通过电子邮件获得新工作
- To train and develop a team of professional operations management so as to facilitate the growth of the Manned Security Solutions business. As G4S Operations Management Trainee, you will be provided with: Familiarization ~ To provide intensive opportunities fo...
- Job Description: ~ Support and maintain Information Security Management System (ISMS) in accordance with the standard of ISO 27001 ~ Ensure the accuracy of the ISMS documentation, develop and maintain information security policies, processes and procedures, design ...
- Job Purpose: Reporting to the Head of Information Security to support delivering information security services and carrying out information security related activities. Job Description of the position: • Conduct cyber security testing covering penetration test,...
- ...didate to join our dynamic team. Please visit our website for information of HKDC. Responsibilities: Work closely with the Pro... ... system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...hing qualifications - A pass in the Basic Law and National Security Law Test - Supply Period: 6 February 202 6 to 14 May ... ...ary College, 22 Rose Street, Yau Yat Chuen, Kowloon. (All information collected will be used for recruitment related purposes only....
- ...duct regular data backup and recovery if necessary Perform security checks and updates for both hardware and software systems, re... ...ry to [email redacted, apply via Company website]. Personal information will be used for recruitment purposes only. Only shortlisted ...
- ...here to learn more about our Benefits ( , Culture ( & Career Development ( Responsibilities: Conduct security risk assessment and prepare report on information security, AI Security, third-party security, Outsourcing services. Deliver initiatives to ensure compl...
- ...]. (Please quote the post in the application and your email.)(Information submitted will be used for recruitment purpose only.) Quali... ... system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...idate to join our dynamic team. Please visit our website for information of HKDC. Role Overview The DX design hub is looking ... ... system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...upport to satisfy client’s need. ~Support solution manager to secure a successful pitch to potential clients.REQUIREMENTS ~Higher ... ...elevant industry. ~Strong technical knowhow, passionate about information technology development. ~Good interpersonal & communication s...
- ...ce, overseeing vulnerability management practices, and supporting the implementation of security controls to protect critical assets and data. Lead the execution of information security projects, including IAM enhancements and vulnerability remediation initiatives...
- ...order to enhance the ability in tackling the increasing cyber security risks, utilize computing resources optimally and increase ope... ...ation, and testing on system changes/enhancements of Security Information and Event Management (SIEM) including Elastic Search; Desi...
- ...ulum mapping Regularly document student progress, including informal observations, running records and quarterly reports Perform... ...ur system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...cial data Provides support to business units on management information required to drive the business Prepares management reports... ...e, including monthly flash and final results, EXCO schedules, securities and wealth management reports etc. Prepares financial high...
- ...eneral system issues. Support daily IT operations, including the setup, maintenance, and administration of core infrastructure (security, network, server, email, POS and CCTV systems). Design and maintain network solutions (LAN/WAN/VPN/Firewall). Assist with th...
- ...idate to join our dynamic team. Please visit our website for information of HKDC. The Roles: # Collaborate closely with senior... ... system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...ybersecurity policies, guidelines, and procedures; Conduct security risk assessments and audits, vulnerability assessments, and p... ...ction strategies would be an advantage; Provide management information and technical advice, and recommend proposals to IT managemen...
- ... of the position you apply for in all correspondences. The information supplied by the applicants will be used in accordance with th... ...sted candidates will be notified. Job Duties : Direct security function, including physical security & safety of employees, ...
- ...holders, staff and clients; and Provide onsite support and troubleshooting to end-user. Qualifications Degree holder in Information Technology, Computing Science or related disciplines. At least 10 years of relevant experience. Hands on experience in Mic...
- ...nancial system vendors. Requirements: Degree holder in Information Systems, Accountancy, Finance or related discipline PMP ce... ... system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...ved limits. Requirements: Bachelor’s degree or above in Information System, Computer Science, Computer Engineering or a related discipline Minimum 5 years of IT experience, preferably in securities/insurance broker firms, banking, asset management or relevant ...
- ...ackage with performance-driven bonus opportunities, alongside flexible career development support. All applications applied through our system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- ...es, and generating insightful reports. Manage and optimize security tools such as Cloud Access Security Broker (CASB) to safeguar... ...es. Qualifications & Requirements Bachelor's degree in Information Technology, Cybersecurity, or a related field. At least 2 ...