- No elements found. Consider changing the search query.


āļāļąāļāļĐāļ°:
Compliance, Analytical Thinking, Automation
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement, and manage security controls for cloud environments (AWS, Azure, Google Cloud).
- Perform risk assessments and vulnerability management for cloud-based assets.
- Monitor cloud resources to detect and respond to security incidents.
- Collaborate with IT and development teams to integrate security into the SDLC and DevSecOps.
- Ensure compliance with industry regulations and internal security policies.
- Provide expertise in identity and access management (IAM) within cloud platforms.
- Continuously evaluate and recommend security improvements for cloud operations.
- Strong understanding of network security, encryption, and cloud infrastructure.
- Analytical thinking and problem-solving abilities.
- Ability to work collaboratively in cross-functional teams.
- Excellent communication skills to present security risks and solutions to non-technical stakeholders.
- Bachelor s degree in Computer Science, Information Security, or related field.
- Proven experience in cloud security, with a focus on AWS, Azure, or Google Cloud.
- Experience with cloud security automation and monitoring tools.
- Certifications such as AWS Certified Security Specialty, CISSP, or CCSP are an advantage.
āļāļąāļāļĐāļ°:
Risk Management, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Plan and support internal audit strategies in Cyber Security part (Cyber Security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks).
- Lead a Cyber Security Audit team to ensure output through implementation of work standards and report to top management.
- Identify potential Cyber Security Risk and convince others in the organization to accept complete proposals and recommendation.
- Master s degree in Computer Engineering, Computer Science, Information Technology.
- Experience At least 7 years such as Information Security Management, Information Risk Management, IT Audit Management, ICT Security, Cloud Security, or in a related field.
- Professional certificates of CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager) are advantage.
- Background in technical knowledge of Cyber Security Audit.
- Good command in English.
āļāļąāļāļĐāļ°:
Sharepoint, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Could have experience to develop information in Microsoft SharePoint 3-5 Years.
- Could have experience quality-control would be more assist.
- Have experience in Thai Oil Service would be more assist.
- EDUCATION.
- Bachelor Degree in Computer Science, Computer Engineering, Information Technology or any equivalent fields of study.
- OTHER REQUIREMENTS.
- Good command of English and computer literacy.
- Work @ Sriracha, Chonburi.
- ROLE & RESPONSIBILITY.
- Be able to communicate and manage Safety and Security information by Standard Program of Thai Oil as well. Thus could be reference and apply to all staff implement.
- āļŠāļēāļĄāļēāļĢāļāļŠāļ·āđāļāļŠāļēāļĢāļŠāļ·āđāļāļāļ§āļēāļĄāđāļĨāļ°āļāļ§āļāļāļļāļĄāļāļąāļāļāļēāļĢāļāļēāļāļāđāļāļĄāļđāļĨāđāļĢāļ·āđāļāļāļāļ§āļēāļĄāļĄāļąāđāļāļāļāļāļĨāļāļāļ āļąāļĒāļāđāļēāļāļĄāļēāļāļĢāļāļēāļāđāļāļĢāđāļāļĢāļĄāļāļĩāđāļĄāļĩāđāļāđāđāļāļāļāļāđāļāļĢāđāļāđāđāļāđāļāļāļĒāđāļēāļāļāļĩāđāļāļ·āđāļāđāļŦāđāļāļļāļāļāļāđāļāļāļāļāđāļāļĢāļŠāļēāļĄāļēāļĢāļāļāđāļēāļāļāļīāļāđāļĨāļ°āļāļģāđāļāđāļāđāđāļāđāļāļĒāđāļēāļāļāļđāļāļāđāļāļ.
- Be able to collect, store, create and update documents of the organization's internal and external security management system standards correctly and able to evaluate according to the standards set
- āļŠāļēāļĄāļēāļĢāļāļĢāļ§āļāļĢāļ§āļĄāļāļąāļāđāļāđāļ āļŠāļĢāđāļēāļāđāļĨāļ°āļāļąāļāđāļāļāđāļāļāļŠāļēāļĢāļāļāļāļĄāļēāļāļĢāļāļēāļāļĢāļ°āļāļāļāļēāļĢāļāļąāļāļāļēāļĢāļāļ§āļēāļĄāļĄāļąāđāļāļāļāđāļĨāļ°āļāļĨāļāļāļ āļąāļĒāļāļāļāļāļāļāđāļāļĢāļāļąāđāļāļ āļēāļĒāđāļāđāļĨāļ°āļ āļēāļĒāļāļāļāđāļāđāļāļĒāđāļēāļāļāļđāļāļāđāļāļ āđāļĨāļ°āļŠāļēāļĄāļēāļĢāļāļāļĢāļ°āđāļĄāļīāļāļāļĨāđāļāđāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāļāļĩāđāđāļāđāļāļģāļŦāļāļāđāļ§āđ.
