- No elements found. Consider changing the search query.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
3 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
ETL, SQL, NoSQL, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design, implement, and manage end-to-end data pipelines architectures.
- Configure and maintain data ingest workflows (ETL) across several production systems.
- Transform data into Data Mart, Data Model that can be easily analyzed.
- Ensure the data is correct and is in a highly usable state by the time and good performance.
- Hands-on development mentality, with a willingness to troubleshoot and solve complex problems.
- Ensure compliance with data governance and security policies.
- Bachelor s Degree or higher in Computer Science, Information Technology, Computer Engineering, or related field.
- Minimum 3 years of work experience in Data engineer.
- Strong SQL Command and knowledge on Non-SQL tools and languages.
- Experience in ETL tools & Data Model such as SSIS, SSAS.
- Experience working on Big Data platform is advantage.
- Experience in cloud platform such as AWS, GCP.
- Ability to develop Python, R is advantage.
- Good business understanding, able to identify business problems, formulate business goals, and find relevant data.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
3 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Legal, Compliance, Problem Solving, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Design and work on Cybersecurity framework based on business objectives and strategic imperatives of the client organization including goals, vision, mission, and operational plans.
- Designing and implementing data protection and privacy programs for our clients and supporting their business.
- Evaluating the data protection and privacy practices of our clients and Conducting Privacy Impact Assessments.
- Monitor processes and drive improvements in efficiency and quality of cyber-security programs.
- Assist in development of workflows for transitioning strategic plans into implementation plans and operational readiness.
- Facilitate strategic planning initiatives, documentation, technical roadmaps and security tool rationalization.
- Assist in designing the security organization structure including cyber defense.
- Develop security policies, procedures, standards based on the security strategy and roadmap.
- Review of cyber security policies and processes to identify gaps in design of control based on comprehensive assessment framework.
- Maintain continuous communication with key stakeholders in support of the security strategy, and plan and solicit feedbacks, to uplift the programs and capabilities.
- Conduct security process implementation reviews to assess security effectiveness and reporting.
- Conduct Current State Assessment of cyber security practices against the defined controls and provide recommendations for to-be state.
- Run cyber security diagnostic assessments and develop programs for Cybersecurity skill development and enhancement.
- Implement security controls for realization of the certification requirements and provide technology roadmap based on the security strategy.
- Assisting in delivering privacy projects to acting as a subject matter expert on them or to leading a team towards excellent client experience.
- Supporting and guiding our clients in adhering to the complex web of relevant national and international regulations (e.g. EU General Data Protection Regulation, PDPA and etc.).
- Deploying processes and tools to help detect and prevent privacy breaches.
- Ensuring a harmonized approach towards data protection and privacy by bringing together our client s stakeholders (e.g. legal, compliance, risk, HR, security, business functions ).
- Assisting clients in privacy related incident response activities.
- Supporting the client s team by acting as an interim team member (e.g. data protection officer, security officer, security manager, security analyst ).
- Proactively identifying and pursuing opportunities for further business and team growth.
- Preferred skills.
- At least three years of experience in cyber-security.
- Bachelor s degree in Computer Engineering, Computer Science, Information Systems or a related field.
- Have knowledge of industry standard classification schemes, such as ISO 27000, NIST. GDPR, TH PDPA, PCI DSS, Data Loss Prevention etc.
- Have demonstrated self leadership, problem solving, including verbal and written communication skills. You need to be able to communicate clearly in both Thai and English.
- Have proven analytical, decision-making, and presentation skills.
- Have a high level of MS Office proficiency.
- Be able to work both independently and as part of a team with professionals at all levels.
- Education (if blank, degree and/or field of study not specified).
- Degrees/Field of Study required: Bachelor Degree Degrees/Field of Study preferred:Certifications (if blank, certifications not specified).
- Required Skills.
- Optional Skills.
- Desired Languages (If blank, desired languages not specified).
- Travel Requirements.
- Not Specified
- Available for Work Visa Sponsorship?.
- No
- Government Clearance Required?.
- No
- Job Posting End Date.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
3 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Budgeting, AutoCAD, Civil Engineering, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļāļāđāļāļāđāļĨāļ°āļāļĢāļ°āđāļĄāļīāļāļāļąāļāļāļģ BOQ āļĢāļēāļāļēāļāļēāļāļāđāļāļŠāļĢāđāļēāļ.
