- No elements found. Consider changing the search query.


Experience:
5 years required
Skills:
Risk Management, Project Management, English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Skills:
Compliance, Automation, Risk Management
Job type:
Full-time
Salary:
negotiable
- Lead and enhance security operations, mentoring team members and implementing advanced security strategies.
- Architect and enforce security frameworks for IT systems, networks, and cloud environments.
- Monitor, detect, and respond to cyber threats, conducting forensic investigations and post-incident analysis.
- Oversee vulnerability management, system hardening, and security compliance.
- Manage identity and access controls, privileged accounts, and authentication mechanisms.
- Drive security automation, process improvements, and adoption of emerging technologies.
- Conduct security awareness training and ensure best practices across the organization.
- Minimum 5+ years of experience in security operations, with a strong focus on incident response, vulnerability management, and risk assessment.
- Proven experience leading incident response efforts and conducting root cause investigations.
- Experience with vulnerability management, and overseeing the security pipeline.
- Experience with security standardization and IT compliance certification and audit.
- Experience with risk management frameworks and methodologies.
- Expert knowledge of security tools, including SIEM, EDR, vulnerability scanners, and penetration testing tools.
- Strong understanding of network protocols, cloud operating systems, and security concepts.
- Strong understanding of security frameworks such as NIST, ISO 27001, and MITRE ATT&CK.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis is a plus.
- Exceptional analytical and problem-solving skills.
- Strong communication and interpersonal skills.
- Ability to work independently and as part of a team.
- Strong attention to detail and a commitment to accuracy.
- Strong documentation and reporting skills.
- Ability to effectively communicate technical risks to non-technical stakeholders.
- Understanding of the 3 lines of defense model is a significant advantage.
- Remark: Given the nature of the mentioned position, where employees are involved with customer data and asset values, and/or the company, to comply with legal and regulatory standards established by the Securities and Exchange Commission, as well as to align with laws and overseeing agencies, the company requires a criminal background check as part of the post-interview process before joining the company. Your criminal history information will be retained for a period of 6 months from the start date..
- Important: Candidate Privacy Policy.
- สำคัญ:โปรดอ่านและทำความเข้าใจ: นโยบายความเป็นส่วนตัวด้านทรัพยากรบุคคล สำหรับผู้สมัครงาน และผู้สมัครเข้าฝึกงาน*.
Skills:
Risk Management, English
Job type:
Full-time
Salary:
negotiable
- Plan and support internal audit strategies in Cyber Security part (Cyber Security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks).
- Lead a Cyber Security Audit team to ensure output through implementation of work standards and report to top management.
- Identify potential Cyber Security Risk and convince others in the organization to accept complete proposals and recommendation.
- Master s degree in Computer Engineering, Computer Science, Information Technology.
- Experience At least 7 years such as Information Security Management, Information Risk Management, IT Audit Management, ICT Security, Cloud Security, or in a related field.
- Professional certificates of CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) are advantage.
- Background in technical knowledge of Cyber Security Audit.
- Good command in English.
Skills:
System Security
Job type:
Full-time
Salary:
negotiable
- ดูแล วางแผน และออกแบบ ระบบรักษาความปลอดภัยสารสนเทศ เช่น Firewall, VPN, Email Security, AAA, Cloud Security, Security Consult.
- บริหารจัดการโครงการด้านความปลอดภัยสารสนเทศ.
- ร่วมพัฒนาระบบงานความปลอดภัยด้านสารสนเทศ ระบบต่าง ๆ ด้าน IOT / ระบบ Email / ระบบป้องกันไวรัส.
- ให้คำแนะนำระบบความปลอดภัยด้านสารสนเทศภายใน และภายนอกแก่หน่วยงานต่าง ๆ พร้อมจัดทำคู่มือ และฝึกอบรมทีมงาน และผู้ใช้งาน.
- ประสานงาน ให้คำปรึกษา และแนะนำระบบความปลอดภัยสารสนเทศให้กับพนักงาน และผู้ที่เกี่ยวข้อง.
- งานอื่น ๆ ตามที่ได้รับมอบหมาย.
