- No elements found. Consider changing the search query.
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
Skills:
Compliance, Legal, Risk Management
Job type:
Full-time
Salary:
negotiable
- Set and implement user access controls and identity and access management systems.
- Perform regular audits to ensure security practices are compliant.
- Deploy endpoint detection and prevention tools to thwart malicious hacks.
- Work with IT operations to set up a shared disaster recovery/business continuity plan.
- Contribute towards the execution of policies, standards and procedures specific set by enterprise standards and account specific standards as they apply to IT security governance, IT risk, and IT compliance requirements.
- Perform IT security risk assessment activities, including third party evaluation and management, and related analysis, including ongoing compliance monitoring in coordination with governance lead and external team members.
- Contribute towards the execution of IT security compliance reviews of master service agreements and advise business team regarding gaps and corresponding mitigation requirements.
- Contribute to the design and implementation of technical IT security safeguard architecture.
- Works with infrastructure teams to execute the vulnerability management program and application owners to validate secure coding best-practices.
- Will operate in a close team of computer digital forensic, fraud, and other IT investigative experts.
- Document and track all incidents to meet audit, compliance, and legal requirements.
- Conduct root cause analysis to identify gaps and recommendations ultimately remediating risks to the firm.
- Periodically reports progress to management, and assesses and measures results related to Information Security activities.
- Bachelor s degree in Information Systems Risk Management, Computer Science, or related field, equivalent experience.
- 7-10 Years of experience with a thorough understanding of information security principles and practices.
- 3-5 years of experience in a Cyber Security or Risk Advisory role for regulated environments.
- Proven ability to infuse innovation and creativity into tactical activity with a focus on exceptional customer service.
- Be inspirational, enthusiastic and a promoter of information security.
- Must be reliable and adaptable.
- Excellent written and verbal communication and organizational skills.
- Outstanding work ethic.
- Strong team player that collaborates well with others to solve problems and actively incorporate input from various sources.
- Ability to think strategically, work with a sense of urgency and pay attention to detail.
- Ability to present complex solutions and methods to a general community.
- Independent thinking, willingness to "step outside the box" and take reasonable, calculated risks.
Skills:
Negotiation
Job type:
Full-time
Salary:
negotiable
- Bachelor degree or higher in Computer Science or related filed.
- There are 5-8 years, Experience in Network skills.
- Able to do network design, evaluation, POC, implementation.
- Self-Motivation and Hard Working.
- Able to work some time on night and weekend by job duties.
- Able to troubleshooting related to network problem & connecting equipment.
- Willing to self-study for network knowledge and learn new knowledge from team.
- Good communication,interpersonal, problem-solving, presentation, and negotiation skill.
Experience:
7 years required
Skills:
System Security, Windows Server, Linux
Job type:
Full-time
Salary:
฿60,000 - ฿90,000, negotiable
- Identify and evaluate areas for improvement in detection, prevention, and cyber incident response.
- Work closely with stakeholders to develop and follow up on remediation plans.
- Provide expert consultation on mitigating strategies and actionable remediation plans to asset owners.
- Collaborate with various teams to create, implement, and monitor effective remediation strategies.
- Apply knowledge of IT infrastructure, with experience as a system administrator or system engineer, to enhance cybersecurity measures.
- Utilize an understanding of offensive and defensive cybersecurity strategies (e.g., red and blue teams).
- Perform penetration testing or demonstrate a strong understanding of penetration testing methodologies to assess the security of IT systems.
- Use computer forensic tools to examine and analyze electronic media in suspected hacking cases.
- Conduct tasks related to malware analysis and reverse engineering to identify and mitigate threats.
- Define a course of action if a security problem exists and explain in detailed technical reports what occurred when an incident happens, including the reasons it occurred, and the response taken.
- Document incidents thoroughly, providing detailed technical reports that include the cause of the incident, and the response measures implemented.
- Build relationships with other entities responsible for conducting cyber threat analyses, ensuring effective collaboration and information sharing.
- Bachelor s degree / master s degree or higher in Computer Engineering, Information Technology, Computer science or related field.
- Proficiency with SIEM, UBA, and SOAR tools.
- Experience with system monitoring tools.
- Coding ability in C, C++, C#, Java, ASM, PERL, PHP, and PowerShell.
- Knowledge of backup and archiving techniques.
- Use of enterprise system monitoring tools.
- Understanding of cloud computing.
- Proficiency in UNIX.
- Knowledge of network communication (IP/TCP).
