āđ€āļ‡āļ·āđˆāļ­āļ™āđ„āļ‚āļāļēāļĢāļ„āđ‰āļ™āļŦāļē

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāđƒāļŠāđ‰āļ„āļģāļŦāļĨāļąāļ

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļŦāļĄāļ§āļ”āļŦāļĄāļđāđˆāļ‡āļēāļ™

āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļ›āļĢāļ°āđ€āļ āļ—āļ˜āļļāļĢāļāļīāļˆ

āđ€āļĨāļ·āļ­āļāļ›āļĢāļ°āđ€āļ āļ—āļ˜āļļāļĢāļāļīāļˆ

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļŠāđˆāļ§āļ‡āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™

āļ•āļąāđ‰āļ‡āđāļ•āđˆ
āļ–āļķāļ‡

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļŠāļ·āđˆāļ­āļšāļĢāļīāļĐāļąāļ—

āļžāļīāļĄāļžāđŒāļŠāļ·āđˆāļ­āļšāļĢāļīāļĐāļąāļ—

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļĢāļ°āļ”āļąāļšāļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™

āļ„āđ‰āļ™āļŦāļēāđ‚āļ”āļĒāļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™

āđāļŠāļ”āļ‡āļœāļĨ 1 - 20 āļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™ āļˆāļēāļāļ—āļąāđ‰āļ‡āļŦāļĄāļ” 26 āļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™
āđƒāļ™āļŦāļĄāļ§āļ”āļŦāļĄāļđāđˆāļ‡āļēāļ™āļ”āđ‰āļēāļ™ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ
Upload ResumeUpload Resume
āļ­āļąāļžāđ‚āļŦāļĨāļ”āđ€āļĢāļ‹āļđāđ€āļĄāđˆāļ‚āļ­āļ‡āļ„āļļāļ“ AI āļ‚āļ­āļ‡āđ€āļĢāļēāļˆāļ°āļ§āļīāđ€āļ„āļĢāļēāļ°āļŦāđŒāđāļĨāļ°āđāļ™āļ°āļ™āļģāļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™āļ—āļĩāđˆāļ”āļĩāļ—āļĩāđˆāļŠāļļāļ”āđƒāļŦāđ‰āļ„āļļāļ“
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļŸāļēāļŠāļ•āđŒāđ€āļ§āļīāļĢāđŒāļ„ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 1
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļŸāļēāļŠāļ•āđŒāđ€āļ§āļīāļĢāđŒāļ„ āđ€āļ—āļ„āđ‚āļ™āđ‚āļĨāļĒāļĩāļŠāđŒ āļˆāļģāļāļąāļ” 1

āļ—āļąāļāļĐāļ°:

Risk Management, Software Development, Kubernetes

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Design, develop, and maintain security systems, tools, and best practices across the stack (frontend, backend, mobile, and infrastructure).
  • Identify, assess, and mitigate security vulnerabilities through proactive risk management and threat modeling.
  • Collaborate with product managers and developers to embed security into the software development lifecycle (SDLC).
1 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļīāļ—āļ„āļąāļš āļ­āļ­āļ™āđ„āļĨāļ™āđŒ 2
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļīāļ—āļ„āļąāļš āļ­āļ­āļ™āđ„āļĨāļ™āđŒ 2
āļ„āļĨāļ­āļ‡āđ€āļ•āļĒ, āļāļĢāļļāļ‡āđ€āļ—āļž, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ—āļąāļāļĐāļ°:

Compliance, Automation, Risk Management

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Lead and enhance security operations, mentoring team members and implementing advanced security strategies.
  • Architect and enforce security frameworks for IT systems, networks, and cloud environments.
  • Monitor, detect, and respond to cyber threats, conducting forensic investigations and post-incident analysis.
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 3
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 3

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

4 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Compliance, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Establish and maintain IT security standards and guidelines in compliance with the security regulations from regulators, and the security best practices, that governs new technology adoption.
  • Advise business units and technology group on how to comply with IT security policy, standards, guidelines and best practices.
  • Keep abreast of the knowledge in cybersecurity, new digital technology.
1 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ‚āļ­āļŠāļ–āļŠāļ āļē 4
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ‚āļ­āļŠāļ–āļŠāļ āļē 4
āļšāļēāļ‡āļāļ°āļ›āļī, āļāļĢāļļāļ‡āđ€āļ—āļž, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ—āļąāļāļĐāļ°:

Compliance, Software Development, Finance

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Lead the development and implementation of IT governance, risk, and compliance (GRC) policies and procedures. Conduct risk assessments and develop mitigation strategies to ensure IT operations comply with internal policies and regulatory requirements.
  • Oversee the entire SDLC process, ensuring that software development projects meet quality standards.
  • Implement ITIL best practices to improve IT service management. Monitor and optimize IT service delivery processes, including incident management, problem management, a ...
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļļāļāļĢāļ­āļ”āļšāļĢāļīāļ§āđ€āļ§āļ­āļĢāļĩāđˆ 5
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļļāļāļĢāļ­āļ”āļšāļĢāļīāļ§āđ€āļ§āļ­āļĢāļĩāđˆ 5

āļ—āļąāļāļĐāļ°:

System Security

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • āļ”āļđāđāļĨ āļ§āļēāļ‡āđāļœāļ™ āđāļĨāļ°āļ­āļ­āļāđāļšāļš āļĢāļ°āļšāļšāļĢāļąāļāļĐāļēāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļŠāļēāļĢāļŠāļ™āđ€āļ—āļĻ āđ€āļŠāđˆāļ™ Firewall, VPN, Email Security, AAA, Cloud Security, Security Consult.
  • āļšāļĢāļīāļŦāļēāļĢāļˆāļąāļ”āļāļēāļĢāđ‚āļ„āļĢāļ‡āļāļēāļĢāļ”āđ‰āļēāļ™āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļŠāļēāļĢāļŠāļ™āđ€āļ—āļĻ.
  • āļĢāđˆāļ§āļĄāļžāļąāļ’āļ™āļēāļĢāļ°āļšāļšāļ‡āļēāļ™āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒāļ”āđ‰āļēāļ™āļŠāļēāļĢāļŠāļ™āđ€āļ—āļĻ āļĢāļ°āļšāļšāļ•āđˆāļēāļ‡ āđ† āļ”āđ‰āļēāļ™ IOT / āļĢāļ°āļšāļš Email / āļĢāļ°āļšāļšāļ›āđ‰āļ­āļ‡āļāļąāļ™āđ„āļ§āļĢāļąāļŠ.
2 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 6
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 6

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

5 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

DevOps, Automation, Compliance

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Fulfill tasks of cybersecurity vulnerability management program, i.e. cyberthreat intelligence analysis, cybersecurity assessment, vulnerability profiling, vulnerability compensation and vulnerability remediation tracking.
  • A dedicated DevSecOps or security engineering team is responsible for embedding security practices into the DevOps pipeline. They build and maintain the security tools and automation required for integrating security checks into the development process.
3 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ‚āļ­āļŠāļ–āļŠāļ āļē 7
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ‚āļ­āļŠāļ–āļŠāļ āļē 7
āļšāļēāļ‡āļāļ°āļ›āļī, āļāļĢāļļāļ‡āđ€āļ—āļž, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ

āļ—āļąāļāļĐāļ°:

Compliance, Analytical Thinking, Automation

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Design, implement, and manage security controls for cloud environments (AWS, Azure, Google Cloud).
  • Perform risk assessments and vulnerability management for cloud-based assets.
  • Monitor cloud resources to detect and respond to security incidents.
āļ§āļąāļ™āļ™āļĩāđ‰
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āļ‹āļĩāļžāļĩ āđāļ­āđ‡āļāļ‹āđŒāļ•āļĢāđ‰āļē āļˆāļģāļāļąāļ” āļĄāļŦāļēāļŠāļ™ āđāļĄāđ‡āļ„āđ‚āļ„āļĢ 8
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āļ‹āļĩāļžāļĩ āđāļ­āđ‡āļāļ‹āđŒāļ•āļĢāđ‰āļē āļˆāļģāļāļąāļ” āļĄāļŦāļēāļŠāļ™ āđāļĄāđ‡āļ„āđ‚āļ„āļĢ 8

āļ—āļąāļāļĐāļ°:

Project Management, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Coordinated to remediation cybersecurity incidents and coordinated to provide cybersecurity services.
  • Excellent communication (Thai and English) skill to co-operation with application team, infra team and subsidiaries team.
  • Project / service tracking to ensure tasks assignments will be completed within timeline.
7 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđāļ­āļ„āđ€āļ‹āļ™āđ€āļˆāļ­āļĢāđŒ 9
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđāļ­āļ„āđ€āļ‹āļ™āđ€āļˆāļ­āļĢāđŒ 9