- วุฒิการศึกษา: ปริญญาตรี วิศวกรรมศาสตร์ / วิทยาศาสตร์ คอมพิวเตอร์ หรือสาขาอื่น ๆ ที่เกี่ยวข้อง.
- ประสบการณ์ทำงาน: 5 - 10 ปี.
- มีทักษะการสื่อสาร วางแผน และเจรจาต่อรอง.
Skills:
Negotiation
Job type:
Full-time
Salary:
negotiable
- Bachelor degree or higher in Computer Science or related filed.
- There are 5-8 years, Experience in Network skills.
- Able to do network design, evaluation, POC, implementation.
- Self-Motivation and Hard Working.
- Able to work some time on night and weekend by job duties.
- Able to troubleshooting related to network problem & connecting equipment.
- Willing to self-study for network knowledge and learn new knowledge from team.
- Good communication,interpersonal, problem-solving, presentation, and negotiation skill.
Skills:
Compliance, Analytical Thinking, Automation
Job type:
Full-time
Salary:
negotiable
- Design, implement, and manage security controls for cloud environments (AWS, Azure, Google Cloud).
- Perform risk assessments and vulnerability management for cloud-based assets.
- Monitor cloud resources to detect and respond to security incidents.
- Collaborate with IT and development teams to integrate security into the SDLC and DevSecOps.
- Ensure compliance with industry regulations and internal security policies.
- Provide expertise in identity and access management (IAM) within cloud platforms.
- Continuously evaluate and recommend security improvements for cloud operations.
- Strong understanding of network security, encryption, and cloud infrastructure.
- Analytical thinking and problem-solving abilities.
- Ability to work collaboratively in cross-functional teams.
- Excellent communication skills to present security risks and solutions to non-technical stakeholders.
- Bachelor s degree in Computer Science, Information Security, or related field.
- Proven experience in cloud security, with a focus on AWS, Azure, or Google Cloud.
- Experience with cloud security automation and monitoring tools.
- Certifications such as AWS Certified Security Specialty, CISSP, or CCSP are an advantage.
Skills:
Compliance, Legal, English
Job type:
Full-time
Salary:
negotiable
- Driving PSMS (physical security management system) at local level within the framework of C/AUP governance (incl. Site Security Concept process & consulting of local management).
- Monitoring of adequate implementation of local risk mitigation measures (incl. security services delivered by GR/SES).
- Conducting security investigations at local level & support internal investigations (Compliance) on request.
- Implementing security awareness promotion activities along with other security stakeholders at site (e.g. DSO, GR).
- At Regional Level.
- Implementation/monitoring of the C/AUP regulatory framework in the region based on legal conditions.
- Serve as the primary contact point for physical security governance requirements for responsible region.
- Driving the regional int./ext. security network. Raise PSMS awareness among regional managers and employees.
- Support the continuous improvement process and share best practices within the worldwide security organization.
- Qualifications Bachelor s degree in related fields.
- 5-8 years' experience in an industrial/manufacturing company security or facilities experience are preferred.
- Excellent communication and presentation skills; demonstrated ability to interact with all levels of management with excellent analytical skills.
- Work independently and control own work priorities.
- Highly knowledgeable in all aspects of risk analysis.
- General knowledge of systems capability for security systems.
- Basic knowledge of investigation techniques and methods.
- A good understanding of risk and security issues facing office organization in Thailand.
- Good spoken and written English and Thai.
- Able to travel to Rayong province for work assignments as required.
- Additional InformationBy choice, we are committed to a diverse workforce and are an equal opportunity employer. Robert Bosch welcomes and encourages applications from people with disabilities. Accommodations are available on request for candidates taking part in the selection process.
Experience:
7 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Encourage everyone to have a voice and invite opinion from all, including quieter members of the team.
- Deal effectively with ambiguous and unstructured problems and situations.
- Initiate open and candid coaching conversations at all levels.
- Move easily between big picture thinking and managing relevant detail.
- Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required.
- Contribute technical knowledge in area of specialism.
- Contribute to an environment where people and technology thrive together to accomplish more than they could apart.
- Navigate the complexities of cross-border and/or diverse teams and engagements.
- Initiate and lead open conversations with teams, clients and stakeholders to build trust.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Security Operation Center (SOC).
- Minimum years experience required.
