- No elements found. Consider changing the search query.
Experience:
3 years required
Skills:
System Security, Windows Server
Job type:
Full-time
Salary:
฿60,000 - ฿80,000, negotiable
- Provide input and security consultation in a project-based environment as well as assisting operational of IT Security components with functional security requirements.
- Evaluate new projects and applications as they relate to security architecture and design; audit existing deployments and analyse gaps against security practices and standards.
- Conduct application vulnerability assessment, secure code review, and security penetration testing for new projects, enhancement projects, and periodic assurance to com ...
- Implement and operate DevSecOps on projects/applications that use DevOps process.
- Track, enforce, and consult to resolution the closure of security risks including review plans and monitor progress or remedial actions according to security requirements, security design, application vulnerability, and penetration testing issues.
- Periodically review security requirements to align with Bank s policies and regulations.
- Support periodic security audits.
- Manage third parties involved in IT Security Advisory and Assurance.
- Bachelor's or Master s Degree in Computer Science, Engineering, Information Systems or equivalent.
- Minimum 3 years in IT Security Advisory, Security Assurance, Threat Hunting plus experience working in or closely with IT Application, Enterprise Architect, and IT Risk management.
- Knowledge of Security Framework and Concepts, Compliance, Risk and Regulations, PCI DSS, OWASP, COBIT.
- Experience in performing comprehensive and authoritative technical analysis of the security readiness and compliance of applications.
- The ability to oversee pentesting to find vulnerabilities in all elements of a security system, understand security vulnerabilities, secure code review and remediation.
- Data and information management, including classification, retention and destruction. It also means keeping corporate and personal data both private and secure while needed, and destroyed when it is no longer needed.
- Knowledge of all applicable laws and compliance frameworks to enforce compliance.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Experience:
7 years required
Skills:
System Security, Windows Server, Linux
Job type:
Full-time
Salary:
฿60,000 - ฿90,000, negotiable
- Identify and evaluate areas for improvement in detection, prevention, and cyber incident response.
- Work closely with stakeholders to develop and follow up on remediation plans.
- Provide expert consultation on mitigating strategies and actionable remediation plans to asset owners.
- Collaborate with various teams to create, implement, and monitor effective remediation strategies.
- Apply knowledge of IT infrastructure, with experience as a system administrator or system engineer, to enhance cybersecurity measures.
- Utilize an understanding of offensive and defensive cybersecurity strategies (e.g., red and blue teams).
- Perform penetration testing or demonstrate a strong understanding of penetration testing methodologies to assess the security of IT systems.
- Use computer forensic tools to examine and analyze electronic media in suspected hacking cases.
- Conduct tasks related to malware analysis and reverse engineering to identify and mitigate threats.
- Define a course of action if a security problem exists and explain in detailed technical reports what occurred when an incident happens, including the reasons it occurred, and the response taken.
- Document incidents thoroughly, providing detailed technical reports that include the cause of the incident, and the response measures implemented.
- Build relationships with other entities responsible for conducting cyber threat analyses, ensuring effective collaboration and information sharing.
- Bachelor s degree / master s degree or higher in Computer Engineering, Information Technology, Computer science or related field.
- Proficiency with SIEM, UBA, and SOAR tools.
- Experience with system monitoring tools.
- Coding ability in C, C++, C#, Java, ASM, PERL, PHP, and PowerShell.
- Knowledge of backup and archiving techniques.
- Use of enterprise system monitoring tools.
- Understanding of cloud computing.
- Proficiency in UNIX.
- Knowledge of network communication (IP/TCP).
- Familiarity with computer hardware systems.
- Experience with web-based application security.
- Strong knowledge of Windows and Linux Operating Systems.
- Experience in identifying and evaluating cybersecurity risks and providing actionable insights.
- Previous experience as a penetration tester (pentester) is highly beneficial.
- Experience as a system administrator/system engineer is advantageous.
- Familiarity with computer forensic tools and techniques.
- Experience in malware analysis and reverse engineering.
- Ability to work well under pressure while handling multiple tasks.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Skills:
Corporate Law, Risk Management, English
Job type:
Full-time
Salary:
negotiable
- Responsible for security management in Suksawas Sortation Center, ensuring the safety of company assets and personnel.
- Develop and implement comprehensive security policies and procedures in compliance with laws and regulations and Alibaba International's security standards.