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Web Application Penetration Testing Lead (Specialist - Manager).
  • Home Country: Thailand.
  • Critical Success Factors.
9 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ­āļīāļ™āļŠāđŒāļ— āđāļ­āļ™āļ”āđŒ āļĒāļąāļ‡ 10
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ€āļ­āļīāļ™āļŠāđŒāļ— āđāļ­āļ™āļ”āđŒ āļĒāļąāļ‡ 10
āļāļĢāļļāļ‡āđ€āļ—āļž, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ ,āļāļēāļĢāļˆāļąāļ”āļāļēāļĢ ,āļ—āļĩāđˆāļ›āļĢāļķāļāļĐāļē āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ,āļāļēāļĢāļˆāļąāļ”āļāļēāļĢ,āļ—āļĩāđˆāļ›āļĢāļķāļāļĐāļē

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

1 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

DevOps, Automation, Electrical Engineering

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Equipped with security knowledge and done related projects in technical IT domains such as operating systems, networks, databases, cloud or solution development etc.
  • Possess knowledge in assessing solution architectures at the planning and design level for security issues and vulnerabilities.
  • Experience in practical security vulnerability remediation.
6 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
Upload ResumeUpload Resume
āļ­āļąāļžāđ‚āļŦāļĨāļ”āđ€āļĢāļ‹āļđāđ€āļĄāđˆāļ‚āļ­āļ‡āļ„āļļāļ“ AI āļ‚āļ­āļ‡āđ€āļĢāļēāļˆāļ°āļ§āļīāđ€āļ„āļĢāļēāļ°āļŦāđŒāđāļĨāļ°āđāļ™āļ°āļ™āļģāļ•āļģāđāļŦāļ™āđˆāļ‡āļ‡āļēāļ™āļ—āļĩāđˆāļ”āļĩāļ—āļĩāđˆāļŠāļļāļ”āđƒāļŦāđ‰āļ„āļļāļ“
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļžāļĩāļ—āļĩāļˆāļĩ 11
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļžāļĩāļ—āļĩāļˆāļĩ 11

āļ—āļąāļāļĐāļ°:

Negotiation

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Bachelor degree or higher in Computer Science or related filed.
  • There are 5-8 years, Experience in Network skills.
  • Able to do network design, evaluation, POC, implementation.
3 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ 12
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ‹āļĩāđ„āļ­āđ€āļ­āđ‡āļĄāļšāļĩ 12

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

3 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Accounting, Legal, Financial Analysis, Risk Management, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŋ60,000 - āļŋ80,000

  • Conduct an investigation of any matter, value or size at its sole discretion according to the Fraud Risk policy, to assist the Audit Committee / Board of Directors in obtaining the assurance it requires regarding the identified gaps, internal control deficiencies, modus operandi employed and the extent and impact of such fraudulent activities to the CIMB Thai Bank Group.
  • Prepare and deliver timely and informative investigation reports in English to an agreed quality standard.
17 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 13
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 13

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

1 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Risk Management, Compliance, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Invite and provide evidence-based feedback in a timely and constructive manner.
  • Share and collaborate effectively with others.
  • Work with existing processes/systems whilst making constructive suggestions for improvements.
4 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ›āļ•āļ— āļŠāļģāļĢāļ§āļˆāđāļĨāļ°āļœāļĨāļīāļ•āļ›āļīāđ‚āļ•āļĢāđ€āļĨāļĩāļĒāļĄ āļˆāļģāļāļąāļ” āļĄāļŦāļēāļŠāļ™ 14
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļ›āļ•āļ— āļŠāļģāļĢāļ§āļˆāđāļĨāļ°āļœāļĨāļīāļ•āļ›āļīāđ‚āļ•āļĢāđ€āļĨāļĩāļĒāļĄ āļˆāļģāļāļąāļ” āļĄāļŦāļēāļŠāļ™ 14

āļ—āļąāļāļĐāļ°:

Procurement, Safety Management, Compliance, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Provide strategic planning and analysis for building management and security operations in the assigned scopes. The scope of responsibilities are include but not limit to:Overall planning and implement for improve building operations and facilities management i.e. the preventive and corrective maintenance program, efficient utility usage and alternative energy etc.
  • Lead and advise MEP system for building and office renovation, operation and maintenance (O&M) for 4 sites under department responsibility.
3 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 15
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 15

āļ—āļąāļāļĐāļ°:

Linux, Good Communication Skills, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Conduct advanced penetration tests to identify vulnerabilities in computer systems, networks, and applications.
  • Perform vulnerability assessments and security audits to evaluate the effectiveness of existing security measures.
  • Develop and execute simulated cyber-attacks to assess the organization s readiness to defend against real-world threats.
3 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 16
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļžāļēāļ“āļīāļŠāļĒāđŒ 16

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

5 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Research, ISO 27001, Enthusiastic, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Collect and analyze threat intelligence reports covering new threats, vulnerabilities, products.
  • Conduct technical and operational threat intelligence research, both independently and as part of a wider team.
  • Identify emerging threats, techniques and trends, the means of protecting or defending against them, and articulate these in a range of report formats to relevant stakeholders.
3 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 17
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđāļ­āļŠāđ€āļ‹āļ™āļ”āđŒ āļāļĢāļļāđŠāļ› āļˆāļģāļāļąāļ” 17

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

5 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Risk Management, Project Management, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Oversee the planning, execution, and monitoring of security-related projects.
  • Coordinate with cross-functional teams to ensure successful project delivery.
  • Develop project plans, schedules, and budgets, and track progress against established objectives.
2 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļ­āļ­āļĒāļĨāđŒ 18
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āđ„āļ—āļĒāļ­āļ­āļĒāļĨāđŒ 18
āļĻāļĢāļĩāļĢāļēāļŠāļē, āļŠāļĨāļšāļļāļĢāļĩ, āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ ,āļāļĨāļĒāļļāļ—āļ˜āđŒ / āļ§āļēāļ‡āđāļœāļ™ āļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ,āļāļĨāļĒāļļāļ—āļ˜āđŒ / āļ§āļēāļ‡āđāļœāļ™

āļ—āļąāļāļĐāļ°:

Sharepoint, English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Could have experience to develop information in Microsoft SharePoint 3-5 Years.
  • Could have experience quality-control would be more assist.
  • Have experience in Thai Oil Service would be more assist.
2 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 19
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 19

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

7 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

English

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Encourage everyone to have a voice and invite opinion from all, including quieter members of the team.
  • Deal effectively with ambiguous and unstructured problems and situations.
  • Initiate open and candid coaching conversations at all levels.
1 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 20
āļŦāļēāļ‡āļēāļ™ āļŠāļĄāļąāļ„āļĢāļ‡āļēāļ™ āļšāļĢāļīāļĐāļąāļ— āđ„āļžāļĢāđ‰āļ‹āļ§āļ­āđ€āļ•āļ­āļĢāđŒāđ€āļŪāļēāļŠāđŒāļ„āļđāđ€āļ›āļ­āļĢāđŒāļŠ āļ„āļ­āļ™āļ‹āļąāļĨāļ•āļīāđ‰āļ‡ āļ›āļĢāļ°āđ€āļ—āļĻāđ„āļ—āļĒ āļˆāļģāļāļąāļ” 20

āļ›āļĢāļ°āļŠāļšāļāļēāļĢāļ“āđŒ:

1 āļ›āļĩāļ‚āļķāđ‰āļ™āđ„āļ›

āļ—āļąāļāļĐāļ°:

Risk Management, Compliance

āļ›āļĢāļ°āđ€āļ āļ—āļ‡āļēāļ™:

āļ‡āļēāļ™āļ›āļĢāļ°āļˆāļģ

āđ€āļ‡āļīāļ™āđ€āļ”āļ·āļ­āļ™:

āļŠāļēāļĄāļēāļĢāļ–āļ•āđˆāļ­āļĢāļ­āļ‡āđ„āļ”āđ‰

  • Invite and provide evidence-based feedback in a timely and constructive manner.
  • Share and collaborate effectively with others.
  • Work with existing processes/systems whilst making constructive suggestions for improvements.
1 āļ§āļąāļ™āļ—āļĩāđˆāļœāđˆāļēāļ™āļĄāļē
āļ”āļđāđ€āļžāļīāđˆāļĄāđ€āļ•āļīāļĄkeyboard_arrow_down
āļŠāđˆāļ‡āđāļˆāđ‰āļ‡āđ€āļ•āļ·āļ­āļ™āļ‡āļēāļ™āđƒāļŦāļĄāđˆāļĨāđˆāļēāļŠāļļāļ”āļŠāļģāļŦāļĢāļąāļšāļ„āļ§āļēāļĄāļ›āļĨāļ­āļ”āļ āļąāļĒ
  • 1
  • 2