- No elements found. Consider changing the search query.
Skills:
Research, System Administration, Android
Job type:
Full-time
Salary:
negotiable
- Implements IT security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Protects IT system by defining access privileges, control structures, and required resources.
- Process & analyze to gain insights on past IT areas on, current or potential attacks and threats that pose a risk to the organization.
- Primary point of contact with Internal Audit. Periodically review, update, implement and communicate changes to IT policies and procedures and General IT Controls. Facilitate internal and external audit processes by participating in scoping discussions and walk-throughs, delivering evidence that controls are operating as defined, remediating deficiencies, and acting on recommendations.
- Safeguards IT infrastructure and system as well as information system assets by identifying and solving potential and actual security problems.
- Research cyber security topics and promote Cyber security awareness throughout Thaioil.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Relevant experience, especially in IT working environment.
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g., Netflow, FPC), and other attack artifacts in support of incident investigations.
- Experience with vulnerability scanning solutions.
- Familiarity with Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Have knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform.
- Understanding of mobile technology and OS (i.e., Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
- OTHER REQUIREMENTS.
Skills:
Research, Automation
Job type:
Full-time
Salary:
negotiable
- Lead the Cyber Security Incident Response (CSIR) team in day-to-day operations, managing complex incidents, and communicating progress to senior management.
- Ensure clear incident documentation and oversee the implementation and follow-up of realistic remediation plans.
- Detect and independently respond to security incidents across the organization.
- Assume the role of an Incident Manager during major security events.
- Collaborate with management to execute and iterate on the incident response process.
- Develop the threat-response matrix, incident-response playbook, and processes. Design and implement metrics for incident response, continually improving efficiency and effectiveness.
- Stay informed of emerging threats, security technologies, and relevant research for continuous improvement.
- Identify and mitigate complex security threats before exploitation.
- Implement and monitor security measures for infrastructure protection.
- Utilize log analysis platforms for security analytics and threat detection.
- Perform root cause analysis (RCA) and incident reviews.
- Mentor other members of the Security Incident Response Team.
- Help the team grow their skills and experience.
- Provide security recommendations to security architecture, issues, and features.
- Create a supportive environment for team members.
- Build strong partnerships with the other departments as a supporter of the cyber security incident response team. (CSIRT).
- Train team members to prioritize efforts and ensure alignment with company direction.
- Be a role model for positive thinking, and conflict resolution.
- Draft and successfully deliver on quarterly OKRs (Objectives and Key Results).
- Bachelor's degree or higher in Computer Engineering, Computer Science, IT, or related fields.
- A minimum of 5 years of working experience in Security Operations (SecOps), incident response, threat analysis, incident management, or relevant investigations during medium and large-scale security events.
- Robust understanding of security issues, mitigations, and a solid grasp of the current global threat landscape.
- Experience in security solutions, secure network design, firewalls, authentication, authorization systems, log analysis platforms, security incident response, monitoring, and intrusion detection.
- Profound knowledge of attacks, mitigation methods, and threat modeling.
- Experience in digital forensics, SOAR automation, and cloud providers like GCP, AWS, and Azure is advantageous.
- Strong written and verbal communication skills are required, including conducting presentations and creating security reports. Experience with executive-level communications is a plus.
- Substantial engineering mindset.
- Capability to build working relationships with key stakeholders.
- Capability to make concrete progress in the face of ambiguity and imperfect knowledge.
- Hold the certificate of CompTIA Security +, CompTIA CySA+, and others would be an added advantage.
Skills:
Compliance, Legal, Risk Management
Job type:
Full-time
Salary:
negotiable
- Set and implement user access controls and identity and access management systems.
- Perform regular audits to ensure security practices are compliant.
- Deploy endpoint detection and prevention tools to thwart malicious hacks.
- Work with IT operations to set up a shared disaster recovery/business continuity plan.
- Contribute towards the execution of policies, standards and procedures specific set by enterprise standards and account specific standards as they apply to IT security governance, IT risk, and IT compliance requirements.
- Perform IT security risk assessment activities, including third party evaluation and management, and related analysis, including ongoing compliance monitoring in coordination with governance lead and external team members.
- Contribute towards the execution of IT security compliance reviews of master service agreements and advise business team regarding gaps and corresponding mitigation requirements.
- Contribute to the design and implementation of technical IT security safeguard architecture.
