- No elements found. Consider changing the search query.
Skills:
Negotiation
Job type:
Full-time
Salary:
negotiable
- Bachelor degree or higher in Computer Science or related filed.
- There are 5-8 years, Experience in Network skills.
- Able to do network design, evaluation, POC, implementation.
- Self-Motivation and Hard Working.
- Able to work some time on night and weekend by job duties.
- Able to troubleshooting related to network problem & connecting equipment.
- Willing to self-study for network knowledge and learn new knowledge from team.
- Good communication,interpersonal, problem-solving, presentation, and negotiation skill.
Skills:
Compliance, Legal, Risk Management
Job type:
Full-time
Salary:
negotiable
- Set and implement user access controls and identity and access management systems.
- Perform regular audits to ensure security practices are compliant.
- Deploy endpoint detection and prevention tools to thwart malicious hacks.
- Work with IT operations to set up a shared disaster recovery/business continuity plan.
- Contribute towards the execution of policies, standards and procedures specific set by enterprise standards and account specific standards as they apply to IT security governance, IT risk, and IT compliance requirements.
- Perform IT security risk assessment activities, including third party evaluation and management, and related analysis, including ongoing compliance monitoring in coordination with governance lead and external team members.
- Contribute towards the execution of IT security compliance reviews of master service agreements and advise business team regarding gaps and corresponding mitigation requirements.
- Contribute to the design and implementation of technical IT security safeguard architecture.
- Works with infrastructure teams to execute the vulnerability management program and application owners to validate secure coding best-practices.
- Will operate in a close team of computer digital forensic, fraud, and other IT investigative experts.
- Document and track all incidents to meet audit, compliance, and legal requirements.
- Conduct root cause analysis to identify gaps and recommendations ultimately remediating risks to the firm.
- Periodically reports progress to management, and assesses and measures results related to Information Security activities.
- Bachelor s degree in Information Systems Risk Management, Computer Science, or related field, equivalent experience.
- 7-10 Years of experience with a thorough understanding of information security principles and practices.
- 3-5 years of experience in a Cyber Security or Risk Advisory role for regulated environments.
- Proven ability to infuse innovation and creativity into tactical activity with a focus on exceptional customer service.
- Be inspirational, enthusiastic and a promoter of information security.
- Must be reliable and adaptable.
- Excellent written and verbal communication and organizational skills.
- Outstanding work ethic.
- Strong team player that collaborates well with others to solve problems and actively incorporate input from various sources.
- Ability to think strategically, work with a sense of urgency and pay attention to detail.
- Ability to present complex solutions and methods to a general community.
- Independent thinking, willingness to "step outside the box" and take reasonable, calculated risks.
Experience:
7 years required
Skills:
System Security, Windows Server, Linux
Job type:
Full-time
Salary:
฿60,000 - ฿90,000, negotiable
- Identify and evaluate areas for improvement in detection, prevention, and cyber incident response.
- Work closely with stakeholders to develop and follow up on remediation plans.
- Provide expert consultation on mitigating strategies and actionable remediation plans to asset owners.
- Collaborate with various teams to create, implement, and monitor effective remediation strategies.
- Apply knowledge of IT infrastructure, with experience as a system administrator or system engineer, to enhance cybersecurity measures.
- Utilize an understanding of offensive and defensive cybersecurity strategies (e.g., red and blue teams).
- Perform penetration testing or demonstrate a strong understanding of penetration testing methodologies to assess the security of IT systems.
- Use computer forensic tools to examine and analyze electronic media in suspected hacking cases.
- Conduct tasks related to malware analysis and reverse engineering to identify and mitigate threats.
- Define a course of action if a security problem exists and explain in detailed technical reports what occurred when an incident happens, including the reasons it occurred, and the response taken.
- Document incidents thoroughly, providing detailed technical reports that include the cause of the incident, and the response measures implemented.
- Build relationships with other entities responsible for conducting cyber threat analyses, ensuring effective collaboration and information sharing.
- Bachelor s degree / master s degree or higher in Computer Engineering, Information Technology, Computer science or related field.
- Proficiency with SIEM, UBA, and SOAR tools.