- Be able to practice Security skill to supervise the team contractor working correctly and effectiveness
- āļŠāļēāļĄāļēāļĢāļāļāļķāļāļāļāđāļāļ·āđāļāđāļŦāđāļŠāļēāļĄāļēāļĢāļāļāļāļīāļāļąāļāļīāļāļēāļĢāļāļąāļāļāļąāļāļāļąāļāļāļēāļŦāļĢāļ·āļāđāļāļ°āļāļģāļāļēāļāđāļāļāđāļēāļāļāļ§āļēāļĄāļĄāļąāđāļāļāļāđāļŦāđāļāļąāļāļāļĩāļĄāļāļēāļāļāļđāđāļĢāļąāļāđāļŦāļĄāļēāļāļĩāđāļāļāļīāļāļąāļāļīāļāļēāļāļ āļēāļĒāđāļāđāļāļąāļāļāļąāļāļāļąāļāļāļēāļāļāļīāļāļąāļāļīāļāļēāļāđāļāđāļāļĒāđāļēāļāļāļđāļāļāđāļāļāđāļĨāļ°āļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļāđāļāđāđāļāļāļāļēāļāļ.
āļāļąāļāļĐāļ°:
Compliance, Automation, Risk Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Lead and enhance security operations, mentoring team members and implementing advanced security strategies.
- Architect and enforce security frameworks for IT systems, networks, and cloud environments.
- Monitor, detect, and respond to cyber threats, conducting forensic investigations and post-incident analysis.
- Oversee vulnerability management, system hardening, and security compliance.
- Manage identity and access controls, privileged accounts, and authentication mechanisms.
- Drive security automation, process improvements, and adoption of emerging technologies.
- Conduct security awareness training and ensure best practices across the organization.
- Minimum 5+ years of experience in security operations, with a strong focus on incident response, vulnerability management, and risk assessment.
- Proven experience leading incident response efforts and conducting root cause investigations.
- Experience with vulnerability management, and overseeing the security pipeline.
- Experience with security standardization and IT compliance certification and audit.
- Experience with risk management frameworks and methodologies.
- Expert knowledge of security tools, including SIEM, EDR, vulnerability scanners, and penetration testing tools.
- Strong understanding of network protocols, cloud operating systems, and security concepts.
- Strong understanding of security frameworks such as NIST, ISO 27001, and MITRE ATT&CK.
- Proficiency in scripting languages (e.g., Python, PowerShell) for automation and analysis is a plus.
- Exceptional analytical and problem-solving skills.
- Strong communication and interpersonal skills.
- Ability to work independently and as part of a team.
- Strong attention to detail and a commitment to accuracy.
- Strong documentation and reporting skills.
- Ability to effectively communicate technical risks to non-technical stakeholders.
- Understanding of the 3 lines of defense model is a significant advantage.
- Remark: Given the nature of the mentioned position, where employees are involved with customer data and asset values, and/or the company, to comply with legal and regulatory standards established by the Securities and Exchange Commission, as well as to align with laws and overseeing agencies, the company requires a criminal background check as part of the post-interview process before joining the company. Your criminal history information will be retained for a period of 6 months from the start date..
- Important: Candidate Privacy Policy.
- āļŠāļģāļāļąāļ:āđāļāļĢāļāļāđāļēāļāđāļĨāļ°āļāļģāļāļ§āļēāļĄāđāļāđāļēāđāļ: āļāđāļĒāļāļēāļĒāļāļ§āļēāļĄāđāļāđāļāļŠāđāļ§āļāļāļąāļ§āļāđāļēāļāļāļĢāļąāļāļĒāļēāļāļĢāļāļļāļāļāļĨ āļŠāļģāļŦāļĢāļąāļāļāļđāđāļŠāļĄāļąāļāļĢāļāļēāļ āđāļĨāļ°āļāļđāđāļŠāļĄāļąāļāļĢāđāļāđāļēāļāļķāļāļāļēāļ*.
āļāļąāļāļĐāļ°:
System Security
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļđāđāļĨ āļ§āļēāļāđāļāļ āđāļĨāļ°āļāļāļāđāļāļ āļĢāļ°āļāļāļĢāļąāļāļĐāļēāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļŠāļēāļĢāļŠāļāđāļāļĻ āđāļāđāļ Firewall, VPN, Email Security, AAA, Cloud Security, Security Consult.
- āļāļĢāļīāļŦāļēāļĢāļāļąāļāļāļēāļĢāđāļāļĢāļāļāļēāļĢāļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļŠāļēāļĢāļŠāļāđāļāļĻ.
- āļĢāđāļ§āļĄāļāļąāļāļāļēāļĢāļ°āļāļāļāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāđāļēāļāļŠāļēāļĢāļŠāļāđāļāļĻ āļĢāļ°āļāļāļāđāļēāļ āđ āļāđāļēāļ IOT / āļĢāļ°āļāļ Email / āļĢāļ°āļāļāļāđāļāļāļāļąāļāđāļ§āļĢāļąāļŠ.