- Works with infrastructure teams to execute the vulnerability management program and application owners to validate secure coding best-practices.
- Will operate in a close team of computer digital forensic, fraud, and other IT investigative experts.
- Document and track all incidents to meet audit, compliance, and legal requirements.
- Conduct root cause analysis to identify gaps and recommendations ultimately remediating risks to the firm.
- Periodically reports progress to management, and assesses and measures results related to Information Security activities.
- Bachelor s degree in Information Systems Risk Management, Computer Science, or related field, equivalent experience.
- 7-10 Years of experience with a thorough understanding of information security principles and practices.
- 3-5 years of experience in a Cyber Security or Risk Advisory role for regulated environments.
- Proven ability to infuse innovation and creativity into tactical activity with a focus on exceptional customer service.
- Be inspirational, enthusiastic and a promoter of information security.
- Must be reliable and adaptable.
- Excellent written and verbal communication and organizational skills.
- Outstanding work ethic.
- Strong team player that collaborates well with others to solve problems and actively incorporate input from various sources.
- Ability to think strategically, work with a sense of urgency and pay attention to detail.
- Ability to present complex solutions and methods to a general community.
- Independent thinking, willingness to "step outside the box" and take reasonable, calculated risks.
Experience:
3 years required
Skills:
System Security, Windows Server
Job type:
Full-time
Salary:
฿60,000 - ฿80,000, negotiable
- Provide input and security consultation in a project-based environment as well as assisting operational of IT Security components with functional security requirements.
- Evaluate new projects and applications as they relate to security architecture and design; audit existing deployments and analyse gaps against security practices and standards.
- Conduct application vulnerability assessment, secure code review, and security penetration testing for new projects, enhancement projects, and periodic assurance to com ...
- Implement and operate DevSecOps on projects/applications that use DevOps process.
- Track, enforce, and consult to resolution the closure of security risks including review plans and monitor progress or remedial actions according to security requirements, security design, application vulnerability, and penetration testing issues.
- Periodically review security requirements to align with Bank s policies and regulations.
- Support periodic security audits.
- Manage third parties involved in IT Security Advisory and Assurance.
- Bachelor's or Master s Degree in Computer Science, Engineering, Information Systems or equivalent.
- Minimum 3 years in IT Security Advisory, Security Assurance, Threat Hunting plus experience working in or closely with IT Application, Enterprise Architect, and IT Risk management.
- Knowledge of Security Framework and Concepts, Compliance, Risk and Regulations, PCI DSS, OWASP, COBIT.
- Experience in performing comprehensive and authoritative technical analysis of the security readiness and compliance of applications.
- The ability to oversee pentesting to find vulnerabilities in all elements of a security system, understand security vulnerabilities, secure code review and remediation.
- Data and information management, including classification, retention and destruction. It also means keeping corporate and personal data both private and secure while needed, and destroyed when it is no longer needed.
- Knowledge of all applicable laws and compliance frameworks to enforce compliance.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Experience:
3 years required
Skills:
Industry trends
Job type:
Full-time
Salary:
negotiable
- Risk Assessment & Analysis: Conduct comprehensive assessments of clients OT environments to identify vulnerabilities and recommend mitigation strategies.
- Security Strategy Development: Design and implement tailored OT security frameworks and policies in alignment with industry standards (NIST, ISA/IEC 62443, etc.).
- Stakeholder Engagement: Collaborate with cross-functional teams, including IT, operations, and management, to foster a culture of security awareness and resilience.
- Training & Mentorship: Provide training and mentorship to junior consultants and client teams on OT security best practices and emerging threats.
- Thought Leadership: Stay abreast of industry trends, emerging technologies, and regulatory changes; contribute to white papers, presentations, and client workshops.
- Your role as a leader
- At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We expect our people to embrace and live our purpose and shared values, challenging themselves everyday to identify issues that are most important to our clients, our people and the communities, and to make an impact that matters. In addition to living our purpose, Senior Consultants across our firm are expected to:Understand objectives for stakeholders, clients and Deloitte whilst aligning own performance to objectives and sets personal priorities.
- Develop themselves by actively seeking opportunities for growth, shares knowledge and experiences with others, and acts as a strong brand ambassador.
- Seek opportunities to challenge themselves, collaborate with others to deliver and takes accountability for results.