- 7 years of experiences and above.
- Additional application instructions.
- Good communication in english.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Influence, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance {+ 16 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Skills:
Risk Management, Software Development, Kubernetes
Job type:
Full-time
Salary:
negotiable
- Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
- Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
- Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
- Develop and enforce policies for secure coding, data protection, and incident response.
- Implement robust authentication and authorization mechanisms.
- Conduct regular security assessments, including penetration testing and code reviews.
- Monitor, detect, and respond to security incidents using advanced tools and methodologies.
- Enhance infrastructure security using Kubernetes, Docker, and cloud platforms (GCP, AWS).
- Stay current on emerging threats, vulnerabilities, and security trends, and recommend actionable insights to improve defenses.
- Champion security awareness across the organization, including training sessions and knowledge-sharing activities.
- Ensure compliance with relevant security standards and regulations such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Basic QualificationsProven expertise in application security, cloud security, and infrastructure security.
- Proficiency in securing systems built with technologies such as Node.js, Golang, Elixir, Python, React, Svelte, or Flutter.
- Experience with tools like Docker, Kubernetes, and cloud services (GCP, AWS).
- Strong understanding of cryptographic principles and secure communication protocols.
- Familiarity with CI/CD pipelines and secure DevOps practices.
- Hands-on experience with security tools for vulnerability scanning, penetration testing, and threat detection.
- Deep understanding of database security, especially with PostgreSQL or other relational or non-relational databases.
- Strong analytical and problem-solving skills with a security-first mindset.
- Excellent communication skills and the ability to collaborate effectively in Agile teams.
- Self-motivation, adaptability, and a strong work ethic.
- Preferred Qualifications We re especially excited if you bring:Experience leading security initiatives or mentoring other engineers in security best practices.
- Expertise in compliance frameworks such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Advanced knowledge of security monitoring and incident response systems.
- Strong system design skills with a focus on secure architectures and long-term trade-offs.
- A proven track record of securing fast-paced, high-growth tech environments.
- A passion for securing user-centric products and contributing to their success.
- Perks & Benefits Flat Structure As we continue to grow fast, we strive to retain our culture where everyone is heard, contributes, and grows with the company..
- Work-life Harmony We believe that quality time outside of work is important to sustaining a healthy and happy lifestyle.
- Remote Work Hybrid-mode activated! It comes with the package: flexibility, focus and productivity!.
- Urban Office One breath from Phrom Phong BTS. No sweat whatsoever! The office should also feel like a second home so we dedicated a lot of care and resources into building the best environment for you to wake up to every morning.
- Fun Workshop The best relationships are built over new experiences, that s why we have workshops filled with a range of activities for you to look forward to and enjoy.
- Game Tournament It s getting fun and competitive! Challenge doesn t only have to come from work. Own the championship and show the peeps how great of a gamer (and player) you are.
- Group Insurance Health comes first, we know, don t worry, we ve got you covered.
- Health & Wellness Only a healthy army wins the war. We invest to take care of you from physical, mental and happiness-level. Adopted health & wellness applications plus activities to make sure everyone here is on cloud nine
Skills:
Express
Job type:
Full-time
Salary:
negotiable
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
Job type:
Full-time
Salary:
negotiable
Greenline Synergy provides the information security governance to the BDMS hospitals which is a framework of policies, practices, and strategies that align organizational resources toward protecting information through cybersecurity measures.
Skills:
Sharepoint, English
Job type:
Full-time
Salary:
negotiable
- Could have experience to develop information in Microsoft SharePoint 3-5 Years.
- Could have experience quality-control would be more assist.
- Have experience in Thai Oil Service would be more assist.
- EDUCATION.
- Bachelor Degree in Computer Science, Computer Engineering, Information Technology or any equivalent fields of study.
- OTHER REQUIREMENTS.
- Good command of English and computer literacy.
- Work @ Sriracha, Chonburi.
- ROLE & RESPONSIBILITY.
- Be able to communicate and manage Safety and Security information by Standard Program of Thai Oil as well. Thus could be reference and apply to all staff implement.