- āđāļŦāđāļāļģāđāļāļ°āļāļģāļĢāļ°āļāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāđāļēāļāļŠāļēāļĢāļŠāļāđāļāļĻāļ āļēāļĒāđāļ āđāļĨāļ°āļ āļēāļĒāļāļāļāđāļāđāļŦāļāđāļ§āļĒāļāļēāļāļāđāļēāļ āđ āļāļĢāđāļāļĄāļāļąāļāļāļģāļāļđāđāļĄāļ·āļ āđāļĨāļ°āļāļķāļāļāļāļĢāļĄāļāļĩāļĄāļāļēāļ āđāļĨāļ°āļāļđāđāđāļāđāļāļēāļ.
- āļāļĢāļ°āļŠāļēāļāļāļēāļ āđāļŦāđāļāļģāļāļĢāļķāļāļĐāļē āđāļĨāļ°āđāļāļ°āļāļģāļĢāļ°āļāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļŠāļēāļĢāļŠāļāđāļāļĻāđāļŦāđāļāļąāļāļāļāļąāļāļāļēāļ āđāļĨāļ°āļāļđāđāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļāļēāļāļāļ·āđāļ āđ āļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒ.
- āļ§āļļāļāļīāļāļēāļĢāļĻāļķāļāļĐāļē: āļāļĢāļīāļāļāļēāļāļĢāļĩ āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļĻāļēāļŠāļāļĢāđ / āļ§āļīāļāļĒāļēāļĻāļēāļŠāļāļĢāđ āļāļāļĄāļāļīāļ§āđāļāļāļĢāđ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļ·āđāļ āđ āļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāļģāļāļēāļ: 5 - 10 āļāļĩ.
- āļĄāļĩāļāļąāļāļĐāļ°āļāļēāļĢāļŠāļ·āđāļāļŠāļēāļĢ āļ§āļēāļāđāļāļ āđāļĨāļ°āđāļāļĢāļāļēāļāđāļāļĢāļāļ.
āļāļąāļāļĐāļ°:
Negotiation
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Bachelor degree or higher in Computer Science or related filed.
- There are 5-8 years, Experience in Network skills.
- Able to do network design, evaluation, POC, implementation.
- Self-Motivation and Hard Working.
- Able to work some time on night and weekend by job duties.
- Able to troubleshooting related to network problem & connecting equipment.
- Willing to self-study for network knowledge and learn new knowledge from team.
- Good communication,interpersonal, problem-solving, presentation, and negotiation skill.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŋ12,000 - āļŋ15,000, āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļĢāļīāļāļēāļĢāđāļāļĢāļ·āđāļāļāļāļ·āđāļĄāđāļŦāđāļāļąāļāļĨāļđāļāļāđāļē.
- āļāļđāđāļĨāļāļ§āļēāļĄāļŠāļ°āļāļēāļāđāļĢāļĩāļĒāļāļĢāđāļāļĒāļ āļēāļĒāđāļāļŠāļēāļāļē.
- āļāļĢāļ§āļāļāļąāļāļŠāļāđāļāļāļŠāļīāļāļāđāļēāļ āļēāļĒāđāļāļĢāđāļēāļ.
- āļāļēāļāļāļ·āđāļ āđ āļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒ.
- āđāļāđāļēāļŦāļāđāļēāļāļĩāđāļāđāļāļāļāļąāļāļāļēāļĢāļŠāļđāļāđāļŠāļĩāļĒ LP.
- āļāļđāđāļĨāļĢāļąāļāļĐāļēāļāļĨāļāļĢāļ°āđāļĒāļāļāđāđāļŦāđāļāļāļāļāļĢāļīāļĐāļąāļ āđāļĨāļ°āļāļĢāļ§āļāļŠāļāļāļāļĢāļąāļāļĒāđāļŠāļīāļāļāđāļāļāļāļąāļāļāļēāļĢāļŠāļđāļāļŦāļēāļĒ āļāļĢāļīāļŦāļēāļĢāļāđāļēāđāļāđāļāđāļēāļĒāļāļēāļĢāļŠāļąāđāļāļāļ·āđāļāļāļļāļāļāļĢāļāđ āļāđāļēāļāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ āļāļ§āļāļāļļāļĄāļāļđāđāļĨāļāļēāļĢāļāļāļīāļāļąāļāļīāļāļēāļāļāļāļāļāļāļąāļāļāļēāļ āļĢāļąāļāļĐāļēāļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒ āļāļđāđāļĨāļāļģāļāļēāļĒāļāļ§āļēāļĄāļŠāļ°āļāļ§āļāđāļĨāļ°āļāļ§āļēāļĄāļāļĨāļāļāļ āļąāļĒāļāļąāļāļĨāļđāļāļāđāļēāļāļĩāđāđāļāđāļēāļĄāļēāđāļāđāļāļĢāļīāļāļēāļĢ āļāļģāđāļāļīāļāļāļēāļĢ āļŠāļ·āļāļŠāļ§āļ āļŠāļāļāļŠāļ§āļ āļāļąāļāļāļļāļĄ āļāđāļāļāļāļĢāļēāļĄ āļāļēāļĢāļāļļāļāļĢāļīāļāļ āļēāļĒāđāļāļāļĢāļīāļĐāļąāļāļŊ āļāļąāļ§āđāļāļāļāļĢāļīāļĐāļąāļāļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļŦāļāđāļ§āļĒāļāļēāļāļĢāļēāļāļāļēāļĢāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āđāļĨāļ°āļāļēāļĢāđāļĢāļĩāļĒāļāļĢāđāļāļāļŠāļīāļāđāļŦāļĄāļāļāđāļāļāļāļēāļĄāļāļĢāļĄāļāļĢāļĢāļĄāđāļāļĢāļ°āļāļąāļāļ āļąāļĒ āļŦāļąāļ§āļŦāļāđāļēāļāļĩāļĄ FIRE MAN āđāļĨāļ° āđāļāđāļāđāļĨāļāļēāļāļļāļāļēāļĢāļāļāļ°āļāļĢāļĢāļĄāļāļēāļĢ āļāļāļ. āļāļģāļŦāļāđāļēāļāļĩāđ Duty āđāļāļīāļāļĢāđāļēāļāđāļāļ·āđāļāđāļāļĢāļĩāļĒāļĄāļāļ§āļēāļĄāļāļĢāđāļāļĄāđāļāļāļēāļĢāđāļāļīāļāđāļŦāđāļāļĢāļīāļāļēāļĢāļĨāļđāļāļāđāļē.