- āļāļīāļāļāļĢāļīāļĄāļēāļāļ§āļąāļŠāļāļļāđāļāļ·āđāļāļāļēāļāļāļąāļāļāļ·āđāļāļ§āļąāļŠāļāļļāđāļāļāļēāļāļāđāļāļŠāļĢāđāļēāļ.
- āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāđāļēāļĒāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āđāļāļ·āđāļāļāļąāļāļāļģāļāļāļāļĢāļ°āļĄāļēāļāļŠāļģāļŦāļĢāļąāļāļāļĢāļ°āļĄāļđāļĨāļāļēāļāļāđāļāļŠāļĢāđāļēāļ.
- āļāļīāļāļāđāļāđāļĨāļ°āļāļĢāļ°āļŠāļēāļāļāļēāļāļāļąāļāļāļđāđāļĢāļąāļāđāļŦāļĄāļēāđāļāļ·āđāļāļŠāļĢāļļāļāļĢāļēāļāļēāļāļēāļāđāļāļīāđāļĄ-āļĨāļ.
- āđāļāļĢāļĩāļĒāļāđāļāļĩāļĒāļāļĢāļēāļāļēāļ§āļąāļŠāļāļļ āđāļĨāļ°āļĢāļēāļāļēāļāļēāļāļāđāļāļŠāļĢāđāļēāļ.
- āļāļĢāļ§āļāļŠāļāļāđāļāļāļŠāļēāļĢāļāļēāļāļāļąāļāļāļ·āđāļ-āļāļąāļāļāđāļēāļ āđāļŦāđāđāļāđāļāđāļāļāļēāļĄāļĢāļēāļāļēāļāļĨāļēāļāļāļāļāļāļĢāļīāļĐāļąāļ.
- āļāļąāļāļāļģāļĢāļēāļĒāļāļēāļāļāđāļēāļāđ āļŦāļĢāļ·āļāļāļąāļāļāļģ Presentations āļāđāļēāļāļāļāļāļĢāļ°āļĄāļēāļ āđāļŦāđāļāļđāđāļāļĢāļīāļŦāļēāļĢāļāļąāļāļŠāļīāļāđāļ.
- āļāļēāļāļāļ·āđāļāđ āļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒāļāļēāļāļāļđāđāļāļąāļāļāļąāļāļāļąāļāļāļē.
- āļāļāļāļēāļĢāļĻāļķāļāļĐāļēāļĢāļ°āļāļąāļāļāļĢāļīāļāļāļēāļāļĢāļĩāļŦāļĢāļ·āļāļŠāļđāļāļāļ§āđāļē āļŠāļēāļāļēāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāđāļĒāļāļē āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāļāđāļēāļāļāļēāļāļāļĢāļ°āļĄāļēāļāļĢāļēāļāļēāļāļĒāđāļēāļāļāđāļāļĒ 3-5 āļāļĩ āļāļķāđāļāđāļāļāļ°āļāļīāļāļēāļĢāļāļēāđāļāđāļāļāļīāđāļĻāļĐ.
- āļĄāļĩāļāļ§āļēāļĄāļŠāļāđāļāļāļēāļĢāļāļāļāđāļāļāļāļĢāļ°āļĄāļēāļāļĢāļēāļāļē āļāļģāļāļāļāļĢāļ°āļĄāļēāļ āļāļ§āļāļāļļāļĄāļāđāļāļāļļāļāļāđāļāļŠāļĢāđāļēāļ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļąāļāļāļīāļāļāļāļ āļĄāļĩāļāļ§āļēāļĄāļāļāļāļāļŠāļđāļ āļĄāļĩāđāļŦāļ§āļāļĢāļīāļāļāļĩ āļŠāļēāļĄāļēāļĢāļāļāļĢāļąāļāļāļąāļ§ āđāļĨāļ°āļŠāļāđāļāđāļĢāļĩāļĒāļāļĢāļđāđāļŠāļīāđāļāđāļŦāļĄāđāđ āđāļāđāļāļĩ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļđāđāļāđāļēāļāđāļāļāđāļēāļāļāļēāļāļāđāļāļŠāļĢāđāļēāļ āļĄāļĩāļāļąāļāļĐāļ°āļāđāļēāļāļāļēāļĢāļāļĢāļīāļŦāļēāļĢāļāļēāļāļāđāļāļŠāļĢāđāļēāļ.
- āļŠāļēāļĄāļēāļĢāļāļāļģāļāļēāļāđāļāđāļāļāļĩāļĄāđāļāđāļāļĩ.