- สามารถสื่อสารสื่อความและควบคุมจัดการงานข้อมูลเรื่องความมั่นคงปลอดภัยผ่านมาตรฐานโปรแกรมที่มีใช้ในองค์กรได้เป็นอย่างดีเพื่อให้ทุกคนในองค์กรสามารถอ้างอิงและนำไปใช้ได้อย่างถูกต้อง.
- Be able to collect, store, create and update documents of the organization's internal and external security management system standards correctly and able to evaluate according to the standards set
- สามารถรวบรวมจัดเก็บ สร้างและอัพเดทเอกสารของมาตรฐานระบบการจัดการความมั่นคงและปลอดภัยขององค์กรทั้งภายในและภายนอกได้อย่างถูกต้อง และสามารถประเมินผลได้ตามมาตรฐานที่ได้กำหนดไว้.
- Be able to practice Security skill to supervise the team contractor working correctly and effectiveness
- สามารถฝึกฝนเพื่อให้สามารถปฏิบัติการบังคับบัญชาหรือแนะนำงานในด้านความมั่นคงให้กับทีมงานผู้รับเหมาที่ปฏิบัติงานภายใต้บังคับบัญชาปฏิบัติงานได้อย่างถูกต้องและมีประสิทธิภาพได้ในอนาคต.
Skills:
Project Management
Job type:
Full-time
Salary:
negotiable
- Responsible for the protection of Celestica assets and to respond to alarms, emergency situations and to assist employees with security issue as part of our mission to provide a safe work environment.
- Responsible for maintaining appropriate access to all areas of the facility for both employees and customers.
- Controlling daily security operations including incident investigation, property passes, loss prevention, and all administrative duties required at the site.
- Knowledge/Skills/Competencies.
- In-depth knowledge of facilities management and operations.
- Understanding of environmental, health and safety regulations (local and government).
- Good organization and project management skills.
- Ability to evaluate, diagnose and troubleshoot problems.
- Ability to gather and analyze data and determine root cause of problems.
- Ability to effectively communicate with a variety of internal and external customers.
- Typical Experience.
- Two to Four years relevant experience.
- Typical Education.
- Bachelor's degree in a related field, or an equivalent combination of education and experience.
- Educational requirements may vary by geography.
- Notes.
- This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
- Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
- At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.
- Celestica (NYSE, TSX: CLS) enables the world s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
- Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
- Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
Experience:
2 years required
Skills:
Compliance, Excel
Job type:
Full-time
Salary:
negotiable
- Assist in the planning, execution, and monitoring of projects.
- Utilise strong critical thinking and problem solving skills day to day.
- Collaborate with team members to ensure project deliverables are met on time and within scope.
- Prepare and maintain project documentation, including reports, presentations, and meeting minutes.
- Quickly adapt to changing priorities and project requirements.
- Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment.
- Proactively identify and address potential issues or roadblocks to ensure smooth project execution.
- Work with other NIS teams both locally, regionally and globally to deliver the security needs specific to the firm.
- Support work in vulnerability management and compliance activities.
- Handles BAU activities such as managing security exceptions.
- Help the business comply with the Information Security Policy by leveraging your cyber security knowledge and expertise.
- Collaborate with PwC IT and global team to align security process and tools.
- Guide and support the business team to complete all required security reviews.
- Build knowledge on application security to effectively support security assessments.
- Align with different global and local teams to identify and fix gaps or risk found.
- Other.
- Help with daily security incident handling.
- Help to manage junior staff, eg. interns.
- An effective CISO pillar candidate will also possess the following skills/ Requirements.
- Able to work in a fast-paced environment, can upskill quickly and learn proactively.
- Analytical: Inquisitive nature and intuition regarding what questions to ask, when, and their relative significance.
- Technical: Broad understanding of security technology.
- Business: High level understanding of PwC s business model, service offerings, and business operating environment as it pertains to the firm s threat landscape. Ability to frame threats and exposures in a business context recognized by non-technical staff and executives.
- Individuals selected for this role are expected to have both extensive knowledge and managerial know-how related to the following aspects: Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment.
- Understanding of technical and non-technical information security risks.
- Have skills to analyse data and visualise data (good to have knowledge of Excel, PowerPoint etc.).
- Good written and effective communicator to deal with various stakeholders.
- Meticulous and possesses an eye for details.