āļāļąāļāļĐāļ°:
Research, System Administration, Android
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Implements IT security improvements by assessing current situation; evaluating trends; anticipating requirements.
- Protects IT system by defining access privileges, control structures, and required resources.
- Process & analyze to gain insights on past IT areas on, current or potential attacks and threats that pose a risk to the organization.
- Primary point of contact with Internal Audit. Periodically review, update, implement and communicate changes to IT policies and procedures and General IT Controls. Facilitate internal and external audit processes by participating in scoping discussions and walk-throughs, delivering evidence that controls are operating as defined, remediating deficiencies, and acting on recommendations.
- Safeguards IT infrastructure and system as well as information system assets by identifying and solving potential and actual security problems.
- Research cyber security topics and promote Cyber security awareness throughout Thaioil.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Relevant experience, especially in IT working environment.
- Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
- Hands-on experience analyzing high volumes of logs, network data (e.g., Netflow, FPC), and other attack artifacts in support of incident investigations.
- Experience with vulnerability scanning solutions.
- Familiarity with Vulnerability Management program.
- Proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture, Host-Based Forensics, Network Forensics, and RSA Security.
- Have knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform.
- Understanding of mobile technology and OS (i.e., Android, iOS, Windows), VMware technology, and Unix and basic Unix commands.
- OTHER REQUIREMENTS.
āļāļąāļāļĐāļ°:
Express
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Apply a learning mindset and take ownership for your own development.
- Appreciate diverse perspectives, needs, and feelings of others.
- Adopt habits to sustain high performance and develop your potential.
- Actively listen, ask questions to check understanding, and clearly express ideas.
- Seek, reflect, act on, and give feedback.
- Gather information from a range of sources to analyse facts and discern patterns.
- Commit to understanding how the business works and building commercial awareness.
- Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Agile Methodology, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Framework, Cybersecurity Policy, Cybersecurity Requirements, Cybersecurity Strategy, Emotional Regulation, Empathy, Encryption Technologies, Inclusion, Intellectual Curiosity, Managed Services, Optimism, Privacy Compliance, Regulatory Response, Security Architecture, Security Compliance Management, Security Control, Security Incident Management, Security Monitoring {+ 3 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
āļāļąāļāļĐāļ°:
Project Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Responsible for the protection of Celestica assets and to respond to alarms, emergency situations and to assist employees with security issue as part of our mission to provide a safe work environment.
- Responsible for maintaining appropriate access to all areas of the facility for both employees and customers.
- Controlling daily security operations including incident investigation, property passes, loss prevention, and all administrative duties required at the site.
- Knowledge/Skills/Competencies.
- In-depth knowledge of facilities management and operations.
- Understanding of environmental, health and safety regulations (local and government).
- Good organization and project management skills.
- Ability to evaluate, diagnose and troubleshoot problems.
- Ability to gather and analyze data and determine root cause of problems.
- Ability to effectively communicate with a variety of internal and external customers.
- Typical Experience.
- Two to Four years relevant experience.
- Typical Education.
- Bachelor's degree in a related field, or an equivalent combination of education and experience.
- Educational requirements may vary by geography.
- Notes.
- This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
- Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
- At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.
- Celestica (NYSE, TSX: CLS) enables the world s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
- Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
- Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
3 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Compliance, Legal, Risk Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Develop data security policy review, data security policy exceptions, and control risk mitigation processes.
- Define the security controls for access management lifecycle (i.e., requirement for creation, deletion, transfer and review).
- Operate:Advice on technology relating to Data Privacy and Protection (i.e., PDPA) related security controls implementation.
- Drive and support data security controls such as Data Loss Prevention (DLP), Data Masking, Data Encryption capabilities to protect sensitive data.