- Build relationships and communicates effectively in order to positively influence peers and stakeholders.
- Work effectively in diverse teams within a highly inclusive team culture where everyone is supported, respected and recognized for their contribution.
- Enough about us, let's talk about youBachelor s degree in Cybersecurity, Information Technology, Engineering, or a related field; a Master s degree is a plus.
- At least 3 years of experience in cybersecurity, with a focus on operational technology and industrial control systems (ICS).
- Relevant certifications such as CISSP, CISM or GICSP,.
- Deep understanding of relevant standards and guidelines.
- Proficiency in network security, vulnerability assessment tools, and incident response methodologies specific to OT environments.
- Strong knowledge of industrial control systems, SCADA systems, and PLCs.
- Experience with network segmentation, access control, and secure communication protocols.
- Exceptional verbal and written communication skills, with the ability to articulate complex concepts to technical and non-technical stakeholders alike.
- Strong analytical and problem-solving skills, with a proactive approach to identifying and addressing potential security issues.
- Due to volume of applications, we regret that only shortlisted candidates will be notified.
- Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. #LI-AA1 Requisition ID: 106367In Thailand, the services are provided by Deloitte Touche Tohmatsu Jaiyos Co., Ltd. and other related entities in Thailand ("Deloitte in Thailand"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Thailand, which is within the Deloitte Network, is the entity that is providing this Website.
Experience:
7 years required
Skills:
System Security, Windows Server, Linux
Job type:
Full-time
Salary:
฿60,000 - ฿90,000, negotiable
- Identify and evaluate areas for improvement in detection, prevention, and cyber incident response.
- Work closely with stakeholders to develop and follow up on remediation plans.
- Provide expert consultation on mitigating strategies and actionable remediation plans to asset owners.
- Collaborate with various teams to create, implement, and monitor effective remediation strategies.
- Apply knowledge of IT infrastructure, with experience as a system administrator or system engineer, to enhance cybersecurity measures.
- Utilize an understanding of offensive and defensive cybersecurity strategies (e.g., red and blue teams).
- Perform penetration testing or demonstrate a strong understanding of penetration testing methodologies to assess the security of IT systems.
- Use computer forensic tools to examine and analyze electronic media in suspected hacking cases.
- Conduct tasks related to malware analysis and reverse engineering to identify and mitigate threats.
- Define a course of action if a security problem exists and explain in detailed technical reports what occurred when an incident happens, including the reasons it occurred, and the response taken.
- Document incidents thoroughly, providing detailed technical reports that include the cause of the incident, and the response measures implemented.
- Build relationships with other entities responsible for conducting cyber threat analyses, ensuring effective collaboration and information sharing.
- Bachelor s degree / master s degree or higher in Computer Engineering, Information Technology, Computer science or related field.
- Proficiency with SIEM, UBA, and SOAR tools.
- Experience with system monitoring tools.
- Coding ability in C, C++, C#, Java, ASM, PERL, PHP, and PowerShell.
- Knowledge of backup and archiving techniques.
- Use of enterprise system monitoring tools.
- Understanding of cloud computing.
- Proficiency in UNIX.
- Knowledge of network communication (IP/TCP).
- Familiarity with computer hardware systems.
- Experience with web-based application security.
- Strong knowledge of Windows and Linux Operating Systems.
- Experience in identifying and evaluating cybersecurity risks and providing actionable insights.
- Previous experience as a penetration tester (pentester) is highly beneficial.
- Experience as a system administrator/system engineer is advantageous.
- Familiarity with computer forensic tools and techniques.
- Experience in malware analysis and reverse engineering.
- Ability to work well under pressure while handling multiple tasks.
- Remark: The Bank requires the verification of criminal records prior consideration for employment to ensure secured and maintain standards of the organization.
Skills:
Negotiation
Job type:
Full-time
Salary:
negotiable
- Bachelor degree or higher in Computer Science or related filed.
- There are 5-8 years, Experience in Network skills.
- Able to do network design, evaluation, POC, implementation.
- Self-Motivation and Hard Working.
- Able to work some time on night and weekend by job duties.
- Able to troubleshooting related to network problem & connecting equipment.
- Willing to self-study for network knowledge and learn new knowledge from team.
- Good communication,interpersonal, problem-solving, presentation, and negotiation skill.