- āļŠāļēāļĄāļēāļĢāļāđāļāđ MS. Excel, AutoCAD āđāļāđāđāļāđāļāļāļĒāđāļēāļāļāļĩ.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
2 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
AutoCAD, Project Management, Safety Management, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- āļāļāļāđāļāļāļĢāļ°āļāļāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļŠāļļāļāļēāļ āļīāļāļēāļĨāđāļĨāļ°āļāļąāļāđāļāļĨāļīāļ āđāļāļ·āđāļāđāļŦāđāļāļēāļāļēāļĢāļŠāļēāļĄāļēāļĢāļāđāļāđāļāļēāļāļĢāļ°āļāļāđāļāđāļāļĒāđāļēāļāļĄāļĩāļāļĢāļ°āļŠāļīāļāļāļīāļ āļēāļ āļāļĢāļ°āļŦāļĒāļąāļāļāļĨāļąāļāļāļēāļ āļāđāļēāļĒāļāđāļāļāļēāļĢāļāļđāđāļĨāļĢāļąāļāļĐāļēāđāļĨāļ°āļāļĢāļ°āļŦāļĒāļąāļāļāđāļēāđāļāđāļāđāļēāļĒāđāļāļāļēāļĢāļāđāļāļĄāļāļģāļĢāļļāļ āļĢāļ°āļāļāļĄāļĩāļāļ§āļēāļĄāđāļŠāļāļĩāļĒāļĢāļĄāļąāđāļāļāļāđāļĨāļ°āļāļĨāļāļāļ āļąāļĒ āļāļđāļāļāđāļāļāļāļēāļĄāļĄāļēāļāļĢāļāļēāļāđāļĨāļ°āļāļāļŦāļĄāļēāļĒāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļāļĢāļ°āļāļļāļĄāđāļĨāļ°āļāļĢāļ°āļŠāļēāļāļāļēāļāļāđāļēāļāļāļēāļĢāļāļāļāđāļāļ āļāļąāļāļāļđāđāļāļāļāđāļāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āđāļĨāļ°āļāļđāđāļāļĢāļīāļŦāļēāļĢāđāļĨāļ°āļāļ§āļāļāļļāļĄāđāļāļĢāļāļāļēāļĢāđāļĨāļ°āļāļđāđāļĢāļąāļāđāļŦāļĄāļē āđāļĨāļ°āļāđāļēāļĒāļāļąāļāļāļ·āđāļ.
- āļāļēāļāļāļ·āđāļāđ āļāļēāļĄāļāļĩāđāđāļāđāļĢāļąāļāļĄāļāļāļŦāļĄāļēāļĒ.
- āļāļĢāļīāļāļāļēāļāļĢāļĩ āļŠāļēāļāļē āļ§āļīāļĻāļ§āļāļĢāļĢāļĄāļŠāļīāđāļāđāļ§āļāļĨāđāļāļĄ āļŦāļĢāļ·āļāļŠāļēāļāļēāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ.
- āļĄāļĩāļāļĢāļ°āļŠāļāļāļēāļĢāļāđāđāļāļāļēāļĢāļāļģāļāļēāļāļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļāļāļĒāđāļēāļāļāđāļāļĒ 2-10 āļāļĩ āļāļķāđāļāđāļ āļāđāļēāļāļāļāļāđāļāļāđāļĨāļ°āļāļ§āļāļāļļāļĄāļāļēāļāļĢāļ°āļāļāļŠāļļāļāļēāļ āļīāļāļēāļĨāđāļĨāļ°āļāļąāļāđāļāļĨāļīāļ.
- āļĄāļĩāļāļ§āļēāļĄāļĢāļāļāļĢāļđāđāđāļāļŠāđāļ§āļāļāļēāļāļĢāļ°āļāļāļāļĢāļ°āļāļāļāļāļēāļāļēāļĢāļāļ·āđāļāđ āļāļĩāđāđāļāļĩāđāļĒāļ§āļāđāļāļ āļĄāļĩāļāļ§āļēāļĄāđāļāđāļēāđāļāļĢāļ°āļāļāļāļēāļāļāđāļāļŠāļĢāđāļēāļ.
- āļĄāļĩāļāļąāļāļĐāļ°āđāļāļāļēāļĢāđāļāđāđāļāļĢāđāļāļĢāļĄ AutoCAD āđāļāļĩāļĒāļāđāļāļāļ§āļīāļĻāļ§āļāļĢāļĢāļĄāđāļāđāđāļāđāļāļāļĒāđāļēāļāļāļĩ.
