通过电子邮件获得新工作
- To train and develop a team of professional operations management so as to facilitate the growth of the Manned Security Solutions business. As G4S Operations Management Trainee, you will be provided with: Familiarization ~ To provide intensive opportunities fo...
- ...ositive education program as a homeroom teacher Incorporate technology into the learning process when appropriate Encourage childr... ...ur system will be delivered directly to the advertiser and privacy of personal data of the applicant will be ensured with security.
- We are seeking a dedicated professional to join our team as an Information Security and Technology Risk Assistant Manager for a critical 6-month engagement. This role will support the oversight of security and risk management functions for the eMPF Platform, delivere...
- ... Business Intelligence development Solid hands-on experience with Oracle, ETL processes, BI tools, and SQL Familiarity with securities trading, risk management, and financial systems, including regulatory and management reporting. Strong written and verbal comm...
- ...eneral system issues. Support daily IT operations, including the setup, maintenance, and administration of core infrastructure (security, network, server, email, POS and CCTV systems). Design and maintain network solutions (LAN/WAN/VPN/Firewall). Assist with th...
- ...(e.g., boxing, cushioning, labeling) to guarantee products are secured and protected for safe transport. - Coordinate, and book picku... ...rovide - An excellent career platform in a fast-growing listed technology company. - Transparent and diverse working culture. - Discret...
HKD 65,968k - HKD 99,474k /月
...es, as well as external clients such as other medical centres and laboratories; To manage and monitor the applications of new technologies, where appropriate; To act as the Quality Controller, Document Controller, and Safety Officer in the laboratory; To monito...- ...ybersecurity policies, guidelines, and procedures; Conduct security risk assessments and audits, vulnerability assessments, and p... ...ment and manage cybersecurity and IT infrastructure tools and technologies including M365 security, firewalls, WAF, IDPS, EDR, NDR, VPN,...