- Experience with system monitoring tools.
- Coding ability in C, C++, C#, Java, ASM, PERL, PHP, and PowerShell.
- Knowledge of backup and archiving techniques.
- Use of enterprise system monitoring tools.
- Understanding of cloud computing.
- Proficiency in UNIX.
- Knowledge of network communication (IP/TCP).
- Familiarity with computer hardware systems.
- Experience with web-based application security.
- Strong knowledge of Windows and Linux Operating Systems.
- Experience in identifying and evaluating cybersecurity risks and providing actionable insights.
- Previous experience as a penetration tester (pentester) is highly beneficial.
- Experience as a system administrator/system engineer is advantageous.
- Familiarity with computer forensic tools and techniques.
- Experience in malware analysis and reverse engineering.
- Ability to work well under pressure while handling multiple tasks.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Experience:
3 years required
Skills:
System Security, Windows Server
Job type:
Full-time
Salary:
฿60,000 - ฿80,000, negotiable
- Provide input and security consultation in a project-based environment as well as assisting operational of IT Security components with functional security requirements.
- Evaluate new projects and applications as they relate to security architecture and design; audit existing deployments and analyse gaps against security practices and standards.
- Conduct application vulnerability assessment, secure code review, and security penetration testing for new projects, enhancement projects, and periodic assurance to com ...
- Implement and operate DevSecOps on projects/applications that use DevOps process.
- Track, enforce, and consult to resolution the closure of security risks including review plans and monitor progress or remedial actions according to security requirements, security design, application vulnerability, and penetration testing issues.
- Periodically review security requirements to align with Bank s policies and regulations.
- Support periodic security audits.
- Manage third parties involved in IT Security Advisory and Assurance.
- Bachelor's or Master s Degree in Computer Science, Engineering, Information Systems or equivalent.
- Minimum 3 years in IT Security Advisory, Security Assurance, Threat Hunting plus experience working in or closely with IT Application, Enterprise Architect, and IT Risk management.
- Knowledge of Security Framework and Concepts, Compliance, Risk and Regulations, PCI DSS, OWASP, COBIT.
- Experience in performing comprehensive and authoritative technical analysis of the security readiness and compliance of applications.
- The ability to oversee pentesting to find vulnerabilities in all elements of a security system, understand security vulnerabilities, secure code review and remediation.
- Data and information management, including classification, retention and destruction. It also means keeping corporate and personal data both private and secure while needed, and destroyed when it is no longer needed.
- Knowledge of all applicable laws and compliance frameworks to enforce compliance.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Skills:
Research, Automation
Job type:
Full-time
Salary:
negotiable
- Lead the Cyber Security Incident Response (CSIR) team in day-to-day operations, managing complex incidents, and communicating progress to senior management.
- Ensure clear incident documentation and oversee the implementation and follow-up of realistic remediation plans.
- Detect and independently respond to security incidents across the organization.
- Assume the role of an Incident Manager during major security events.
- Collaborate with management to execute and iterate on the incident response process.
- Develop the threat-response matrix, incident-response playbook, and processes. Design and implement metrics for incident response, continually improving efficiency and effectiveness.
- Stay informed of emerging threats, security technologies, and relevant research for continuous improvement.
- Identify and mitigate complex security threats before exploitation.
- Implement and monitor security measures for infrastructure protection.
- Utilize log analysis platforms for security analytics and threat detection.
- Perform root cause analysis (RCA) and incident reviews.
- Mentor other members of the Security Incident Response Team.
- Help the team grow their skills and experience.
- Provide security recommendations to security architecture, issues, and features.
- Create a supportive environment for team members.
- Build strong partnerships with the other departments as a supporter of the cyber security incident response team. (CSIRT).
- Train team members to prioritize efforts and ensure alignment with company direction.
- Be a role model for positive thinking, and conflict resolution.
- Draft and successfully deliver on quarterly OKRs (Objectives and Key Results).
- Bachelor's degree or higher in Computer Engineering, Computer Science, IT, or related fields.
- A minimum of 5 years of working experience in Security Operations (SecOps), incident response, threat analysis, incident management, or relevant investigations during medium and large-scale security events.
