通过电子邮件获得新工作
- We are seeking an experienced IT Security Project Manager to lead and oversee a range of security-related initiatives across infrastructure, cloud, and application environments. This role involves managing end-to-end project lifecycles, coordinating with external serv...
- ...ate to join our Hong Kong Branch. Responsibilities: Co-head with the IT Risk & Compliance Lead to oversee the Information Technology Risk Management (“TRM”), IT regulatory and security projects Develop, review, update the IT SOPs, policies and procedures ...
- ...nge of Hong Kong Limited on 3 April 2007. It is an Internet-oriented telecommunication... ...nal teams to achieve the goals of network security and data privacy protection Provide pr... ...sk control and protect network quality Manage the collection of information security in...
- Job Responsibilities ~ Manage system servers and network devices assets, configure ... ...infrastructure needs. ~ Coordinate with IT vendors and users on IT infrastructure pr... ...ponents to ensure the system versions and security level are maintained. ~ Comply with Sec...
- Position Summary We are seeking a seasoned IT Security Manager with approximately 10 years of experience in cybersecurity, particularly in the design, implementation, and maintenance of security controls across application, platform, and cloud environments. The ide...
- ...ogy Services Office (ITSO) is responsible for developing and managing the IT infrastructure of the University, and championing the wise u... ...ointee should possess strong technical skills in information security technologies including system hardening, identity and access...
- ...ns: Information Technology Responsibilities: Assisting QA Manager in determining, negotiating and agreeing in-house quality / test... ...ter Science or related discipline. Some working experience in IT, in particular a good understanding of the workflow of system de...
- Job Duties: Develop and enforce IT security standards, guidelines, and procedures Plan, design, and implement cybersecurity solu... ...nd response to IT system audit Handle IT security incident management Coordinate and deliver security training or share relevant...
- ...luding investigation and documentation of security breaches Implement and maintain securi... ...mitigation strategies Collaborate with IT, compliance, and operational teams to ens... ...gagements with third-party audit firms Manage and monitor security tools such as firewa...
- ... a financial listed company and become an IT consultancy and support provider with a v... ...vide advisory Career development in IT security and privacy stream with prospects and fle... ... between internal parties and clients and manage client relationship and expectation. O...
- ...97 27/F, Bonham Circus, 40 Bonham Strand, Sheung Wan, Hong Kong Tel: 2111 3766 Fax: 3007 1947 Job Description: # Conduct IT security audits on systems, from planning to post-audit review and preparing reports # Review relevant documentations and perform penet...
- ...n. Shiji has completed three successful transformations since its establishment. It is now experiencing the 4th transformation ... ...on, maintenance, and continual improvement of the Information Security Management System (ISMS) in alignment with ISO/IEC 27001 requirements. ...