- Familiarity with computer hardware systems.
- Experience with web-based application security.
- Strong knowledge of Windows and Linux Operating Systems.
- Experience in identifying and evaluating cybersecurity risks and providing actionable insights.
- Previous experience as a penetration tester (pentester) is highly beneficial.
- Experience as a system administrator/system engineer is advantageous.
- Familiarity with computer forensic tools and techniques.
- Experience in malware analysis and reverse engineering.
- Ability to work well under pressure while handling multiple tasks.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Experience:
3 years required
Skills:
System Security, Windows Server
Job type:
Full-time
Salary:
฿60,000 - ฿80,000, negotiable
- Provide input and security consultation in a project-based environment as well as assisting operational of IT Security components with functional security requirements.
- Evaluate new projects and applications as they relate to security architecture and design; audit existing deployments and analyse gaps against security practices and standards.
- Conduct application vulnerability assessment, secure code review, and security penetration testing for new projects, enhancement projects, and periodic assurance to com ...
- Implement and operate DevSecOps on projects/applications that use DevOps process.
- Track, enforce, and consult to resolution the closure of security risks including review plans and monitor progress or remedial actions according to security requirements, security design, application vulnerability, and penetration testing issues.
- Periodically review security requirements to align with Bank s policies and regulations.
- Support periodic security audits.
- Manage third parties involved in IT Security Advisory and Assurance.
- Bachelor's or Master s Degree in Computer Science, Engineering, Information Systems or equivalent.
- Minimum 3 years in IT Security Advisory, Security Assurance, Threat Hunting plus experience working in or closely with IT Application, Enterprise Architect, and IT Risk management.
- Knowledge of Security Framework and Concepts, Compliance, Risk and Regulations, PCI DSS, OWASP, COBIT.
- Experience in performing comprehensive and authoritative technical analysis of the security readiness and compliance of applications.
- The ability to oversee pentesting to find vulnerabilities in all elements of a security system, understand security vulnerabilities, secure code review and remediation.
- Data and information management, including classification, retention and destruction. It also means keeping corporate and personal data both private and secure while needed, and destroyed when it is no longer needed.
- Knowledge of all applicable laws and compliance frameworks to enforce compliance.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Skills:
Research, Automation
Job type:
Full-time
Salary:
negotiable
- Lead the Cyber Security Incident Response (CSIR) team in day-to-day operations, managing complex incidents, and communicating progress to senior management.
- Ensure clear incident documentation and oversee the implementation and follow-up of realistic remediation plans.
- Detect and independently respond to security incidents across the organization.
- Assume the role of an Incident Manager during major security events.
- Collaborate with management to execute and iterate on the incident response process.
- Develop the threat-response matrix, incident-response playbook, and processes. Design and implement metrics for incident response, continually improving efficiency and effectiveness.
- Stay informed of emerging threats, security technologies, and relevant research for continuous improvement.
- Identify and mitigate complex security threats before exploitation.
- Implement and monitor security measures for infrastructure protection.
- Utilize log analysis platforms for security analytics and threat detection.
- Perform root cause analysis (RCA) and incident reviews.
- Mentor other members of the Security Incident Response Team.
- Help the team grow their skills and experience.
- Provide security recommendations to security architecture, issues, and features.
- Create a supportive environment for team members.
- Build strong partnerships with the other departments as a supporter of the cyber security incident response team. (CSIRT).
- Train team members to prioritize efforts and ensure alignment with company direction.
- Be a role model for positive thinking, and conflict resolution.
- Draft and successfully deliver on quarterly OKRs (Objectives and Key Results).
- Bachelor's degree or higher in Computer Engineering, Computer Science, IT, or related fields.
- A minimum of 5 years of working experience in Security Operations (SecOps), incident response, threat analysis, incident management, or relevant investigations during medium and large-scale security events.
- Robust understanding of security issues, mitigations, and a solid grasp of the current global threat landscape.
- Experience in security solutions, secure network design, firewalls, authentication, authorization systems, log analysis platforms, security incident response, monitoring, and intrusion detection.
- Profound knowledge of attacks, mitigation methods, and threat modeling.
- Experience in digital forensics, SOAR automation, and cloud providers like GCP, AWS, and Azure is advantageous.
- Strong written and verbal communication skills are required, including conducting presentations and creating security reports. Experience with executive-level communications is a plus.
- Substantial engineering mindset.
- Capability to build working relationships with key stakeholders.