- Robust understanding of security issues, mitigations, and a solid grasp of the current global threat landscape.
- Experience in security solutions, secure network design, firewalls, authentication, authorization systems, log analysis platforms, security incident response, monitoring, and intrusion detection.
- Profound knowledge of attacks, mitigation methods, and threat modeling.
- Experience in digital forensics, SOAR automation, and cloud providers like GCP, AWS, and Azure is advantageous.
- Strong written and verbal communication skills are required, including conducting presentations and creating security reports. Experience with executive-level communications is a plus.
- Substantial engineering mindset.
- Capability to build working relationships with key stakeholders.
- Capability to make concrete progress in the face of ambiguity and imperfect knowledge.
- Hold the certificate of CompTIA Security +, CompTIA CySA+, and others would be an added advantage.
Experience:
5 years required
Skills:
Marketing Strategy, Javascript, Wordpress, English
Job type:
Full-time
Salary:
negotiable
- Develop and oversee the execution of web development and design projects.
- Lead a team of developers and designers, providing guidance and training.
- Ensure the delivery of high-quality, user-friendly, and responsive websites and applications.
- Conduct code reviews and ensure best practices in coding and design are followed.
- Collaborate with clients to understand their requirements and provide innovative solutions.
- Stay up-to-date with the latest trends, technologies, and best practices in web development and design.
- Manage project timelines, budgets, and resources effectively.
- Prepare and present comprehensive project reports to senior management.
- Ensure all development and design practices comply with industry standards and guidelines.
- Planning the Marketing Strategy: Develop and plan web development and design strategies for clients, ensuring alignment with their objectives and industry best practices.
- Analysing Data: Analyse web performance metrics, identify insights, and recommend next steps to update strategies, stay competitive, and achieve better results.
- Quality Control and Oversight: Conduct quality control to identify and rectify mistakes, improving project effectiveness and client satisfaction.
- AI Usage: Leverage AI tools and technologies to enhance development and design processes, automate repetitive tasks, and gain deeper insights into data trends and performance metrics.
- Bachelor's Degree in Computer Science, Web Development, or similar.
- Minimum of 5 years of experience in web development and design, with a proven track record of successful projects.
- Strong understanding of web development tools and technologies (e.g., HTML, CSS, JavaScript, WordPress, PHP, Shopify, Python).
- Excellent command of the English language.
- Ability to multitask and stay organised.
- Strong analytical and logical skills.
- Leadership qualities with the ability to inspire and motivate a team.
- A passion for web development and staying updated with industry changes.
- Familiarity with AI tools and their applications in web development and design.
- Salary of 50,000-80,000 baht per month (dependent on experience and qualifications).
- Annual and KPI Bonuses.
- Convenient location near Rama IX MRT.
- 5-day work week - no weekend work required.
- Staff Social Club and regular events and outings.
- Generous annual leave packages.
- Continual training and education initiatives.
- A fun, relaxed work environment with great team culture.
- So if you would like to join a young, dynamic business looking to rapidly grow and be rewarded with a genuine career path opportunity, please reply with a cover letter outlining your recent job experiences and why you think you would be suitable for this role.
- Pay: ฿54,000.00 - ฿80,000.00 per month.
- กรุงเทพมหานคร: Reliably commute or planning to relocate before starting work (Required).
- Web Development: 5 years (Required).
- English Fluency (Required).
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Risk Management, Project Management, English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Experience:
8 years required
Skills:
Business Development, Assurance, Software Development, English
Job type:
Full-time
Salary:
negotiable
- Design and work on cybersecurity framework based on business objectives and strategic imperatives of the client organisation including goals, vision, mission, and operational plans.
- Data pattern and trend identification via metric analysis, driving operational excellence and improvement.
- Designing and implementing data protection and privacy programs for our clients and supporting their business.
- Evaluating the data protection and privacy practices of our clients and Conducting Privacy Impact Assessments.
- Monitor processes and drive improvements in efficiency and quality of cybersecurity programs.
- Assist in development of workflows for transitioning strategic plans into implementation plans and operational readiness.