- Monitor and assess potential security risks, establish preventive measures, and minimize the occurrence of security incidents.
- Coordinate and lead the security team, conducting regular training to build skills and competence of security manpower.
- Maintain a good relationship with local law enforcement agencies to handle potential security incidents and ensure compliance.
- Execute security protocol to manage and enforce the compliance of parties involved including staff, IC, subcon or etc.
- Managing facility and infra structure support in build up cctv coverage in place insuring it been manage function as intended.
- Bachelor's degree or above in Security Management, Law, or related fields.
- More than ten years of experience in security management, with a preference for experience in Thailand or similar regions.
- Familiarity with Thai security regulations and International's security management system with strong risk assessment capabilities.
- Qualified TAPA FSR (if applicable) would be advantage.
- Excellent leadership and team collaboration skills, capable of guiding and motivating team members effectively.
- Fluent in Thai and English, with strong communication and coordination abilities to work effectively with multiple departments.
Skills:
Network Infrastructure, Project Management, VMware, English
Job type:
Full-time
Salary:
negotiable
- Design/Implement Cyber Security project for Private Cloud and Global Cloud (CloudX, AWS and MS Azure).
- Solution integration and migration.
- Control suppliers in the assigned project.
- Do project quality control.
- Do project risk assessment and management.
- Do project UAT with customer.
- Create final project document.
- Do customer project training (OJT).
- At least 4 years of Cyber Security experience.
- Bachelor s degree in Computer Engineering, Information Technology, Computer Science or related fields.
- Experience in installation and operation Security product e.g. Firewall, IPS, SIEM, NAC, Anti-Virus, Endpoint.
- Knowledge on network security and cloud technology.
- Knowledge of monitoring tools (What s up gold, Zabbix, Nagios).
- Has valid Security product Certification e.g. Foritnet NSE3-7, PaloAlto PCNSA, PCNSE, Cisco CCNA, CCNP Security.
- Experienced in ITIL framework.
- Senior Engineer/Engineering Specialist (Network and Security).
- Configure and install various network devices and services (e.g., routers, switches, firewalls, load balancers, VPN, QoS).
- Managing and troubleshooting SD-WAN solutions, Wireless Lan and Cybersec solution.
- Perform network maintenance and system upgrades including service packs, patches, hot fixes, and security configurations.
- Monitor performance and ensure system availability and reliability.
- Monitor system resource utilization, trending, and capacity planning.
- Provide Level-2/3 support and troubleshooting to resolve issues.
- Work within established configuration and change management policies to ensure awareness, approval and success of changes made to the network infrastructure.
- Select and implement security tools, policies, and procedures in conjunction with the company s security team.
- Work with vendors and other IT personnel for problem resolution.
- Bachelor s degree in computer engineering, computer science, IT, or related fields.
- At least 3-5 years of experience in network & security areas.
- Knowledge and Experience with network design, implementation, service support, and troubleshooting.
- Knowledge and Experience with SD-WAN, Network Security and CyberSec solutions.
- Knowledge and Experience in LAN/Datacenter networking, TCP/IP, DNS, DHCP, SSL, HTTP, Proxy, Web Application Firewall.
- CCNA, CCNP, CompTIA Network+, Fortigate, PaloAlto product certificate is advantage.
- Good communication, analytical thinking, and effective communication skills with interpersonal and problem-solving skill.
- Able to work outside working hours.
- Good command of read, listen, written and speaking English.
- On-call support during non-office hours.
- Engineering Specialist (Project Engineer).
- Manage CCII (Cloud, Cyber Security, IOT, ICT) project for single and multi-tower solution for Property, Retail, Conglomerate, and international customer segments.
- Be a committee of AIS bid management for validating large projects at TCV > 10MB.
- Manage project stakeholders to meet expectation and requirement.
- Communicate project progress to stakeholders.
- Plan and manage project issue and risk with proper actions.
- Plan and manage project to meet project objective, within timeline, project budget, scope and give customer satisfied.
- Manage project resource both internal delivery and external suppliers.
- Bachelor's degree or higher in computer science, business, or a related field.
- 8-15 years of project management and related experience.
- Strong in communication and stakeholder management.
- Project Management Professional certification preferred.
- Proven ability to solve problems creatively.
- Strong familiarity with project management software tools, methodologies, and best practices.