Experience:
1 year required
Skills:
Risk Management, Compliance, English
Job type:
Full-time
Salary:
negotiable
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Penetration Tester (Manual & Automate).
- Minimum years experience required.
- Over 1 years of Experience in related fields.
- Additional application instructions.
- Good Communication in English.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Skills:
Oracle, SQL, MySQL
Job type:
Full-time
Salary:
negotiable
- Perform DBA activities for Oracle Retail applications including MOM, Store, Planning, and middleware (RIB).
- Administer Oracle WebLogic middleware and manage multiple Oracle Retail environments.
- Install, configure, patch, upgrade, and maintain Oracle Retail applications and their interfaces.
- Monitor and support Oracle Retail applications, including RIB and related systems.
- Perform performance tuning, indexing, and partitioning for Oracle Retail and database systems.
- Install, configure, and maintain security applications (OID, OIM) and replication software (e.g., GoldenGate).
- Maintain Oracle database systems, including managing replication, backup, and disaster recovery setups (Oracle RAC, Data Guard, RMAN).
- Create and manage database objects, shell scripts, and PL/SQL files required by Oracle Retail applications.
- Schedule and monitor batch jobs using UC4, Cron jobs, and Oracle database.
- Troubleshoot and resolve complex database issues, ensuring high availability, security, and performance.
- Use Oracle support (Metalink) for service request creation, follow-up, and resolution.
- Install and maintain reporting and BI applications like OBIEE, BI Publisher, MicroStrategy.
- Administer cloud platforms (Oracle, AWS, Azure) and Oracle Exadata environments.
- RequirementsBachelor s degree or higher in Computer Science or a related field.
- Minimum of 5 years as a Database Administrator (Oracle, MSSQL, MySQL, etc.).
- Proficiency in system administration of Oracle Exadata, Cloud platforms (Oracle, AWS, Azure), and PaaS (Oracle Autonomous/AWS RDS).
- Experience with Oracle multitenant (Container/Pluggable DBs), RAC (Active-Active environments), and database performance tuning.
- Knowledge of Oracle ASM, Oracle security applications (OID, OIM), and replication tools (GoldenGate).
- Familiarity with Linux or UNIX environments and disaster recovery solutions (Oracle RAC, Data Guard and RMAN).
- Performs upgrades of databases (Patch, Export-Import Data Pump and Data Guard).
- Experience with virtualization technologies both on-premises and on the cloud.
- Strong knowledge of database installation, partitioning, performance tuning, and backup/recovery strategies.
- Ability to diagnose, troubleshoot, and resolve complex issues with Oracle databases and cloud services.
- Familiarity with automation and scripting (PL/SQL, Shell, Pro*C).
- Experience with cloud database environments (AWS RDS, Oracle Autonomous).
- Strong communication skills with the ability to collaborate with both technical and non-technical stakeholders.
- Excellent interpersonal skills and ability to work well in a team environment.
Experience:
2 years required
Skills:
Network Infrastructure, Security Design, Big Data, English
Job type:
Full-time
Salary:
negotiable
- Perform cyber security and IT security assessments for clients (e.g. cyber security program assessment, cyber security risk assessments, IT network infrastructure reviews, system technical configurations review, information security policies and processes/procedures review etc.).
- Work on IT security design, analysis and implementation of security protection solution.
- Evaluate and analyze threat, vulnerability, system weakness, impact and risk to secu ...
- Advise clients on the security issues, including explanation on the technical details and how they can remediate the vulnerabilities in the processes, controls and systems.
- Advise client on the security incident response end-to-end process (i.e. preparation, detection, analysis, response and recovery of the security incident).
- Skills and attributes for success.
- To qualify for the role you must have.
- Bachelor's degree or Master s degree in Computer Engineering, Computer Science, Information Systems, IT Security, ICT or other related fields.
- Minimum 2 years' experience in such areas as IT security management design and implementation, IT security assessment and IT technical background.
- Familiar with leading IT security processes and tools.
- Highly proficient in both English and Thai with good written and oral communication and analytical skills.
- Ideally, you ll also have.
- Having experience in project planning and management will be a plus.
- Professional certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and / or Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), or ISO27001 will be highly considered.
- Experience in new generation security practices (i.e. DevSecOps, iPentest, RedTeaming, System Resilience Design).
- Experience in Emerging Technologies (i.e. Cloud Computering, Blockchain, Big Data, A.I./M.L.).