- Capability to make concrete progress in the face of ambiguity and imperfect knowledge.
- Hold the certificate of CompTIA Security +, CompTIA CySA+, and others would be an added advantage.
Experience:
No experience required
Skills:
Linux, CompTIA Security+, Network Administration, English
Job type:
Full-time
Salary:
negotiable
- Oversee power, cooling, and cabling; install, configure, and maintain servers, storage, and network hardware.
- Ensure 24/7 system availability through proactive monitoring, performing routine health checks on servers, storage systems, and networks.
- Diagnose and resolve server, network, and application performance issues; escalate critical incidents and ensure swift resolution.
- Implement security protocols (firewalls, access controls) and ensure compliance with industry standards and internal policies.
- Manage data backup processes and conduct disaster recovery tests to ensure business continuity.
- Execute hardware and software upgrades for servers, networks, and storage systems, and maintain thorough documentation of configurations and processes.
- Bachelor s degree in IT, Computer Science, or related field.
- Experience in data center operations, Linux, and Microsoft system administration.
- Familiarity with ServiceNow and network administration.
- Certifications like CCNA, CompTIA Network+, or relevant Microsoft certifications (e.g., MCSA) are preferred.
- Flexible to relocation.
- Good command in English (Minimum 750 TOEIC score).
- Goal-Oriented, Unity, Learning, Flexible.
Experience:
1 year required
Skills:
Risk Management, Compliance
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
Experience:
4 years required
Skills:
Compliance, English
Job type:
Full-time
Salary:
negotiable
- Establish and maintain IT security standards and guidelines in compliance with the security regulations from regulators, and the security best practices, that governs new technology adoption.
- Advise business units and technology group on how to comply with IT security policy, standards, guidelines and best practices.
- Keep abreast of the knowledge in cybersecurity, new digital technology.
- Support on Cyber-drill program management and BCP coordinator across different Technology security units.
- Provide security awareness to the employee and service providers.
- Manage security supervision programs to track on non-compliance items to security policies, standards and guidelines.
- Inspecting and assessing the security of IT third parties that will access the organization s data or systems.
- Ensuring compliance with security requirements for IT third parties.
- Analyzing security risks and establishing preventive measures in case of incidents involving IT third parties.
- Qualification Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 4 years of experience in Information Security or a related field.
- Knowledge in new Banking Technology and associated security control is a plus.
- Relevant security certification is a plus, e.g. CISSP, CISM.
- Strong security advisory, analytical, and problem-solving skill.
- Good command in English.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
3 years required
Skills:
Compliance, Project Management, Business Development
Job type:
Full-time
Salary:
negotiable
- Design, Implement, and Optimize Secure Landing Zones: Lead the creation and enhancement of secure landing zones across multiple cloud service providers (CSPs) such as AWS, Azure, and Google Cloud for clients in Southeast Asia.
- DevSecOps Pipelines: Architect and implement DevSecOps pipelines, integrating security controls into CI/CD processes to automate security and compliance testing.
- Infrastructure as Code (IaC): Design and deploy infrastructure as code using tools like Terraform, AWS CloudFormation, and Azure Resource Manager (ARM) templates to aut ...
- High Availability Architectures: Implement multi-region and high availability architectures to meet performance, scalability, and disaster recovery requirements.
- Security Configurations: Configure Web Application Firewalls (WAFs), DDoS protection (e.g., AWS Shield, Azure DDoS Protection), and network firewalls (e.g., AWS Network Firewall, Azure Firewall).
- Access Control: Implement role-based access control (RBAC), least privilege principles, and multi-factor authentication (MFA) across cloud environments.
- Cloud-Native Security Expertise: Provide subject matter expertise in cloud-native security technologies, including identity and access management (IAM), encryption, security monitoring, and vulnerability management.
- Project Management and Leadership: Ensure the successful delivery of cloud security solutions through strong project management and leadership.
- Business Development: Assist in business development efforts, including proposal creation and identifying opportunities to grow cloud security service offerings.
- Client Relationships: Build and nurture positive working relationships with clients, aiming to exceed their expectations.
- Engagement Profitability: Identify opportunities to improve engagement profitability.
- Mentorship: Mentor and develop junior staff, promoting knowledge sharing and skills development within the team.
- Your role as a leader At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We connect our purpose and shared values to identify issues as well as to make an impact that matters to our clients, people and the communities. Additionally, Assistant Managers across our Firm are expected toDevelop diverse, high-performing people and teams through new and meaningful development opportunities.