- Experience seeing projects through the full life cycle.
- Excellent analytical skills.
- Strong interpersonal skills and extremely resourceful.
- Proven ability to complete projects according to outlined scope, budget, and timeline.
- Senior Engineer (System Infrastructure)
- Implement Server, Storage, Virtualization, Backup system for Enterprise customer.
- Hypervisor and Operating system configuration and customization.
- Network and firewall integration for Cloud infrastructure.
- Hand-over completed solution to related team.
- At least 3 years experience on Server, Storage, VMware and Veeam delivery.
- Strong knowledge of Cloud environment and Operating system. (Windows and Linux).
- Basic skill of Database and Middleware installation.
- Strong organizational skills and ability to take on multiple assignments.
- Experienced firewall and cloud network implementation.
- Ability to occasionally work or assign work during nights/weekends during critical incidents per on-call rotation or major project implementations.
- Good command of English.
- VMware VCP or Linux certificate knowledge is an advantage.
Skills:
Research, Automation
Job type:
Full-time
Salary:
negotiable
- Lead the Cyber Security Incident Response (CSIR) team in day-to-day operations, managing complex incidents, and communicating progress to senior management.
- Ensure clear incident documentation and oversee the implementation and follow-up of realistic remediation plans.
- Detect and independently respond to security incidents across the organization.
- Assume the role of an Incident Manager during major security events.
- Collaborate with management to execute and iterate on the incident response process.
- Develop the threat-response matrix, incident-response playbook, and processes. Design and implement metrics for incident response, continually improving efficiency and effectiveness.
- Stay informed of emerging threats, security technologies, and relevant research for continuous improvement.
- Identify and mitigate complex security threats before exploitation.
- Implement and monitor security measures for infrastructure protection.
- Utilize log analysis platforms for security analytics and threat detection.
- Perform root cause analysis (RCA) and incident reviews.
- Mentor other members of the Security Incident Response Team.
- Help the team grow their skills and experience.
- Provide security recommendations to security architecture, issues, and features.
- Create a supportive environment for team members.
- Build strong partnerships with the other departments as a supporter of the cyber security incident response team. (CSIRT).
- Train team members to prioritize efforts and ensure alignment with company direction.
- Be a role model for positive thinking, and conflict resolution.
- Draft and successfully deliver on quarterly OKRs (Objectives and Key Results).
- Bachelor's degree or higher in Computer Engineering, Computer Science, IT, or related fields.
- A minimum of 5 years of working experience in Security Operations (SecOps), incident response, threat analysis, incident management, or relevant investigations during medium and large-scale security events.
- Robust understanding of security issues, mitigations, and a solid grasp of the current global threat landscape.
- Experience in security solutions, secure network design, firewalls, authentication, authorization systems, log analysis platforms, security incident response, monitoring, and intrusion detection.
- Profound knowledge of attacks, mitigation methods, and threat modeling.
- Experience in digital forensics, SOAR automation, and cloud providers like GCP, AWS, and Azure is advantageous.
- Strong written and verbal communication skills are required, including conducting presentations and creating security reports. Experience with executive-level communications is a plus.
- Substantial engineering mindset.
- Capability to build working relationships with key stakeholders.
- Capability to make concrete progress in the face of ambiguity and imperfect knowledge.
- Hold the certificate of CompTIA Security +, CompTIA CySA+, and others would be an added advantage.
Skills:
Oracle, SQL, MySQL
Job type:
Full-time
Salary:
negotiable
- Perform DBA activities for Oracle Retail applications including MOM, Store, Planning, and middleware (RIB).
- Administer Oracle WebLogic middleware and manage multiple Oracle Retail environments.
- Install, configure, patch, upgrade, and maintain Oracle Retail applications and their interfaces.
- Monitor and support Oracle Retail applications, including RIB and related systems.
- Perform performance tuning, indexing, and partitioning for Oracle Retail and database systems.
- Install, configure, and maintain security applications (OID, OIM) and replication software (e.g., GoldenGate).
- Maintain Oracle database systems, including managing replication, backup, and disaster recovery setups (Oracle RAC, Data Guard, RMAN).
- Create and manage database objects, shell scripts, and PL/SQL files required by Oracle Retail applications.
- Schedule and monitor batch jobs using UC4, Cron jobs, and Oracle database.
