people and the communities. Additionally, Assistant Managers across our Firm are expected toDevelop diverse, high-performing people and teams through new and meaningful development opportunities.
- Collaborate effectively to build productive relationships and networks.
- Understand and lead the execution of key objectives and priorities for internal as well as external stakeholders.
- Influence stakeholders, teams, and individuals positively - leading by example and providing equal opportunities for our people to grow, develop and succeed.
- Deliver superior value and high-quality results to stakeholders while driving high performance from people across Deloitte.
- Apply their understanding of disruptive trends and competitor activity to recommend changes, in line with leading practices.
- Enough about us, let's talk about you.3+ years of experience in cloud security implementations across multiple CSPs (AWS, Azure, GCP).
- Extensive hands-on experience in designing and implementing Security Landing Zones, cloud security architectures, and securing hybrid/multi-cloud environments.
- Relevant certifications such as AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer, Google Cloud Professional Cloud Security Engineer, or CISSP, CCSP are highly desirable.
- Proven experience managing cloud security projects, including landing zone implementations and security automation.
- Expertise in cloud-native security controls, including IAM, key management, network security, and security monitoring tools (e.g., AWS Security Hub, Azure Security Center).
- Strong knowledge of compliance frameworks such as NIST,CSA CCM, and CIS Benchmarks and how to apply them to cloud security implementations.
- Ability to travel 25-50%, on average, based on the work you do and the clients and industries/sectors you serve.
- Bachelor s degree in Computer Science, Information Security, or a related field; Master s degree preferred.
- Limited immigration sponsorship may be available.
- Excellent problem-solving skills and proven ability to lead a team of engineers.
- Ability to optimally communicate and advocate key security requirements to senior stakeholders.
- Strong critical-thinking and problem-solving skills with clear communication.
- Due to volume of applications, we regret that only shortlisted candidates will be notified.
- Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. #LI-AA1 Requisition ID: 106369In Thailand, the services are provided by Deloitte Touche Tohmatsu Jaiyos Co., Ltd. and other related entities in Thailand ("Deloitte in Thailand"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website.
- 1
- 2
- 3
- 4
- 5
- 6
- 8