- Drive compliance (or collaborate with compliance team) to organization security policies, standards, metrics, and legal requirements.
- Communicate and enforce security policies, rules, and standards.
- Conduct impact assessment of data initiatives from a security point of view.
- Ensure the cryptographic keys and related components are safety and protection of confidential information.
- Resolve data security audit and risk findings.
- Review and develop security controls to current access controls policies and procedures.
- Provide requirements for create and manage roles, access rights (includes privileged access), authentication and identity within the environment.
- Conduct periodic review of user access.
- Review, approve and monitor the usage of privileged access.
- EDUCATION.
- Bachelor s degree in computer science, Information Systems, or equivalent education or work experience.
- EXPERIENCE.
- Work experience in privacy, compliance, information security, auditing or a related field may also be an accepted alternative, according to Cybersecurity.
- Minimum 3 years of experience in and strong knowledge of privacy, data, operational risk management, information security, or related areas in IT.
- OTHER REQUIREMENTS.
āļāļąāļāļĐāļ°:
Project Management
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Responsible for the protection of Celestica assets and to respond to alarms, emergency situations and to assist employees with security issue as part of our mission to provide a safe work environment.
- Responsible for maintaining appropriate access to all areas of the facility for both employees and customers.
- Controlling daily security operations including incident investigation, property passes, loss prevention, and all administrative duties required at the site.
- Knowledge/Skills/Competencies.
- In-depth knowledge of facilities management and operations.
- Understanding of environmental, health and safety regulations (local and government).
- Good organization and project management skills.
- Ability to evaluate, diagnose and troubleshoot problems.
- Ability to gather and analyze data and determine root cause of problems.
- Ability to effectively communicate with a variety of internal and external customers.
- Typical Experience.
- Two to Four years relevant experience.
- Typical Education.
- Bachelor's degree in a related field, or an equivalent combination of education and experience.
- Educational requirements may vary by geography.
- Notes.
- This job description is not intended to be an exhaustive list of all duties and responsibilities of the position. Employees are held accountable for all duties of the job. Job duties and the % of time identified for any function are subject to change at any time.
- Celestica is an equal opportunity employer. All qualified applicants will receive consideration for employment and will not be discriminated against on any protected status (including race, religion, national origin, gender, sexual orientation, age, marital status, veteran or disability status or other characteristics protected by law).
- At Celestica we are committed to fostering an inclusive, accessible environment, where all employees and customers feel valued, respected and supported. Special arrangements can be made for candidates who need it throughout the hiring process. Please indicate your needs and we will work with you to meet them.
- Celestica (NYSE, TSX: CLS) enables the world s best brands. Through our recognized customer-centric approach, we partner with leading companies in Aerospace and Defense, Communications, Enterprise, HealthTech, Industrial, Capital Equipment and Energy to deliver solutions for their most complex challenges. As a leader in design, manufacturing, hardware platform and supply chain solutions, Celestica brings global expertise and insight at every stage of product development - from drawing board to full-scale production and after-market services for products from advanced medical devices, to highly engineered aviation systems, to next-generation hardware platform solutions for the Cloud. Headquartered in Toronto, with talented teams spanning 40+ locations in 13 countries across the Americas, Europe and Asia, we imagine, develop and deliver a better future with our customers.
- Celestica would like to thank all applicants, however, only qualified applicants will be contacted.
- Celestica does not accept unsolicited resumes from recruitment agencies or fee based recruitment services.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Compliance, ISO 27001, Legal
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design and implement a cybersecurity strategy that aligns with the organization's overall business objectives.
- Conduct regular security risk assessments, vulnerability assessments, and penetration testing to evaluate the organization s cyber defenses; subsequently, develop and implement security risk mitigation strategies and programs.
- Lead and coordinate response efforts in the event of security incidents, overseeing investigation, mitigation, and post-incident analysis.
- Compliance & Regulatory Management.
- Ensure adherence to relevant laws, regulations, and standards (e.g., PDPA).
- Implement and lead initiatives for security and compliance audit certifications, including ISO 27001, NIST, the Cyber Resilience Assessment Framework (C-RAF), and other applicable standards and best practices.
- Recommend, implement, and manage continuous monitoring of IT security systems and tools.
- Collaborate with legal and data protection teams to establish policies and safeguards for sensitive and personal data.
- IT Governance.
- Establish and maintain an IT governance framework, policies, and processes that align with the organization s business goals while ensuring compliance with legal, regulatory, corporate, and industry requirements.
- Work in partnership with management, legal, finance, and external auditors to promote transparency and alignment in governance practices.
- Generate and present reports on IT governance performance, compliance status, and the risk landscape to stakeholders.
- Data Governance.
- Develop and implement data governance policies that ensure data quality, security, and compliance.
- Manage the data lifecycle, align data strategies with business objectives, and collaborate with cross-functional teams to enhance data integrity.
- Oversee data stewardship, regulatory compliance, and provide best practices for data management to support effective decision-making.
- Team Leadership and Development.
- Lead and mentor a small team of IT governance, compliance, and security professionals.