- Collaborate effectively to build productive relationships and networks.
- Understand and lead the execution of key objectives and priorities for internal as well as external stakeholders.
- Influence stakeholders, teams, and individuals positively - leading by example and providing equal opportunities for our people to grow, develop and succeed.
- Deliver superior value and high-quality results to stakeholders while driving high performance from people across Deloitte.
- Apply their understanding of disruptive trends and competitor activity to recommend changes, in line with leading practices.
- Enough about us, let's talk about you.3+ years of experience in cloud security implementations across multiple CSPs (AWS, Azure, GCP).
- Extensive hands-on experience in designing and implementing Security Landing Zones, cloud security architectures, and securing hybrid/multi-cloud environments.
- Relevant certifications such as AWS Certified Security - Specialty, Microsoft Certified: Azure Security Engineer, Google Cloud Professional Cloud Security Engineer, or CISSP, CCSP are highly desirable.
- Proven experience managing cloud security projects, including landing zone implementations and security automation.
- Expertise in cloud-native security controls, including IAM, key management, network security, and security monitoring tools (e.g., AWS Security Hub, Azure Security Center).
- Strong knowledge of compliance frameworks such as NIST,CSA CCM, and CIS Benchmarks and how to apply them to cloud security implementations.
- Ability to travel 25-50%, on average, based on the work you do and the clients and industries/sectors you serve.
- Bachelor s degree in Computer Science, Information Security, or a related field; Master s degree preferred.
- Limited immigration sponsorship may be available.
- Excellent problem-solving skills and proven ability to lead a team of engineers.
- Ability to optimally communicate and advocate key security requirements to senior stakeholders.
- Strong critical-thinking and problem-solving skills with clear communication.
- Due to volume of applications, we regret that only shortlisted candidates will be notified.
- Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. #LI-AA1 Requisition ID: 106369In Thailand, the services are provided by Deloitte Touche Tohmatsu Jaiyos Co., Ltd. and other related entities in Thailand ("Deloitte in Thailand"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website.
Skills:
Risk Management, Software Development, Kubernetes
Job type:
Full-time
Salary:
negotiable
- Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
- Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
- Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
- Develop and enforce policies for secure coding, data protection, and incident response.
- Implement robust authentication and authorization mechanisms.
- Conduct regular security assessments, including penetration testing and code reviews.
- Monitor, detect, and respond to security incidents using advanced tools and methodologies.
- Enhance infrastructure security using Kubernetes, Docker, and cloud platforms (GCP, AWS).
- Stay current on emerging threats, vulnerabilities, and security trends, and recommend actionable insights to improve defenses.
- Champion security awareness across the organization, including training sessions and knowledge-sharing activities.
- Ensure compliance with relevant security standards and regulations such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Basic QualificationsProven expertise in application security, cloud security, and infrastructure security.
- Proficiency in securing systems built with technologies such as Node.js, Golang, Elixir, Python, React, Svelte, or Flutter.
- Experience with tools like Docker, Kubernetes, and cloud services (GCP, AWS).
- Strong understanding of cryptographic principles and secure communication protocols.
- Familiarity with CI/CD pipelines and secure DevOps practices.
- Hands-on experience with security tools for vulnerability scanning, penetration testing, and threat detection.
- Deep understanding of database security, especially with PostgreSQL or other relational or non-relational databases.
- Strong analytical and problem-solving skills with a security-first mindset.
- Excellent communication skills and the ability to collaborate effectively in Agile teams.
- Self-motivation, adaptability, and a strong work ethic.
- Preferred Qualifications We re especially excited if you bring:Experience leading security initiatives or mentoring other engineers in security best practices.
- Expertise in compliance frameworks such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Advanced knowledge of security monitoring and incident response systems.
- Strong system design skills with a focus on secure architectures and long-term trade-offs.
- A proven track record of securing fast-paced, high-growth tech environments.
- A passion for securing user-centric products and contributing to their success.
- Perks & Benefits Flat Structure As we continue to grow fast, we strive to retain our culture where everyone is heard, contributes, and grows with the company..
- Work-life Harmony We believe that quality time outside of work is important to sustaining a healthy and happy lifestyle.
- Remote Work Hybrid-mode activated! It comes with the package: flexibility, focus and productivity!.
- Urban Office One breath from Phrom Phong BTS. No sweat whatsoever! The office should also feel like a second home so we dedicated a lot of care and resources into building the best environment for you to wake up to every morning.