- We re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
- What we offer.
- We offer a competitive remuneration package. Our comprehensive Total Rewards package includes support for flexible working and career development, covering holidays, health and well-being, insurance, savings and a wide range of discounts, offers and promotions.
- Continuous learning: You ll develop the mindset and skills to navigate whatever comes next.
- Success as defined by you: We ll provide the tools and flexibility, so you can make a meaningful impact, your way.
- Transformative leadership: We ll give you the insights, coaching and confidence to be the leader the world needs.
- Diverse and inclusive culture: You ll be embraced for who you are and empowered to use your voice to help others find theirs.
- If you can demonstrate that you meet the criteria above, please contact us as soon as possible.
- The exceptional EY experience. It s yours to build.
- EY | Building a better working world.
- EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
- Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
- Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
Experience:
7 years required
Skills:
English
Job type:
Full-time
Salary:
negotiable
- Encourage everyone to have a voice and invite opinion from all, including quieter members of the team.
- Deal effectively with ambiguous and unstructured problems and situations.
- Initiate open and candid coaching conversations at all levels.
- Move easily between big picture thinking and managing relevant detail.
- Anticipate stakeholder needs, and develop and discuss potential solutions, even before the stakeholder realises they are required.
- Contribute technical knowledge in area of specialism.
- Contribute to an environment where people and technology thrive together to accomplish more than they could apart.
- Navigate the complexities of cross-border and/or diverse teams and engagements.
- Initiate and lead open conversations with teams, clients and stakeholders to build trust.
- Uphold the firm's code of ethics and business conduct.
- Preferred skills.
- Security Operation Center (SOC).
- Minimum years experience required.
- 7 years of experiences and above.
- Additional application instructions.
- Good communication in english.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Analytical Thinking, Azure Data Factory, Coaching and Feedback, Communication, Creativity, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Embracing Change, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Influence, Intellectual Curiosity, Learning Agility, Managed Services, Optimism, Privacy Compliance {+ 16 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
- Job Posting End Date.
- April 30, 2025
Skills:
Project Management
Job type:
Full-time
Salary:
negotiable
- Responsible for the protection of Celestica assets and to respond to alarms, emergency situations and to assist employees with security issue as part of our mission to provide a safe work environment.
- Responsible for maintaining appropriate access to all areas of the facility for both employees and customers.
- Controlling daily security operations including incident investigation, property passes, loss prevention, and all administrative duties required at the site.
- Knowledge/Skills/Competencies.
- In-depth knowledge of facilities management and operations.
- Understanding of environmental, health and safety regulations (local and government).
- Good organization and project management skills.
- Ability to evaluate, diagnose and troubleshoot problems.
- Ability to gather and analyze data and determine root cause of problems.
- Ability to effectively communicate with a variety of internal and external customers.
- Typical Experience.
- Two to Four years relevant experience.
- Typical Education.
- Bachelor's degree in a related field, or an equivalent combination of education and experience.
- Educational requirements may vary by geography.
- Notes.
- This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
- Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
- At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.
- Celestica (NYSE, TSX: CLS) enables the world s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
- Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
- Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
Skills:
Linux, Good Communication Skills, English
Job type:
Full-time
Salary:
negotiable
- Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
- Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
- Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
- Employ various attack methodologies to test the resilience of systems against hacking attempts and security breaches.
- Perform threat modeling to anticipate potential attack vectors.
- Analyze risks associated with identified vulnerabilities and recommend appropriate mitigation strategies.
- Develop custom tools and scripts to automate penetration testing and exploit known vulnerabilities.
- Keep up to date with the latest exploitation techniques and security tools.
- Prepare detailed reports on findings from penetration tests and security assessments.
- Document and present risks and vulnerabilities to relevant stakeholders, along with recommended countermeasures.
- Collaborate with the Blue Team to enhance the organization s defensive strategies based on offensive findings.
- Share insights and knowledge on emerging threats and attack techniques with the cybersecurity team to continually improve defensive measures.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 10 years of experience in penetration testing and vulnerability assessments or related roles.
- Strong knowledge of network and application security, ethical hacking, and cybersecurity principles.
- Familiarity with penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux).
- Excellent problem-solving skills and ability to think like an adversary.
- Good communication skills for effective reporting and stakeholder engagement.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, etc.
- Professional Certificated related to work e.g. (CISSP, OSCP, OSWE) is desirable.