- Foster a culture of continuous improvement and knowledge sharing within the team and across business units.
- Bachelor s or Master s degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- A minimum of 5 years of experience in IT governance, cybersecurity, and compliance, with at least 2 years in a managerial role.
- Strong understanding of IT governance frameworks (e.g., ITIL, COBIT), cybersecurity standards (e.g., ISO 27001, NIST), and regulatory requirements (e.g., PDPA).
- Possession of basic IT governance and cybersecurity certifications (e.g., CISSP, CISM) is advantageous.
- Proficient in common technical team/project management tools (e.g., JIRA, Asana, Github). Collaborative team player with strong interpersonal skills, capable of working effectively with both internal and external teams.
- Working-level fluency in English and Thai. Proficient in English equivalent to IELTS 5.5, CEFR B2, or TOEFL 72; excellent spoken and written communication to effectively work with a global management team.
- Familiarity with local regulatory bodies (e.g., OIC, SEC, BOT) is a plus.
- Experience in the insurance industry will be an added advantage.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
DevOps, Automation, Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
- A dedicated DevSecOps or security engineering team is responsible for embedding security practices into the DevOps pipeline. They build and maintain the security tools and automation required for integrating security checks into the development process.
- Implement security tools in CI/CD pipelines (e.g., code scanning, vulnerability assessments).
- Automate security testing, monitoring, and compliance checks.
- Collaborate with development and operations teams to ensure security is applied at every stage.
- Designing, supervising, and validating holistic Banking application/infrastructure security architecture, to ensure that they are aligned with cybersecurity strategy, security requirement principle and generally cybersecurity best practices (through threat modelling or similar methods).
- Designing and Implementing CI/CD (DevSecOps) Technology integration through own teams and virtual team (with the members of Digital Technology Security team) to always tighten security architecture fabrics, and to support cybersecurity transformation, lean and automation process.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 5 years of experience in security advisory, security architecture, CI/CD security, Vulnerability Assessment, Penetration test or a related field.
- Good communication skills, with the ability to communicate complex security issues.
- Strong Knowledge in new Banking Technology and associated security controls.
- Knowledge of security best practices in software development.
- Knowledge of SDLC framework.
- Familiarity with CI/CD tools & DevOps tools.
- Experience with Code/Library/Image scanning tools (Dynamic/Static Code Scan).
- Expertise in cloud security (AWS, Azure, GCP, HWC).
- Experience with cloud security and compliance tools (CSPM).
- Knowledge of Securing Cloud Environments to ensure that security practices are tailored for cloud-native and hybrid environments, including container security, infrastructure as code, and microservices security.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
1 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Compliance
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Invite and provide evidence-based feedback in a timely and constructive manner.
- Share and collaborate effectively with others.
- Work with existing processes/systems whilst making constructive suggestions for improvements.
- Validate data and analysis for accuracy and relevance.
- Follow risk management and compliance procedures.
- Keep up-to-date with technical developments for business area.
- Communicate confidently in a clear, concise and articulate manner - verbally and in written form.
- Seek opportunities to learn about other cultures and other parts of the business across the Network of PwC firms.
- Uphold the firm's code of ethics and business conduct.
- referred skills.
- Cyber Security and Data Privacy.
- Minimum years experience required.
- 1-3 years of Experiences.
- Additional application instructions.
- N/A.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- Yes
- Government Clearance Required?.
- No
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Research, ISO 27001, Enthusiastic, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Collect and analyze threat intelligence reports covering new threats, vulnerabilities, products.
- Conduct technical and operational threat intelligence research, both independently and as part of a wider team.
- Identify emerging threats, techniques and trends, the means of protecting or defending against them, and articulate these in a range of report formats to relevant stakeholders.
- Conduct deep-level analysis of malware, including how it is developed, functions, and employed.
- Support the Consulting and Managed CTI teams, Vulnerability Management, Incident Response and CSOC team with up-to-date technical intelligence, detection logic and situational awareness on current and emerging threats.
- Support Cybersecurity Posture Management to guarantee that a good cybersecurity posture is consistently maintained at an acceptable level. Liaison with external audit, internal audit, financial crime and associated consultants, and the group firm.
- Assist technology security team leaders/others in responding to cybersecurity incidents that have an impact on cybersecurity posture, in order to guarantee quick reaction, tracking, and proper maintenance.
- Assist in R&D and innovation on cybersecurity technology and approaches for continuous cybersecurity uplift.
- Qualifications Bachelor s or Master degree in computer science, Computer Engineering, Information Technology, or related field.
- At least 5 years of experience in Information Security or a related field.
- Knowledge of security technology e.g. WAF, SIEM, EDR, IAM, CSOC and Vulnerability Management.
- Experience in cloud cybersecurity technologies and services.
- Exposure to malware reverse engineering, network intrusion analysis, host intrusion analysis, log analysis, vulnerability research or digital forensics is preferred.
- Strong understanding of industry best practices and standards, including ISO 27001, NIST, and CIS is preferred.
- Relevant certifications such as CISSP, CISM, or CISA are a plus.