- āļĄāļĩāļāļąāļāļĐāļ°āļāļĢāļ§āļāļŠāļāļāđāļāļāļāļēāļāļĢāļ°āļāļāļ§āļīāļĻāļ§āļāļĢāļĢāļĄ.
- āļŠāļēāļĄāļēāļĢāļāļŠāļ·āđāļāļŠāļēāļĢāļ āļēāļĐāļēāļāļąāļāļāļĪāļĐāđāļāđ.
āļāļĢāļ°āļŠāļāļāļēāļĢāļāđ:
5 āļāļĩāļāļķāđāļāđāļ
āļāļąāļāļĐāļ°:
Java, MongoDB, NoSQL, English
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- You have a good understanding of Object-Oriented Programming concepts.
- You have experience working on Distributed Systems / Microservices.
- You should be able to produce clean, efficient code based on specifications.
- You will be working with an existing product.
- Knowledge of and adherence to best practices for writing maintainable code and unit-testing is a must.
- You possess analytical and problem-solving skills.
- You should be able to work independently as a contributing member in a high-paced and focused team.
- Bachelor's Degree in Computer Science or Information Technology, or equivalent experience.
- At least five years of experience writing programs in C#.NET Framework or Java.
- At least two years of experience working with MongoDB or other NoSQL databases.
- Able to learn and understand various API services.
- Self-motivated, eager to solve problems, driven to completion, and willing to work with others. We encourage pair programming and require collaboration on design, code reviews, and testing.
- A hybrid engineer, capable of designing and implementing your own code as well as reviewing, testing, and writing test automation for other engineers' code.
- Enjoys exploring new technologies and programming techniques, with a "willing to learn" attitude.
- Fluent in written and spoken English.
- This role is open for both Thai and non-Thai candidates. We can provide full VISA sponsorship if required.
āļāļąāļāļĐāļ°:
Computer Security, System Administration, UNIX
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Experience and subject matter expertise in one or more of the following specialties: incident response, systems administration, disaster recovery, business continuity, computer forensics and/or network security.
- Experience managing technical security projects either as a consultant or internal security practitioner.
- A thorough understanding of network protocols, network devices, computer security devices, secure architecture & system administration in support of computer forensics ...
- Significant hands-on experience with hardware/software tools used in incident response, computer forensics, network security assessments, and/or application security.
- Experience with assessing and developing enterprise-wide policies and procedures for IT risk mitigation and incident response.
- Experience in Windows, Mac, and Unix operating systems.
- Required Technical and Professional Expertise
- Concepts and Communication Demonstrated ability to work with and advise senior and executive level clients regarding strategic and tactical processes of Incident Response, staying professional and communicating clearly under pressure.
- Advanced understanding of information security governance concepts, including ability to gauge maturity level of an organisation's incident response program by against best practices as well as by applying practical knowledge of attacker methodologies, attack lifecycle, Cyber Kill Chain, etc.
- Ability to communicate technical findings & concepts to key stakeholders.
- Operational Technology Experience working with-in Operational Technology environments that have a safety-first focus.
- Demonstrate an understanding of the key differences between IT versus OT environments and be able to articulate best practices on how to secure each.
- Understanding of OT Security industry best practices and guidelines such as NIST 800-82, ISA/IEC 62443, and PERA.
- Familiarity with regional laws and regulations regarding critical infrastructure and OT Security.
- Experience with OT-focused security tooling such as Nozomi Networks, Claroty, Tenable.OT, Armis, or Dragos.
- Able to analyse common industrial network protocols (Modbus, Profinet, EtherNet/IP, etc).
- Familiarity with common ICS vendors (Honeywell, Schneider Electric, Yokogawa etc.) and their products, network architectures, and equipment.
- Digital Forensics & Incident Response Ability to forensically analyse both Windows & Unix systems for evidence of compromise.
- Proficiency with commercial and open source forensic tools such as EnCase, X-Ways, and Sleuthkit.
- Skills and experience with cloud DFIR.
- Proficient in writing cohesive reports for a technical and non-technical audience.
- Experience hunting threat actors in large enterprise networks and cloud environments.
- Experience with using and configuring Endpoint Detection & Response (EDR) tools.
- Preferred Technical and Professional Expertise
- Network Forensics Experience performing log analysis locally and via SIEM/log aggregation tool.
- Analyse and/or decipher packet captures from network protocol analysers (Wireshark, TCPdump, etc).
- Demonstrate an understanding of the behaviour, security risks and controls of common network protocols.