- Fun Workshop The best relationships are built over new experiences, that s why we have workshops filled with a range of activities for you to look forward to and enjoy.
- Game Tournament It s getting fun and competitive! Challenge doesn t only have to come from work. Own the championship and show the peeps how great of a gamer (and player) you are.
- Group Insurance Health comes first, we know, don t worry, we ve got you covered.
- Health & Wellness Only a healthy army wins the war. We invest to take care of you from physical, mental and happiness-level. Adopted health & wellness applications plus activities to make sure everyone here is on cloud nine
Experience:
3 years required
Skills:
Industry trends
Job type:
Full-time
Salary:
negotiable
- Risk Assessment & Analysis: Conduct comprehensive assessments of clients OT environments to identify vulnerabilities and recommend mitigation strategies.
- Security Strategy Development: Design and implement tailored OT security frameworks and policies in alignment with industry standards (NIST, ISA/IEC 62443, etc.).
- Stakeholder Engagement: Collaborate with cross-functional teams, including IT, operations, and management, to foster a culture of security awareness and resilience.
- Training & Mentorship: Provide training and mentorship to junior consultants and client teams on OT security best practices and emerging threats.
- Thought Leadership: Stay abreast of industry trends, emerging technologies, and regulatory changes; contribute to white papers, presentations, and client workshops.
- Your role as a leader
- At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We expect our people to embrace and live our purpose and shared values, challenging themselves everyday to identify issues that are most important to our clients, our people and the communities, and to make an impact that matters. In addition to living our purpose, Senior Consultants across our firm are expected to:Understand objectives for stakeholders, clients and Deloitte whilst aligning own performance to objectives and sets personal priorities.
- Develop themselves by actively seeking opportunities for growth, shares knowledge and experiences with others, and acts as a strong brand ambassador.
- Seek opportunities to challenge themselves, collaborate with others to deliver and takes accountability for results.
- Build relationships and communicates effectively in order to positively influence peers and stakeholders.
- Work effectively in diverse teams within a highly inclusive team culture where everyone is supported, respected and recognized for their contribution.
- Enough about us, let's talk about youBachelor s degree in Cybersecurity, Information Technology, Engineering, or a related field; a Master s degree is a plus.
- At least 3 years of experience in cybersecurity, with a focus on operational technology and industrial control systems (ICS).
- Relevant certifications such as CISSP, CISM or GICSP,.
- Deep understanding of relevant standards and guidelines.
- Proficiency in network security, vulnerability assessment tools, and incident response methodologies specific to OT environments.
- Strong knowledge of industrial control systems, SCADA systems, and PLCs.
- Experience with network segmentation, access control, and secure communication protocols.
- Exceptional verbal and written communication skills, with the ability to articulate complex concepts to technical and non-technical stakeholders alike.
- Strong analytical and problem-solving skills, with a proactive approach to identifying and addressing potential security issues.
- Due to volume of applications, we regret that only shortlisted candidates will be notified.
- Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. #LI-AA1 Requisition ID: 106367In Thailand, the services are provided by Deloitte Touche Tohmatsu Jaiyos Co., Ltd. and other related entities in Thailand ("Deloitte in Thailand"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website.
Experience:
2 years required
Skills:
Network Infrastructure, Security Design, Big Data, English
Job type:
Full-time
Salary:
negotiable
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Building a better working world.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Skills:
Sales
Job type:
Full-time
Salary:
negotiable
- Be the security leader and expert for your assigned territory. Leads and plans for accounts across territories, does business analysis to pursue high-potential sales opportunities and manages the End-to-End Security business across the territory.
- Develop and maintain a strong pipeline of sales opportunities, ensuring that sales targets are met or exceeded.
- Build, own and manage CISO and other key C-stakeholders' relationships in your accounts driving awareness and excitement for Microsoft security platform value and influ ...
- Understand customer cloud and security initiatives, compete landscape as well as gaps between current and desired security posture. Capture the opportunity of customers journey to balance the need for security and employee productivity with the right process and visibility.
- Demo and whiteboard the cloud security solutions and the relevant security architecture. Lead and orchestrate V-Team to drive an end-to-end value selling from discovery to demonstrating and proving business value.
- Engage security partners to help scale and accelerate the sales cycle while also ensuring a deployment plan is in place for accelerated deployment with partner added value services.
- Perform ROI and TCO analysis and leverage various commercial offers and programs to build a compelling business case accelerating negotiations and deal closure. Drive to exceed quarterly and yearly revenue targets and other sales goals. Manage sales hygiene via accurate forecasting and deal updates within sales CRM.