- Proactive, keen to learn, enjoys solving challenging problems, thinking outside of the box.
- Diligent and open to feedback.
- Experience in a role balanced between business stakeholders and a central service organization.
- Possess knowledge about application security to effectively support security assessments.
- Time and Task Management: Ability to prioritise risk, manage a variety of take, take ownership to drive completion of activities and deliver on time.
- Interest in Information Security.
- Bachelor s or master s degree (technical degree) or equivalent Industry certification.
- Desired Certifications: (Certifications aren t a prerequisite however are well regarded).
- Education Level: Undergraduate Degree (e.g. BIT, BSc) STEM or equivalent work experience: 1-2 years of progressive professional roles involving information security, computer science and/or other technical background.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Communication, Computer Engineering, Computer Program Installation, Computer Programming, Computer Technical Support, Emotional Regulation, Empathy, Enterprise Architecture, Incident Management and Resolution (IMR), Inclusion, Information and Communications Technology (ICT), Intellectual Curiosity, IT Infrastructure Upgrades, IT Operations, IT Operations Management, IT Project Lifecycle, IT Support, IT Troubleshooting, Object-Oriented Programming (OOP), Optimism, Scripting Languages, Security Protocol Analysis {+ 6 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
Experience:
5 years required
Skills:
Research, ISO 27001, Enthusiastic, English
Job type:
Full-time
Salary:
negotiable
- Collect and analyze threat intelligence reports covering new threats, vulnerabilities, products.
- Conduct technical and operational threat intelligence research, both independently and as part of a wider team.
- Identify emerging threats, techniques and trends, the means of protecting or defending against them, and articulate these in a range of report formats to relevant stakeholders.
- Conduct deep-level analysis of malware, including how it is developed, functions, and employed.
- Support the Consulting and Managed CTI teams, Vulnerability Management, Incident Response and CSOC team with up-to-date technical intelligence, detection logic and situational awareness on current and emerging threats.
- Support Cybersecurity Posture Management to guarantee that a good cybersecurity posture is consistently maintained at an acceptable level. Liaison with external audit, internal audit, financial crime and associated consultants, and the group firm.
- Assist technology security team leaders/others in responding to cybersecurity incidents that have an impact on cybersecurity posture, in order to guarantee quick reaction, tracking, and proper maintenance.
- Assist in R&D and innovation on cybersecurity technology and approaches for continuous cybersecurity uplift.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 5 years of experience in Information Security or a related field.
- Knowledge of security technology e.g. WAF, SIEM, EDR, IAM, CSOC and Vulnerability Management.
- Experience in cloud cybersecurity technologies and services.
- Exposure to malware reverse engineering, network intrusion analysis, host intrusion analysis, log analysis, vulnerability research or digital forensics is preferred.
- Strong understanding of industry best practices and standards, including ISO 27001, NIST, and CIS is preferred.
- Relevant certifications such as CISSP, CISM, or CISA are a plus.
- Excellent communication and problem-analytical skills, with the ability to communicate complex security issues to non-technical stakeholders.
- Effective English for verbal, written communication.
- Enthusiastic, thriving, good interpersonal skills.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
7 years required
Skills:
Sales, Procurement, Legal, English
Job type:
Full-time
Salary:
negotiable
- Bachelor's degree or equivalent practical experience.
- 7 years of experience in a business role in the enterprise software or cloud space.
- Experience promoting to the clients in the enterprise cybersecurity or IT field.
- Ability to communicate in English and Thai fluently to interact with regional customers.
- Ability to travel for business and trainings.
- Preferred qualifications:Experience in supporting executive relationships, and developing territories/accounts from scratch, while ensuring customer success, adoption and expansion.
- Experience in prioritizing, planning, and organizing solution-based business activity within business cycles, including qualifying high value accounts and leveraging our partner ecosystem.
- Experience working with internal/external teams, including account, technical leads, procurement, and legal, to inventory existing software estate, build business cases for transformation with implementation plans, and close agreements.
- Experience in carrying and exceeding business goals in a business role.
- Knowledge of market trends, products, and solutions in Cloud and cybersecurity.
- Excellent negotiation, problem-solving, communication and presentation skills.