- Demonstrate an understanding of common applications used in Windows and Linux enterprise environment. Familiarity with Active Directory, Exchange and Office365 applications and logs.
- Familarity with the tools and techniques required to analyse & reverse diverse protocols and data traversing a network environment.
- Remediation services Experience acting as a trusted advisor throughout the IR process.
- Advise clients on best practice whilst providing a sounding board during risk-based decisions.
- Track record of success in an incident management role using project management.
- Ability to lead teams comprised of customer staff and staff from competing service providers.
- Proactive services Examine and analyse available client internal policies, processes, and procedures to determine patterns and gaps at both a strategic and tactical levels. Recommend appropriate course of action to support maturing the client s incident response program and cyber security posture.
- A strong familiarity with various security frameworks and standards and applicable data privacy laws and regulations.
- Demonstrated experience with planning, scoping, and delivering technical and/or executive level tabletop exercises, with a focus on either tactical or strategic incident response processes. Ability to incorporate current trends and develop custom scenarios applicable to a client.
- Diverse understanding of cyber security related vulnerabilities, common attack vectors, and mitigations.
- Capable of developing strategic level incident response plans as well as tactical-focused playbooks.
- Proven experience managing tasks and coordinating work streams during incident response.
- DevSecOpsLow-level operating system knowledge, including automation and performing administrative tasks.
- Scripting or programming experience, preferably in a language commonly used for DFIR such as Python or PowerShell.
- Ability to work with data at scale such as using Splunk / ELK.
- Expertise working with shell programs such as grep, sed and awk to process data quickly.
- Working experience with virtualisation and cloud technology platforms like IBM Cloud, AWS, GCP, & Azure.
- OT Security One or more security certificationsOT IDS tool such as Nozomi Networks, Claroty, Tenable.OT, Armis, or Dragos.
- SANS GIAC or ISA99/IEC-62443 Cybersecurity.
- Experience in designing / engineering control systems.
- About Business UnitIBM Consulting is IBM s consulting and global professional services business, with market leading capabilities in business and technology transformation. With deep expertise in many industries, we offer strategy, experience, technology, and operations services to many of the most innovative and valuable companies in the world. Our people are focused on accelerating our clients businesses through the power of collaboration. We believe in the power of technology responsibly used to help people, partners and the planet.
- Your Life @ IBMIn a world where technology never stands still, we understand that, dedication to our clients success, innovation that matters, and trust and personal responsibility in all our relationships, lives in what we do as IBMers as we strive to be the catalyst that makes the world work better. Being an IBMer means you ll be able to learn and develop yourself and your career, you ll be encouraged to be courageous and experiment everyday, all whilst having continuous trust and support in an environment where everyone can thrive whatever their personal or professional background.
- Our IBMers are growth minded, always staying curious, open to feedback and learning new information and skills to constantly transform themselves and our company. They are trusted to provide on-going feedback to help other IBMers grow, as well as collaborate with colleagues keeping in mind a team focused approach to include different perspectives to drive exceptional outcomes for our customers. The courage our IBMers have to make critical decisions everyday is essential to IBM becoming the catalyst for progress, always embracing challenges with resources they have to hand, a can-do attitude and always striving for an outcome focused approach within everything that they do.
- Are you ready to be an IBMer?.
- About IBMIBM's greatest invention is the IBMer. We believe that through the application of intelligence, reason and science, we can improve business, society and the human condition, bringing the power of an open hybrid cloud and AI strategy to life for our clients and partners around the world.
- Restlessly reinventing since 1911, we are not only one of the largest corporate organizations in the world, we re also one of the biggest technology and consulting employers, with many of the Fortune 50 companies relying on the IBM Cloud to run their business.
- At IBM, we pride ourselves on being an early adopter of artificial intelligence, quantum computing and blockchain. Now it s time for you to join us on our journey to being a responsible technology innovator and a force for good in the world.
- Location StatementFor additional information about location requirements, please discuss with the recruiter following submission of your application.
- Being You @ IBMIBM is committed to creating a diverse environment and is proud to be an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, gender, gender identity or expression, sexual orientation, national origin, caste, genetics, pregnancy, disability, neurodivergence, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.