- Completes required training and obtains relevant product and role certifications aligned to the role and workload/industry.
- Technical Expertise: Leads end-to-end Security conversations, shares best practices and key competitor knowledge across solution areas, and evaluates opportunities to make recommendations on pursuit or withdrawal. Exhibits outstanding operational excellence - including monthly/quarterly forecasting, building healthy pipeline, CRM entry and hygiene, opportunity management and virtual team orchestration.
- Experience driving new sales and new customers using innovative approaches, leveraging joint partnership events, social selling (LinkedIn) and networking.
- Enterprise customer level experience with cloud, security technologies (Identity and Access Management, Threat protection, Data protection, Cloud Security), and industry standards recommended.
- Sales Excellence: Leads and plans for strategic accounts in the assigned territory, does business analysis to pursue high-potential customers and manages the End-to-End Security business across the assigned territory. Completes required training and obtains relevant product and role certifications aligned to the role and workload/industry.
- Sales and Technology Exceed sales goals in an assigned sales territory.
- Demonstrated sales and partner management experience.
- Competes to win new market share.
- Significant experience delivering persuasive presentations to business decision makers..
- Required/minimum qualifications Bachelor's Degree in Computer Science, Information Technology, Business Administration, or related field AND 6+ years technology-related sales or account management experience OR.
- 7+ years technology-related sales or account management experience.
- Security Sales Experience: experience selling security solutions to CISO, CDO, CTO and other key C-level stakeholders.
- Understanding of cloud security technologies: Threat protection (Endpoint security, E-mail security, Incident Response, etc.), Kill Chain, CNAPP, SIEM., Multi-Cloud Security, Identity and Access management.
- Additional or preferred qualifications 6+ years solution or services sales experience. Master's Degree in Business Administration (i.e., MBA), Information Technology, or related field AND 5+ years technology-related sales or account management experience OR.
- Bachelor's Degree in Information Technology, or related field AND 8+ years technology-related sales or account management experience OR.
- 9+ years technology-related sales or account management experience.
- MCAPSRegionsASEAN Microsoft is an equal opportunity employer. Consistent with applicable law, all qualified applicants will receive consideration for employment without regard to age, ancestry, citizenship, color, family or medical care leave, gender identity or expression, genetic information, immigration status, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran or military status, race, ethnicity, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable local laws, regulations and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application process, read more about requesting accommodations.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Risk Management, Project Management, English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Experience:
7 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Encourage everyone to have a voice and invite opinion from all, including quieter members of the team.
- Deal effectively with ambiguous and unstructured problems and situations.
- Initiate open and candid coaching conversations at all levels.
- Move easily between big picture thinking and managing relevant detail.
- Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required.
- Contribute technical knowledge in area of specialism.
- Contribute to an environment where people and technology thrive together to accomplish more than they could apart.
- Navigate the complexities of cross-border and/or diverse teams and engagements.
- Initiate and lead open conversations with teams, clients and stakeholders to build trust.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Security Operation Center (SOC).
- Minimum years experience required.
- 7 years of experiences and above.
- Additional application instructions.
- Good communication in english.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- December 31, 2024
Skills:
Research, Automation, English
Job type:
Full-time
Salary:
negotiable
- Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
- Support on implementing and running DevSecOP operation.
- Keep abreast of the knowledge in cybersecurity, new digital technology and CI/CD area.
- Collaborate with business and technology team to carry-out the assigned Vulnerability Management / DevSecOP tasks.
- Senior person will act as a security advisor to provide a security recommendation on the new or the change on Application solution and Infrastructure design.
- Perform Research and Development on Offensive Security and security automation.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- Experience in Vulnerability Assessment and Penetration testing (Fresh graduate is also welcome).
- Have knowledge in Threat intelligence, red teaming and Secure coding review and CI/CD DevSecOP implementation and certified relevant security certification is a plus.
- Strong security analytical and problem-solving skill.
- Good command in English.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Job type:
Full-time
Salary:
negotiable
Greenline Synergy provides the information security governance to the BDMS hospitals which is a framework of policies, practices, and strategies that align organizational resources toward protecting information through cybersecurity measures.
Experience:
1 year required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Penetration Tester (Manual & Automate).
- Minimum years experience required.
- Over 1 years of Experience in related fields.
- Additional application instructions.
- Good Communication in English.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
- 1
- 2