通过电子邮件获得新工作
- ...bove in computer science or relevant studies Experience in Information System Policies, Standards, and Frameworks Experience in C... ...nce Candidates with Relevant certifications in information security (e.g., CISM, CISA, CISSP, ITIL, ISO27001 LA) will be an advan...
- Job Purpose: Assist Head of Information Security to ensure adequate and effective controls are in place. Main Responsibilities: Support security tools including network firewall, DLP, SIEM, vulnerability scanning, micro-segmentation Review the firewall rule ch...
- ...pecializing in wealth management. Develop and implement IT security control reviews and settings for banking systems to ensure ap... ...ies in IT infrastructure and systems, and assist in preparing information security audit Review the security tasks in related to IT ...
- Job Description: ~ Support and maintain Information Security Management System (ISMS) in accordance with the standard of ISO 27001 ~ Ensure the accuracy of the ISMS documentation, develop and maintain information security policies, processes and procedures, design ...
- Job Purpose: Reporting to the Head of Information Security to support delivering information security services and carrying out information security related activities. Job Description of the position: • Conduct cyber security testing covering penetration test,...
- ...latory and governance posture. Main Responsibilities Security Policy & Governance: ~ Develop, implement and maintain poli... ...cation: A bachelor's degree / diploma in computer science, information technology, or a related field is often preferred. Possess...
- Job Purpose This role involves the security policy and governance, security operation, infrastructure security monitoring, cert... ...ty Policy and Governance: ~ Develop, implement and maintain information security policies and procedures, and security configuration ...
- ...uro and RMB; interbank money settlement of equity and debt securities transactions in Hong Kong via the linkages with the Hong Kong... ...date to take up the following job position. Specialist I (Information Security) Major Responsibilities Participate in the de...
- ... personal data provided by job applicants will be used for recruitment purposes only in accordance with the Bank’s Personal Data Information Collection Statement, a copy of which is available on our website: Please send your application DIRECTLY to Fubon Bank (Hong ...
- ...here to learn more about our Benefits ( , Culture ( & Career Development ( Responsibilities: Conduct security risk assessment and prepare report on information security, AI Security, third-party security, Outsourcing services. Deliver initiatives to ensure compl...
- SECURITY ANALYST Join our global Cybersecurity Operations team as a Security Analyst and play a critical role in defending our digital ... ...s. Qualifications & Experience: Bachelor’s degree in information systems, Computer Science, a related field, or equivalent p...
- ... Assist with day-to-day support and basic maintenance of security infrastructure and access control systems Participate in r... ... analysis Requirements: ~ Degree holder or above in Information Technology/ Computer Science or equivalent ~0–2 years of ex...
- ...ent purposes only in accordance with the Bank’s Personal Data Information Collection Statement, a copy of which is available on our web... ... system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...ir continued growth in their business, they are now looking for an experienced Senior Manager (VP level) - Information Technology (Network & Information Security) to join their firm, specializing in corporate finance, capital markets, and cross-border investments in th...
- ...rface for ID administration with customers Responsible for security operations, such as account reviews, account administration, ... ...larly in Excel (e.g. xlookup) and Word ~ Basic knowledge in Information Security Management ~ Good analytical mind and communicatio...
- ~Shape the Future of Security ~Grow Your Career in Insurance/ Financial sector About Our Client This organization is a large ... ... Assessments: Conduct comprehensive risk assessments covering information security, AI security, third-party vendors, and outsourced se...
- Job Duties: Develop and enforce IT security standards, guidelines, and procedures ... ...ver security training or share relevant information with company staff to promote security ... ...ese ~ Candidate with less experience would be considered as Security Analyst ~
- ...onse activities, including investigation and documentation of security breaches Implement and maintain security controls and solu... ...e should have / be: Bachelor’s degree in computer science, Information Security or a related field Professional certifications su...
- ...s Limited (SEHK:1883), is comprehensive Information & Communications Technology (ICT) servi... ... Provide 2nd tier support on Managed Security Services, specifically on information s... ...e with less experience would be considered as Assistant Security Analyst
- ... Duties: provide technical advice and consultancy on cyber security, and controls from an operational perspective to various team... ...r units of the University; conduct security assessments on information systems to ensure policy compliance and provide recommendatio...
- ...e under the stock code 1828. For more information, please visit For more information ... ...it . Job Summary The System Analyst will play a key role in analyzing, desig... ...usiness and compliance requirements into secure, scalable, and maintainable systems. ...
- ...hos, we welcome you to join us. Degree in Computer Science or related disciplines At least 3 years’ experience in information and cyber security, with good knowledge & practical working experience of Next Generation Firewall, Vulnerability Scan, Penetration Test, ...
- Information Technology Services Office (ITSO) is responsible for developing and managing the IT infrastructure of the University, and ... ...pointee should possess strong technical skills in information security technologies including system hardening, identity and access ...
- ... the SOC L3 role is to support Group IT Security with activities related to the Security... ...operations, including supervising L1/L2 analysts, leading and organizing investigations,... ...f: You are an EVALUATOR. You analyze information and ideas both from within and outside ...
- ... # support the development and enhancement of the Student Information System (SIS), ensuring its alignment with academic and admini... ...yment pipelines; # have a solid understanding of software security principles and best practices, including secure coding, data ...
- ...ob No.: 499438 Employment Type: Full time Departments: Information Technology Department Job Functions: Information Technolo... ...les and Responsibilities & Specific Requirements (Application Security): ~Assist in reviewing IT initiatives and provide advisory ...
- ... the SOC L3 role is to support Group IT Security with activities related to the Security... ...operations, including supervising L1/L2 analysts, leading and organizing investigations,... ...f: You are an EVALUATOR. You analyze information and ideas both from within and outside ...
- We are seeking a diligent and proactive Information Security Officer to oversee and maintain the operational integrity, security, and compliance of our secured room facilities. This role is critical in supporting ongoing monitoring, access control, and administrative ...
- ...cross business units to analyze current security frameworks and recommend improvements b... ...um of 3 years' experience in a Security Analyst or similar role, preferably within a co... ... Bachelor's degree in Computer Science, Information Security, or related field (or equivale...
- IT Security Analyst/IT安全分析師 #Provide support in vulnerability management operation, including schedule regular vulnerability scanning, ... ...#Coordinate and deliver security training or share relevant information with company staff #為漏洞管理營運提供支持,包括安排定期漏洞掃描,對漏洞發現進行分類並確定優先順...