- In this role, you will help us grow our cybersecurity business by building and expanding relationships with new and existing customers. You will work with customers to deliver business value, demonstrate product functionality, and provide an overview of business use cases. You will lead day-to-day relationships with cross-functional team members and external customers, leading with empathy, while identifying ways to multiply the impact and the impact of the team as a whole to motivate overall value for Google Cloud.
- Google Cloud accelerates every organization's ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google's cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
- ResponsibilitiesBuild relationships with customers as a subject matter expert and trusted advisor, managing business cycles, identifying solution use cases, and influencing direction of accounts.
- Deliver against quota and achieve business and growth goals while forecasting and reporting your territory's business.
- Work with Google accounts and cross-functional teams (e.g., Customer Engineering, Marketing, Customer Success, Product, Engineering, Channels) to develop go-to-market strategies, motivate pipeline and business growth, close agreements, understand customer, and provide excellent prospect and customer experience.
- Construct and execute a territory development plan.
- Work with multiple customers and opportunities, understand each customer's technology footprint and strategy, growth plans, business motivators, participants, and how they can transform their business using our technologies.
- Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See alsoGoogle's EEO Policy andEEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing ourAccommodations for Applicants form.
Experience:
1 year required
Skills:
Risk Management, Compliance
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
Experience:
5 years required
Skills:
DevOps, Automation, Compliance
Job type:
Full-time
Salary:
negotiable
- Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
- A dedicated DevSecOps or security engineering team is responsible for embedding security practices into the DevOps pipeline. They build and maintain the security tools and automation required for integrating security checks into the development process.
- Implement security tools in CI/CD pipelines (e.g., code scanning, vulnerability assessments).
- Automate security testing, monitoring, and compliance checks.
- Collaborate with development and operations teams to ensure security is applied at every stage.
- Designing, supervising, and validating holistic Banking application/infrastructure security architecture, to ensure that they are aligned with cybersecurity strategy, security requirement principle and generally cybersecurity best practices (through threat modelling or similar methods).
- Designing and Implementing CI/CD (DevSecOps) Technology integration through own teams and virtual team (with the members of Digital Technology Security team) to always tighten security architecture fabrics, and to support cybersecurity transformation, lean and automation process.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 5 years of experience in security advisory, security architecture, CI/CD security, Vulnerability Assessment, Penetration test or a related field.
- Good communication skills, with the ability to communicate complex security issues.
- Strong Knowledge in new Banking Technology and associated security controls.
- Knowledge of security best practices in software development.
- Knowledge of SDLC framework.
- Familiarity with CI/CD tools & DevOps tools.
- Experience with Code/Library/Image scanning tools (Dynamic/Static Code Scan).
- Expertise in cloud security (AWS, Azure, GCP, HWC).
- Experience with cloud security and compliance tools (CSPM).
- Knowledge of Securing Cloud Environments to ensure that security practices are tailored for cloud-native and hybrid environments, including container security, infrastructure as code, and microservices security.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
2 years required
Skills:
Network Infrastructure, Security Design, Big Data, English
Job type:
Full-time
Salary:
negotiable
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Shape The Future with Confidence.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Skills:
Project Management
Job type:
Full-time
Salary:
negotiable
- Responsible for the protection of Celestica assets and to respond to alarms, emergency situations and to assist employees with security issue as part of our mission to provide a safe work environment.
- Responsible for maintaining appropriate access to all areas of the facility for both employees and customers.
- Controlling daily security operations including incident investigation, property passes, loss prevention, and all administrative duties required at the site.
- Knowledge/Skills/Competencies.
- In-depth knowledge of facilities management and operations.
- Understanding of environmental, health and safety regulations (local and government).
- Good organization and project management skills.
- Ability to evaluate, diagnose and troubleshoot problems.
- Ability to gather and analyze data and determine root cause of problems.
- Ability to effectively communicate with a variety of internal and external customers.
- Typical Experience.
- Two to Four years relevant experience.
- Typical Education.
- Bachelor's degree in a related field, or an equivalent combination of education and experience.
- Educational requirements may vary by geography.
- Notes.
- This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
- Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
- At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.
- Celestica (NYSE, TSX: CLS) enables the world s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
- Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
- Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
- 1
- 2