āļāļĢāļ°āđāļ āļāļāļēāļ:
āļāļēāļāļāļĢāļ°āļāļģ
āđāļāļīāļāđāļāļ·āļāļ:
āļŠāļēāļĄāļēāļĢāļāļāđāļāļĢāļāļāđāļāđ
- Who We Are Boston Consulting Group partners with leaders in business and society to tackle their most important challenges and capture their greatest opportunities. BCG was the pioneer in business strategy when it was founded in 1963. Today, we help clients with total transformation-inspiring complex change, enabling organizations to grow, building competitive advantage, and driving bottom-line impact.To succeed, organizations must blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change ...
- About BCG Platinion.
- BCG Platinion s presence spans across the globe, with offices in Asia, Europe, and South and North America. We achieve digital excellence for clients with sustained solutions to the most complex and time-sensitive challenge. We guide clients into the future to push the status quo, overcome tech limitations, and enable our clients to go further in their digital journeys than what has ever been possible in the past. At BCG Platinion, we deliver business value through the innovative use of technology at a rapid pace. We roll up our sleeves to transform business, revolutionize approaches, satisfy customers, and change the game through Architecture, Cybersecurity, Digital Transformation, Enterprise Application and Risk functions. We balance vision with a pragmatic path to change transforming strategies into leading-edge tech platforms, at scale.
- We are looking for experienced Technology Consultants (Architecture) to further grow BCG's thought leadership, capabilities and enablement. These are exciting opportunities to apply a strategic problem-solving lens to your passion for technology, digital and innovation.* Work cohesively with hybrid case teams consisting of BCG/DigitalBCG on general IT, digital/technology transformation projects* Provide technology advisory services to clients across various industry sectors* Align business and technology strategies to deliver impactful insights and outcomes jointly with client management* Assess current state technology landscape, define target state and develop transition roadmaps* Assist, define and drive implementation of technical architectures and proof of concepts* Design innovative technology solutions across various projects/clients to solve complex business problems* Analyse complex and high-risk IT solutions, often coupled with optimization of the full software delivery lifecycle* Facilitate workshops with clients to identify and formulate business and IT requirements for key vendor/system selections or innovation topics* Drive innovation for our clients by leveraging cross-industry views on technology trends* Actively network, manage and influence multiple client and stakeholder relationship groups including senior executives.What You'll Bring.
- 3-6 years' experience in a strategy, management or technology consultancy and/or industry* Experience working within an architecture domain (solutions, applications or big data)* Understanding of architecture principles and exposure to architecting modern data platforms* Broad generalist digital/technology skills and knowledge* Good understanding of emerging digital/tech topics and trends across various industries* Thrive in a hypothesis-based environment and ability to frame strategic challenges from a digital/tech perspective* Strong analytical skills, problem solving ability and conceptual thinking* Excellent communication, storylining, client facing and consulting skills* Strategic mindset, presence and gravitas* Minimum of a bachelor's degree preferably in an IT/Computer Science, Engineering or related discipline* Flexibility to travel within SEA/Asia Pacific region (once restrictions allow).Boston Consulting Group is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, age, religion, sex, sexual orientation, gender identity / expression, national origin, disability, protected veteran status, or any other characteristic protected under national, provincial, or local law, where applicable, and those with criminal histories will be considered in a manner consistent with applicable state and local laws.
- BCG is an E - Verify Employer. Click here for more information on E-Verify.
- 1
āļĒāļāļāļāļīāļĒāļĄ
āļĨāļāļāļāļģ 5 āļŠāļīāđāļāļāļĩāđāļŦāļĨāļąāļāđāļĨāļīāļāļāļēāļ āļāļĩāļ§āļīāļāļāļļāļāļāļ°āđāļāļĨāļĩāđāļĒāļāđāļāļāļĨāļāļāļāļēāļĨ
āļāļģāđāļāļ°āļāļģāļāđāļēāļāļāļēāļāļĩāļāļāļĢāļīāļĐāļąāļ 7 āđāļāļāļāļĩāđāļāļļāļāđāļĄāđāļāļ§āļĢāļāļģāļāļēāļāļāđāļ§āļĒ
āļāļģāđāļāļ°āļāļģāļāļēāļĢāļŦāļēāļāļēāļāđāļāļīāļāđāļāļĨāļŠāļļāļāļĒāļāļ 50 āļāļĢāļīāļĐāļąāļāļāļĩāđāļāļāļĢāļļāđāļāđāļŦāļĄāđāļāļĒāļēāļāļĢāđāļ§āļĄāļāļēāļāļāđāļ§āļĒāļĄāļēāļāļāļĩāđāļŠāļļāļ 2024
āļāđāļēāļ§āļŠāļēāļĢāđāļŦāļĄāđāđ