- Troubleshoot and resolve complex database issues, ensuring high availability, security, and performance.
- Use Oracle support (Metalink) for service request creation, follow-up, and resolution.
- Install and maintain reporting and BI applications like OBIEE, BI Publisher, MicroStrategy.
- Administer cloud platforms (Oracle, AWS, Azure) and Oracle Exadata environments.
- RequirementsBachelor s degree or higher in Computer Science or a related field.
- Minimum of 5 years as a Database Administrator (Oracle, MSSQL, MySQL, etc.).
- Proficiency in system administration of Oracle Exadata, Cloud platforms (Oracle, AWS, Azure), and PaaS (Oracle Autonomous/AWS RDS).
- Experience with Oracle multitenant (Container/Pluggable DBs), RAC (Active-Active environments), and database performance tuning.
- Knowledge of Oracle ASM, Oracle security applications (OID, OIM), and replication tools (GoldenGate).
- Familiarity with Linux or UNIX environments and disaster recovery solutions (Oracle RAC, Data Guard and RMAN).
- Performs upgrades of databases (Patch, Export-Import Data Pump and Data Guard).
- Experience with virtualization technologies both on-premises and on the cloud.
- Strong knowledge of database installation, partitioning, performance tuning, and backup/recovery strategies.
- Ability to diagnose, troubleshoot, and resolve complex issues with Oracle databases and cloud services.
- Familiarity with automation and scripting (PL/SQL, Shell, Pro*C).
- Experience with cloud database environments (AWS RDS, Oracle Autonomous).
- Strong communication skills with the ability to collaborate with both technical and non-technical stakeholders.
- Excellent interpersonal skills and ability to work well in a team environment.
Experience:
3 years required
Skills:
Compliance, Legal, Risk Management
Job type:
Full-time
Salary:
negotiable
- Develop data security policy review, data security policy exceptions, and control risk mitigation processes.
- Define the security controls for access management lifecycle (i.e., requirement for creation, deletion, transfer and review).
- Operate:Advice on technology relating to Data Privacy and Protection (i.e., PDPA) related security controls implementation.
- Drive and support data security controls such as Data Loss Prevention (DLP), Data Masking, Data Encryption capabilities to protect sensitive data.
- Drive compliance (or collaborate with compliance team) to organization security policies, standards, metrics, and legal requirements.
- Communicate and enforce security policies, rules, and standards.
- Conduct impact assessment of data initiatives from a security point of view.
- Ensure the cryptographic keys and related components are safety and protection of confidential information.
- Resolve data security audit and risk findings.
- Review and develop security controls to current access controls policies and procedures.
- Provide requirements for create and manage roles, access rights (includes privileged access), authentication and identity within the environment.
- Conduct periodic review of user access.
- Review, approve and monitor the usage of privileged access.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Work experience in privacy, compliance, information security, auditing or a related field may also be an accepted alternative, according to Cybersecurity.
- Minimum 3 years of experience in and strong knowledge of privacy, data, operational risk management, information security, or related areas in IT.
- OTHER REQUIREMENTS.
Experience:
1 year required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Penetration Tester (Manual & Automate).
- Minimum years experience required.
- Over 1 years of Experience in related fields.
- Additional application instructions.
- Good Communication in English.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Experience:
2 years required
Skills:
Network Infrastructure, Security Design, Big Data, English
Job type:
Full-time
Salary:
negotiable
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Building a better working world.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Experience:
1 year required
Skills:
Risk Management, Compliance
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
Experience:
3 years required
Skills:
Research, System Administration, Android
Job type:
Full-time
Salary:
negotiable
- Implements IT security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Protects IT system by defining access privileges, control structures, and required resources.
- Process & analyze to gain insights on past IT areas on, current or potential attacks and threats that pose a risk to the organization.
- Primary point of contact with Internal Audit. Periodically review, update, implement and communicate changes to IT policies and procedures and General IT Controls. Facilitate internal and external audit processes by participating in scoping discussions and walk-throughs, delivering evidence that controls are operating as defined, remediating deficiencies, and acting on recommendations.
- Safeguards IT infrastructure and system as well as information system assets by identifying and solving potential and actual security problems.
- Research cyber security topics and promote Cyber security awareness throughout Thaioil.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- 3+ years of prior relevant experience, especially in IT working environment.