- Location: True Digital Park, Punnawithi.
Experience:
4 years required
Skills:
Compliance, English
Job type:
Full-time
Salary:
negotiable
- Establish and maintain IT security standards and guidelines in compliance with the security regulations from regulators, and the security best practices, that governs new technology adoption.
- Advise business units and technology group on how to comply with IT security policy, standards, guidelines and best practices.
- Keep abreast of the knowledge in cybersecurity, new digital technology.
- Support on Cyber-drill program management and BCP coordinator across different Technology security units.
- Provide security awareness to the employee and service providers.
- Manage security supervision programs to track on non-compliance items to security policies, standards and guidelines.
- Inspecting and assessing the security of IT third parties that will access the organization s data or systems.
- Ensuring compliance with security requirements for IT third parties.
- Analyzing security risks and establishing preventive measures in case of incidents involving IT third parties.
- Qualification Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 4 years of experience in Information Security or a related field.
- Knowledge in new Banking Technology and associated security control is a plus.
- Relevant security certification is a plus, e.g. CISSP, CISM.
- Strong security advisory, analytical, and problem-solving skill.
- Good command in English.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
5 years required
Skills:
Risk Management, Project Management, English
Job type:
Full-time
Salary:
negotiable
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
Experience:
5 years required
Skills:
Problem Solving, English
Job type:
Full-time
Salary:
negotiable
- Design, implement and maintain the IT Security of the organization which involves developing and executing security strategies, standards and procedures to protect IT assets from cyber threats and vulnerabilities.
- Develops solution conceptual designs and solution blueprints for IT projects.
- Design security architecture elements to mitigate emerging threats.
- Reviewing security measures and recommending to implementing enhancements.
- Review and advise security solution architect for the proposed system such as: Network Segmentation, Application protection, Defense-in-depth, Remote Access, Encryption Technologies.
- Conducting security advisory consultancy and working with RED and BLUE team for security testing along the pipeline of the system delivery.
- Bachelors or Masters Degree in Computer Engineering, Computer Science or related field.
- At least 5 years of experience of IT Security Advisory, Penetration tester or Enterprise Architect or related role.
- Comprehensive understanding of the IT Security Concept, Security Architect, Risk assessment.
- Ability to analyst finding form Offensive and Defensive Security team.
- Ability to analyze end-to-end security processes and provide advice in order to reduce risk to acceptable levels.
- Strong analytical and problem solving.
- Rapid learning capability and able to work under pressure.
- Good command in written and spoken Thai and English language.
- Ability to present technical solutions with stakeholders in an easy way.
- Knowledge of International Security frameworks, Standards, and Guidelines e.g., NIST-800-53, PCI-DSS, OWASP, and etc.
- Professional Certificated related to work e.g. (CISSP, CSSLP, CDPSE, OSCP, TOGAF) is desirable.
- Location: True Digital Park, Punnawithi.
Skills:
Research, Automation, English
Job type:
Full-time
Salary:
negotiable
- Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
- Support on implementing and running DevSecOP operation.
- Keep abreast of the knowledge in cybersecurity, new digital technology and CI/CD area.
- Collaborate with business and technology team to carry-out the assigned Vulnerability Management / DevSecOP tasks.
- Senior person will act as a security advisor to provide a security recommendation on the new or the change on Application solution and Infrastructure design.
- Perform Research and Development on Offensive Security and security automation.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- Experience in Vulnerability Assessment and Penetration testing (Fresh graduate is also welcome).
- Have knowledge in Threat intelligence, red teaming and Secure coding review and CI/CD DevSecOP implementation and certified relevant security certification is a plus.
- Strong security analytical and problem-solving skill.
- Good command in English.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
Experience:
1 year required
Skills:
Compliance, Python, PowerShell, Japanese
Job type:
Full-time
Salary:
negotiable
- Monitor, analyze and triage security alerts and events.
- Assess impact, risk of potential incidents, and take appropriate action according to defined procedures.
- Utilize various security tools and technologies to detect and investigate cyber threats.
- Collaborate with other teams, including incident responders, to ensure proper escalation and resolution of cases.
- Document and report security incidents, including detailed analysis and recommendations for improvement.
- Contribute to the development and enhancement of security monitoring and detection capabilities.
- Stay up to date with the latest security trends, vulnerabilities, and best practices.