- Excellent communication and problem-analytical skills, with the ability to communicate complex security issues to non-technical stakeholders.
- Effective English for verbal, written communication.
- Enthusiastic, thriving, good interpersonal skills.
- We're committed to bringing passion and customer focus to the business. If you like wild growth and working with happy, enthusiastic over-achievers, you'll enjoy your career with us.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Compliance, Excel
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Assist in the planning, execution, and monitoring of projects.
- Utilise strong critical thinking and problem solving skills day to day.
- Collaborate with team members to ensure project deliverables are met on time and within scope.
- Prepare and maintain project documentation, including reports, presentations, and meeting minutes.
- Quickly adapt to changing priorities and project requirements.
- Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment.
- Proactively identify and address potential issues or roadblocks to ensure smooth project execution.
- Work with other NIS teams both locally, regionally and globally to deliver the security needs specific to the firm.
- Support work in vulnerability management and compliance activities.
- Handles BAU activities such as managing security exceptions.
- Help the business comply with the Information Security Policy by leveraging your cyber security knowledge and expertise.
- Collaborate with PwC IT and global team to align security process and tools.
- Guide and support the business team to complete all required security reviews.
- Build knowledge on application security to effectively support security assessments.
- Align with different global and local teams to identify and fix gaps or risk found.
- Other.
- Help with daily security incident handling.
- Help to manage junior staff, eg. interns.
- An effective CISO pillar candidate will also possess the following skills/ Requirements.
- Able to work in a fast-paced environment, can upskill quickly and learn proactively.
- Analytical: Inquisitive nature and intuition regarding what questions to ask, when, and their relative significance.
- Technical: Broad understanding of security technology.
- Business: High level understanding of PwC s business model, service offerings, and business operating environment as it pertains to the firm s threat landscape. Ability to frame threats and exposures in a business context recognized by non-technical staff and executives.
- Individuals selected for this role are expected to have both extensive knowledge and managerial know-how related to the following aspects: Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment.
- Understanding of technical and non-technical information security risks.
- Have skills to analyse data and visualise data (good to have knowledge of Excel, PowerPoint etc.).
- Good written and effective communicator to deal with various stakeholders.
- Meticulous and possesses an eye for details.
- Proactive, keen to learn, enjoys solving challenging problems, thinking outside of the box.
- Diligent and open to feedback.
- Experience in a role balanced between business stakeholders and a central service organization.
- Possess knowledge about application security to effectively support security assessments.
- Time and Task Management: Ability to prioritise risk, manage a variety of take, take ownership to drive completion of activities and deliver on time.
- Interest in Information Security.
- Bachelor s or master s degree (technical degree) or equivalent Industry certification.
- Desired Certifications: (Certifications aren t a prerequisite however are well regarded).
- Education Level: Undergraduate Degree (e.g. BIT, BSc) STEM or equivalent work experience: 1-2 years of progressive professional roles involving information security, computer science and/or other technical background.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Accepting Feedback, Accepting Feedback, Active Listening, Communication, Computer Engineering, Computer Program Installation, Computer Programming, Computer Technical Support, Emotional Regulation, Empathy, Enterprise Architecture, Incident Management and Resolution (IMR), Inclusion, Information and Communications Technology (ICT), Intellectual Curiosity, IT Infrastructure Upgrades, IT Operations, IT Operations Management, IT Project Lifecycle, IT Support, IT Troubleshooting, Object-Oriented Programming (OOP), Optimism, Scripting Languages, Security Protocol Analysis {+ 6 more}Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Available for Work Visa Sponsorship?.
- Government Clearance Required?.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
7 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Sales, Procurement, Legal, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Bachelor's degree or equivalent practical experience.
- 7 years of experience in a business role in the enterprise software or cloud space.
- Experience promoting to the clients in the enterprise cybersecurity or IT field.
- Ability to communicate in English and Thai fluently to interact with regional customers.
- Ability to travel for business and trainings.
- Preferred qualifications:Experience in supporting executive relationships, and developing territories/accounts from scratch, while ensuring customer success, adoption and expansion.
- Experience in prioritizing, planning, and organizing solution-based business activity within business cycles, including qualifying high value accounts and leveraging our partner ecosystem.
- Experience working with internal/external teams, including account, technical leads, procurement, and legal, to inventory existing software estate, build business cases for transformation with implementation plans, and close agreements.
- Experience in carrying and exceeding business goals in a business role.
- Knowledge of market trends, products, and solutions in Cloud and cybersecurity.
- Excellent negotiation, problem-solving, communication and presentation skills.
- In this role, you will help us grow our cybersecurity business by building and expanding relationships with new and existing customers. You will work with customers to deliver business value, demonstrate product functionality, and provide an overview of business use cases. You will lead day-to-day relationships with cross-functional team members and external customers, leading with empathy, while identifying ways to multiply the impact and the impact of the team as a whole to motivate overall value for Google Cloud.
- Google Cloud accelerates every organization's ability to digitally transform its business and industry. We deliver enterprise-grade solutions that leverage Google's cutting-edge technology, and tools that help developers build more sustainably. Customers in more than 200 countries and territories turn to Google Cloud as their trusted partner to enable growth and solve their most critical business problems.