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g., Netflow, FPC), and other attack artifacts in support of incident investigations.
- Experience with vulnerability scanning solutions.
- Familiarity with Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Have knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform.
- Understanding of mobile technology and OS (i.e., Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
- OTHER REQUIREMENTS.
Experience:
8 years required
Skills:
Business Development, Assurance, Software Development, English
Job type:
Full-time
Salary:
negotiable
- Design and work on cybersecurity framework based on business objectives and strategic imperatives of the client organisation including goals, vision, mission, and operational plans.
- Data pattern and trend identification via metric analysis, driving operational excellence and improvement.
- Designing and implementing data protection and privacy programs for our clients and supporting their business.
- Evaluating the data protection and privacy practices of our clients and Conducting Privacy Impact Assessments.
- Monitor processes and drive improvements in efficiency and quality of cybersecurity programs.
- Assist in development of workflows for transitioning strategic plans into implementation plans and operational readiness.
- Facilitate strategic planning initiatives, documentation, technical roadmaps and security tool rationalisation.
- Assist in designing the security organisation structure including cyber defense.
- Develop security policies, procedures, standards based on the security strategy and roadmap.
- Review of cybersecurity policies and processes to identify gaps in design of control based on comprehensive assessment framework.
- Maintain continuous communication with key stakeholders in support of the security strategy, and plan and solicit feedbacks, to uplift the programs and capabilities.
- Conduct security process implementation reviews to assess security effectiveness and reporting.
- Conduct Current State Assessment of cybersecurity practices against the defined controls and provide recommendations for to-be state.
- Run Cyber Security Diagnostic Assessments and develop programs for cybersecurity skill development and enhancement.
- Provide certification advisory across Information Security Management System (ISMS).
- Implement security controls for realisation of the certification requirements and provide technology roadmap based on the security strategy.
- Assisting in delivering privacy projects to acting as a subject matter expert on them or to leading a team towards excellent client experience.
- Supporting and guiding our clients in adhering to the complex web of relevant national and international regulations (e.g. EU General Data Protection Regulation).
- Deploying processes and tools to help detect and prevent privacy breaches.
- Ensuring a harmonised approach towards data protection and privacy by bringing together our client s stakeholders (e.g. legal, compliance, risk, HR, security, business functions).
- Assisting clients in privacy related incident response activities.
- Supporting the client s team by acting as an interim team member (e.g. data protection officer, security officer, security manager, security analyst).
- Proactively identifying and pursuing opportunities for further business and team growth.
- Preferred skills.
- Bachelor s degree in Computer Science, Information Systems, Information Technology, Engineering, or equivalent education.
- Minimum 4 - 5 years of prior relevant working experience.
- Experience with vulnerability scanning solutions and cybersecurity systems.
- Possession of relevant qualifications such as CIPM, CIPT, CIPP/E, CISM, CISSP, and/or HCISSP, as well as involvement in industry related organizations (e.g. IAPP, ISACA, (ISC)² ) or relevant certifications.
- Strong interpersonal and stakeholder management skills with ability to coordinate between technical and business teams.
- Excellent verbal, written communication and interpersonal skills with stakeholders at all levels.
- Knowledge and experience with relevant data protection and privacy laws and regulations (e.g. PDPA, EU GDPR, and Privacy Shield) and industry standards and frameworks, such as GAPP and BCR.
- Ability to efficiently understand client organisations and their business model and to tailor relevant processes to privacy requirements.
- An analytical mindset, strive for quality and are able to work in a result-oriented environment.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Bachelor Degree Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- December 31, 2024
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Risk Management, Project Management, English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Experience:
7 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Encourage everyone to have a voice and invite opinion from all, including quieter members of the team.
- Deal effectively with ambiguous and unstructured problems and situations.
- Initiate open and candid coaching conversations at all levels.
- Move easily between big picture thinking and managing relevant detail.
- Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required.
- Contribute technical knowledge in area of specialism.
- Contribute to an environment where people and technology thrive together to accomplish more than they could apart.
- Navigate the complexities of cross-border and/or diverse teams and engagements.
- Initiate and lead open conversations with teams, clients and stakeholders to build trust.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Security Operation Center (SOC).
- Minimum years experience required.
- 7 years of experiences and above.
- Additional application instructions.
- Good communication in english.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- December 31, 2024
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
- 1