- Bachelor s degree in Computer Science, Information Security, or a related field.
- Solid understanding of network protocols, security architectures, and common security threats.
- Knowledge of security incident response processes and methodologies.
- Excellent analytical and problem-solving skills.
- Strong communication skills, both written and verbal.
- 1-2 years of experience in a security operations center (SOC) or a similar role.
- Experience with security information and event management (SIEM) platforms and threat intelligence tools.
- Industry certifications, e.g., CompTIA Security or Certified Ethical Hacker (CEH).
- Familiarity with regulatory frameworks and compliance requirements.
- Scripting skills in languages such as Python or PowerShell.
- Knowledge of cloud security concepts and technologies.
- Experience with log analysis and correlation.
- Chinese, Japanese, or other foreign language skills.
- Current Employees apply HERE.
- Current Contingent Workers apply HERE.
- Search Firm Representatives Please Read Carefully
- Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
- Regular
- Hybrid
- 01/31/2025A job posting is effective until 11:59:59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date.
- Requisition ID:R328901.
Skills:
Risk Management, Software Development, Kubernetes
Job type:
Full-time
Salary:
negotiable
- Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
- Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
- Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
- Develop and enforce policies for secure coding, data protection, and incident response.
- Implement robust authentication and authorization mechanisms.
- Conduct regular security assessments, including penetration testing and code reviews.
- Monitor, detect, and respond to security incidents using advanced tools and methodologies.
- Enhance infrastructure security using Kubernetes, Docker, and cloud platforms (GCP, AWS).
- Stay current on emerging threats, vulnerabilities, and security trends, and recommend actionable insights to improve defenses.
- Champion security awareness across the organization, including training sessions and knowledge-sharing activities.
- Ensure compliance with relevant security standards and regulations such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Basic QualificationsProven expertise in application security, cloud security, and infrastructure security.
- Proficiency in securing systems built with technologies such as Node.js, Golang, Elixir, Python, React, Svelte, or Flutter.
- Experience with tools like Docker, Kubernetes, and cloud services (GCP, AWS).
- Strong understanding of cryptographic principles and secure communication protocols.
- Familiarity with CI/CD pipelines and secure DevOps practices.
- Hands-on experience with security tools for vulnerability scanning, penetration testing, and threat detection.
- Deep understanding of database security, especially with PostgreSQL or other relational or non-relational databases.
- Strong analytical and problem-solving skills with a security-first mindset.
- Excellent communication skills and the ability to collaborate effectively in Agile teams.
- Self-motivation, adaptability, and a strong work ethic.
- Preferred Qualifications We re especially excited if you bring:Experience leading security initiatives or mentoring other engineers in security best practices.
- Expertise in compliance frameworks such as ISO 27001, PDPA, GDPR, SOC 2, or PCI DSS.
- Advanced knowledge of security monitoring and incident response systems.
- Strong system design skills with a focus on secure architectures and long-term trade-offs.
- A proven track record of securing fast-paced, high-growth tech environments.
- A passion for securing user-centric products and contributing to their success.
- Perks & Benefits Flat Structure As we continue to grow fast, we strive to retain our culture where everyone is heard, contributes, and grows with the company..
- Work-life Harmony We believe that quality time outside of work is important to sustaining a healthy and happy lifestyle.
- Remote Work Hybrid-mode activated! It comes with the package: flexibility, focus and productivity!.
- Urban Office One breath from Phrom Phong BTS. No sweat whatsoever! The office should also feel like a second home so we dedicated a lot of care and resources into building the best environment for you to wake up to every morning.
- Fun Workshop The best relationships are built over new experiences, that s why we have workshops filled with a range of activities for you to look forward to and enjoy.
- Game Tournament It s getting fun and competitive! Challenge doesn t only have to come from work. Own the championship and show the peeps how great of a gamer (and player) you are.
- Group Insurance Health comes first, we know, don t worry, we ve got you covered.
- Health & Wellness Only a healthy army wins the war. We invest to take care of you from physical, mental and happiness-level. Adopted health & wellness applications plus activities to make sure everyone here is on cloud nine
Job type:
Full-time
Salary:
negotiable
Greenline Synergy provides the information security governance to the BDMS hospitals which is a framework of policies, practices, and strategies that align organizational resources toward protecting information through cybersecurity measures.
- 1
- 2