- ResponsibilitiesBuild relationships with customers as a subject matter expert and trusted advisor, managing business cycles, identifying solution use cases, and influencing direction of accounts.
- Deliver against quota and achieve business and growth goals while forecasting and reporting your territory's business.
- Work with Google accounts and cross-functional teams (e.g., Customer Engineering, Marketing, Customer Success, Product, Engineering, Channels) to develop go-to-market strategies, motivate pipeline and business growth, close agreements, understand customer, and provide excellent prospect and customer experience.
- Construct and execute a territory development plan.
- Work with multiple customers and opportunities, understand each customer's technology footprint and strategy, growth plans, business motivators, participants, and how they can transform their business using our technologies.
- Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See alsoGoogle's EEO Policy andEEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing ourAccommodations for Applicants form.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Risk Management, Project Management, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Oversee the planning, execution, and monitoring of security-related projects.
- Coordinate with cross-functional teams to ensure successful project delivery.
- Develop project plans, schedules, and budgets, and track progress against established objectives.
- Communicate project status, risks, and issues to relevant stakeholders.
- Identify, assess, and prioritize security risks across the organization.
- Develop and implement risk mitigation strategies and controls.
- Monitor and report on the effectiveness of risk management activities.
- Collaborate with stakeholders to ensure a consistent approach to risk management across the organization.
- Develop, review, and maintain security policies, standards, and procedures.
- Ensure alignment with regulatory requirements and industry best practices.
- Collaborate with stakeholders to promote the adoption and enforcement of security policies and standards.
- Provide guidance and support to the organization in the interpretation and implementation of security policies and procedures.
- Effectively communicate security issues and concerns to the technology team.
- Collaborate with the technology team to develop and implement solutions to address identified security issues.
- Provide ongoing support and guidance to the technology team regarding security best practices and risk mitigation.
- Foster a strong working relationship between the security governance function and the technology team to promote a culture of security awareness and collaboration.
- Positive, can-do attitude, who naturally expresses a high degree of empathy to others.
- Bachelor s degree in Information Security, Computer Science, or a related field.
- A minimum of 5 years of experience in information security, with a focus on security governance.
- Professional certifications such as CISSP, CISM, or CRISC are preferred.
- Strong understanding of information security principles, frameworks, and best practices.
- Experience in audit management, risk assessment, and policy development.
- Excellent project management and organizational skills.
- Strong communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams and communicate complex security issues in a clear and concise manner.
- Demonstrated ability to work independently and deliver results under tight deadlines.
- Talent to identify and create a broad vision for a security solution and to execute it.
- Systems Thinking - the ability to see how parts interact with the whole (big picture thinking).
- Proven experience of acting as an expert in project teams.
- Ability to explain your thoughts or findings also to non- technical professionals.
- Good command in written and spoken Thai and English language.
- Location: True Digital Park, Punnawithi.
āļāļąāļāļĐāļ°:
Compliance, Risk Management, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Oversees and controls the implementation of the standards, policies and guidelines related to the topics within the scope of HSR and ensure compliance with local regulations. Identify areas of improvements and initiate projects to strengthen these topics in the countries assigned.
- Develops and maintains strategic, sustainable and effective working relationships with the stakeholders in each country, including external and internal stakeholders up to Country Leadership level and Regional functions.
- Oversee the execution of global and regional strategic projects related to Health, Safety (Offices) and Security in each country.
- Coordinates the response to potentially high impact events in each country, i.e. Emergency Management, Crisis Management, Threat Management, Duty of Care.
- Designated SHE Manager for the Bangkok office.
- Professionally represents the HSR department, engaging with each country/site leadership regarding policies, projects, risks and high impact situations.
- What makes you a good fit.
- Bachelor's degree in a related field is required.
- With a minimum of 6 years' work experience in the field of Safety, Security, Health, and Risk Management.
- Knowledgeable in conducting site security assessments and liaising with different businesses.
- Good stakeholder management skills and able to interact with corporate teams, country executive committees, and site managers.
- Regional exposure is preferred.
- Strong proficiency in English and the local language is required.
- Some perks of joining Henkel.
- Flexible work scheme with flexible hours, hybrid work model, and work from anywhere policy for up to 30 days per year.
- Diverse national and international growth opportunities.
- Globally wellbeing standards with health and preventive care programs.
- Gender-neutral parental leave for a minimum of 8 weeks.
- Employee Share Plan with voluntary investment and Henkel matching shares.
- Medical Coverage for employees and eligible dependents.
- Provident Fund.
- Annual Physical Examination for employees.
- Discounts on company products.
- At Henkel, we come from a broad range of backgrounds, perspectives, and life experiences. We believe the uniqueness of all our employees is the power in us. Become part of the team and bring your uniqueness to us! We welcome all applications across different genders, origins, cultures, religions, sexual orientations, disabilities, and generations.
- 1
- 2
- 3
- 4
- 5
- 6
- 8
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2025
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