- Facilitate strategic planning initiatives, documentation, technical roadmaps and security tool rationalisation.
- Assist in designing the security organisation structure including cyber defense.
- Develop security policies, procedures, standards based on the security strategy and roadmap.
- Review of cybersecurity policies and processes to identify gaps in design of control based on comprehensive assessment framework.
- Maintain continuous communication with key stakeholders in support of the security strategy, and plan and solicit feedbacks, to uplift the programs and capabilities.
- Conduct security process implementation reviews to assess security effectiveness and reporting.
- Conduct Current State Assessment of cybersecurity practices against the defined controls and provide recommendations for to-be state.
- Run Cyber Security Diagnostic Assessments and develop programs for cybersecurity skill development and enhancement.
- Provide certification advisory across Information Security Management System (ISMS).
- Implement security controls for realisation of the certification requirements and provide technology roadmap based on the security strategy.
- Assisting in delivering privacy projects to acting as a subject matter expert on them or to leading a team towards excellent client experience.
- Supporting and guiding our clients in adhering to the complex web of relevant national and international regulations (e.g. EU General Data Protection Regulation).
- Deploying processes and tools to help detect and prevent privacy breaches.
- Ensuring a harmonised approach towards data protection and privacy by bringing together our client s stakeholders (e.g. legal, compliance, risk, HR, security, business functions).
- Assisting clients in privacy related incident response activities.
- Supporting the client s team by acting as an interim team member (e.g. data protection officer, security officer, security manager, security analyst).
- Proactively identifying and pursuing opportunities for further business and team growth.
- Preferred skills.
- Bachelor s degree in Computer Science, Information Systems, Information Technology, Engineering, or equivalent education.
- Minimum 4 - 5 years of prior relevant working experience.
- Experience with vulnerability scanning solutions and cybersecurity systems.
- Possession of relevant qualifications such as CIPM, CIPT, CIPP/E, CISM, CISSP, and/or HCISSP, as well as involvement in industry related organizations (e.g. IAPP, ISACA, (ISC)² ) or relevant certifications.
- Strong interpersonal and stakeholder management skills with ability to coordinate between technical and business teams.
- Excellent verbal, written communication and interpersonal skills with stakeholders at all levels.
- Knowledge and experience with relevant data protection and privacy laws and regulations (e.g. PDPA, EU GDPR, and Privacy Shield) and industry standards and frameworks, such as GAPP and BCR.
- Ability to efficiently understand client organisations and their business model and to tailor relevant processes to privacy requirements.
- An analytical mindset, strive for quality and are able to work in a result-oriented environment.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Bachelor Degree Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- December 31, 2024
Experience:
7 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Encourage everyone to have a voice and invite opinion from all, including quieter members of the team.
- Deal effectively with ambiguous and unstructured problems and situations.
- Initiate open and candid coaching conversations at all levels.
- Move easily between big picture thinking and managing relevant detail.
- Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required.
- Contribute technical knowledge in area of specialism.
- Contribute to an environment where people and technology thrive together to accomplish more than they could apart.
- Navigate the complexities of cross-border and/or diverse teams and engagements.
- Initiate and lead open conversations with teams, clients and stakeholders to build trust.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Security Operation Center (SOC).
- Minimum years experience required.
- 7 years of experiences and above.
- Additional application instructions.
- Good communication in english.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- December 31, 2024
Skills:
Research, Automation, English
Job type:
Full-time
Salary:
negotiable
- Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
- Support on implementing and running DevSecOP operation.
- Keep abreast of the knowledge in cybersecurity, new digital technology and CI/CD area.
- Collaborate with business and technology team to carry-out the assigned Vulnerability Management / DevSecOP tasks.
- Senior person will act as a security advisor to provide a security recommendation on the new or the change on Application solution and Infrastructure design.
- Perform Research and Development on Offensive Security and security automation.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- Experience in Vulnerability Assessment and Penetration testing (Fresh graduate is also welcome).
- Have knowledge in Threat intelligence, red teaming and Secure coding review and CI/CD DevSecOP implementation and certified relevant security certification is a plus.
- Strong security analytical and problem-solving skill.
- Good command in English.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
1 year required
Skills:
Compliance, Python, PowerShell, Japanese
Job type:
Full-time
Salary:
negotiable
- Monitor, analyze and triage security alerts and events.
- Assess impact, risk of potential incidents, and take appropriate action according to defined procedures.
- Utilize various security tools and technologies to detect and investigate cyber threats.
- Collaborate with other teams, including incident responders, to ensure proper escalation and resolution of cases.
- Document and report security incidents, including detailed analysis and recommendations for improvement.
- Contribute to the development and enhancement of security monitoring and detection capabilities.
- Stay up to date with the latest security trends, vulnerabilities, and best practices.
- Bachelor s degree in Computer Science, Information Security, or a related field.
- Solid understanding of network protocols, security architectures, and common security threats.
- Knowledge of security incident response processes and methodologies.
- Excellent analytical and problem-solving skills.
- Strong communication skills, both written and verbal.
- 1-2 years of experience in a security operations center (SOC) or a similar role.
- Experience with security information and event management (SIEM) platforms and threat intelligence tools.
- Industry certifications, e.g., CompTIA Security or Certified Ethical Hacker (CEH).
- Familiarity with regulatory frameworks and compliance requirements.
- Scripting skills in languages such as Python or PowerShell.
- Knowledge of cloud security concepts and technologies.
- Experience with log analysis and correlation.
- Chinese, Japanese, or other foreign language skills.
- Current Employees apply HERE.
- Current Contingent Workers apply HERE.
- Search Firm Representatives Please Read Carefully
- Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
- Regular
- Hybrid
- 01/31/2025A job posting is effective until 11:59:59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date.
- Requisition ID:R328901.
Experience:
3 years required
Skills:
Industry trends
Job type:
Full-time
Salary:
negotiable
- Risk Assessment & Analysis: Conduct comprehensive assessments of clients OT environments to identify vulnerabilities and recommend mitigation strategies.
- Security Strategy Development: Design and implement tailored OT security frameworks and policies in alignment with industry standards (NIST, ISA/IEC 62443, etc.).
- Stakeholder Engagement: Collaborate with cross-functional teams, including IT, operations, and management, to foster a culture of security awareness and resilience.
- Training & Mentorship: Provide training and mentorship to junior consultants and client teams on OT security best practices and emerging threats.
- Thought Leadership: Stay abreast of industry trends, emerging technologies, and regulatory changes; contribute to white papers, presentations, and client workshops.
- Your role as a leader
- At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We expect our people to embrace and live our purpose and shared values, challenging themselves everyday to identify issues that are most important to our clients, our people and the communities, and to make an impact that matters. In addition to living our purpose, Senior Consultants across our firm are expected to:Understand objectives for stakeholders, clients and Deloitte whilst aligning own performance to objectives and sets personal priorities.
- Develop themselves by actively seeking opportunities for growth, shares knowledge and experiences with others, and acts as a strong brand ambassador.
- Seek opportunities to challenge themselves, collaborate with others to deliver and takes accountability for results.
- Build relationships and communicates effectively in order to positively influence peers and stakeholders.
- Work effectively in diverse teams within a highly inclusive team culture where everyone is supported, respected and recognized for their contribution.
- Enough about us, let's talk about youBachelor s degree in Cybersecurity, Information Technology, Engineering, or a related field; a Master s degree is a plus.
- At least 3 years of experience in cybersecurity, with a focus on operational technology and industrial control systems (ICS).
- Relevant certifications such as CISSP, CISM or GICSP,.
- Deep understanding of relevant standards and guidelines.
- Proficiency in network security, vulnerability assessment tools, and incident response methodologies specific to OT environments.
- Strong knowledge of industrial control systems, SCADA systems, and PLCs.
- Experience with network segmentation, access control, and secure communication protocols.
- Exceptional verbal and written communication skills, with the ability to articulate complex concepts to technical and non-technical stakeholders alike.
- Strong analytical and problem-solving skills, with a proactive approach to identifying and addressing potential security issues.
- Due to volume of applications, we regret that only shortlisted candidates will be notified.
- Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. #LI-AA1 Requisition ID: 106367In Thailand, the services are provided by Deloitte Touche Tohmatsu Jaiyos Co., Ltd. and other related entities in Thailand ("Deloitte in Thailand"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website.
Skills:
Research, System Administration, Android
Job type:
Full-time
Salary:
negotiable
- Implements IT security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Protects IT system by defining access privileges, control structures, and required resources.
- Process & analyze to gain insights on past IT areas on, current or potential attacks and threats that pose a risk to the organization.
- Primary point of contact with Internal Audit. Periodically review, update, implement and communicate changes to IT policies and procedures and General IT Controls. Facilitate internal and external audit processes by participating in scoping discussions and walk-throughs, delivering evidence that controls are operating as defined, remediating deficiencies, and acting on recommendations.
- Safeguards IT infrastructure and system as well as information system assets by identifying and solving potential and actual security problems.
- Research cyber security topics and promote Cyber security awareness throughout Thaioil.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Relevant experience, especially in IT working environment.
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g., Netflow, FPC), and other attack artifacts in support of incident investigations.
- Experience with vulnerability scanning solutions.
- Familiarity with Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Have knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform.
- Understanding of mobile technology and OS (i.e., Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
- OTHER REQUIREMENTS.
Experience:
3 years required
Skills:
Compliance, Legal, Risk Management
Job type:
Full-time
Salary:
negotiable
- Develop data security policy review, data security policy exceptions, and control risk mitigation processes.
- Define the security controls for access management lifecycle (i.e., requirement for creation, deletion, transfer and review).
- Operate:Advice on technology relating to Data Privacy and Protection (i.e., PDPA) related security controls implementation.
- Drive and support data security controls such as Data Loss Prevention (DLP), Data Masking, Data Encryption capabilities to protect sensitive data.
- Drive compliance (or collaborate with compliance team) to organization security policies, standards, metrics, and legal requirements.
- Communicate and enforce security policies, rules, and standards.
- Conduct impact assessment of data initiatives from a security point of view.
- Ensure the cryptographic keys and related components are safety and protection of confidential information.
- Resolve data security audit and risk findings.
- Review and develop security controls to current access controls policies and procedures.
- Provide requirements for create and manage roles, access rights (includes privileged access), authentication and identity within the environment.
- Conduct periodic review of user access.
- Review, approve and monitor the usage of privileged access.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Work experience in privacy, compliance, information security, auditing or a related field may also be an accepted alternative, according to Cybersecurity.
- Minimum 3 years of experience in and strong knowledge of privacy, data, operational risk management, information security, or related areas in IT.
- OTHER REQUIREMENTS.
Experience:
1 year required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Penetration Tester (Manual & Automate).
- Minimum years experience required.
- Over 1 years of Experience in related fields.
- Additional application instructions.
- Good Communication in English.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Experience:
2 years required
Skills:
Network Infrastructure, Security Design, Big Data, English
Job type:
Full-time
Salary:
negotiable
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Building a better working world.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Experience:
1 year required
Skills:
Risk Management, Compliance
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
Skills:
Project Management
Job type:
Full-time
Salary:
negotiable
- Responsible for the protection of Celestica assets and to respond to alarms, emergency situations and to assist employees with security issue as part of our mission to provide a safe work environment.
- Responsible for maintaining appropriate access to all areas of the facility for both employees and customers.
- Controlling daily security operations including incident investigation, property passes, loss prevention, and all administrative duties required at the site.
- Knowledge/Skills/Competencies.
- In-depth knowledge of facilities management and operations.
- Understanding of environmental, health and safety regulations (local and government).
- Good organization and project management skills.
- Ability to evaluate, diagnose and troubleshoot problems.
- Ability to gather and analyze data and determine root cause of problems.
- Ability to effectively communicate with a variety of internal and external customers.
- Typical Experience.
- Two to Four years relevant experience.
- Typical Education.
- Bachelor's degree in a related field, or an equivalent combination of education and experience.
- Educational requirements may vary by geography.
- Notes.
- This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
- Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
- At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.
- Celestica (NYSE, TSX: CLS) enables the world s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
- Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
- Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
- 1
- 2