Get new jobs by email
HKD 40k - HKD 80k per month
...rotecting the organisation's technology landscape by supporting the implementation, daily operations, and continual improvement of security controls. Working closely with technical teams, you will help detect, analyse, and respond to security threats while ensuring our ...- ...main name systems. We are looking for highly motivated, responsible, independent, and proactive candidates for the post of: Information Security Manager Summary: Responsible for driving the company’s IT governance and security management frameworks and their o...
- As an Information Security Manager in the business services industry, you will be responsible for implementing and managing security policies and frameworks to protect sensitive data. This position requires strong technical expertise and the ability to collaborate effe...
- ... expansion and specializing in wealth management”. ~Develop security control reviews and settings for banking systems to ensure ap... ...ies in IT infrastructure and systems, and assist in preparing information security audit ~Review the security tasks in related to IT ...
- Job Purpose: Assist Head of Information Security to ensure adequate and effective controls are in place. Main Responsibilities: Support security tools including network firewall, DLP, SIEM, vulnerability scanning, micro-segmentation Review the firewall rule ch...
- We are seeking a Security Specialist to work and manage security tools, processes, and best practices across the organisation. This is a hands-on role that spans multiple areas of cybersecurity, requiring technical expertise, adaptability, and a proactive mindset. You w...
- ...latory and governance posture. Main Responsibilities Security Policy & Governance: ~ Develop, implement and maintain poli... ...cation: A bachelor's degree / diploma in computer science, information technology, or a related field is often preferred. Possess...
- ..., like at home. Job Purpose This role involves the security policy and governance, security operation, infrastructure sec... ...ty Policy and Governance: ~ Develop, implement and maintain information security policies and procedures, and security configuration ...
- Job Description: ~ Support and maintain Information Security Management System (ISMS) in accordance with the standard of ISO 27001 ~ Ensure the accuracy of the ISMS documentation, develop and maintain information security policies, processes and procedures, design a...
- We are seeking an experienced (Senior) Information Security Manager to lead and enhance the cybersecurity framework. This role requires expertise in managing and mitigating cybersecurity risks effectively. Client Details My client is a well-known company in Hong ...
- ...bjectives (RPOs), system criticality and dependencies, supporting disaster recovery planning Security and Third Party Risk Management Manage and complete information security assessments and Due Diligence Questionnaires (DDQs) received from clients Support ou...
- ...nd success criteria Test and validate the effectiveness of security controls by using red-team approach Review and analyze End... ...es as well as controls Requirements: Degree holder in Information Security, IT, Computer Science or other related disciplines ...
- ... no. For other vacancies, please visit our website: *All personal data provided by job applicants will be used for recruitment purposes only in accordance with the Bank’s Personal Data Information Collection Statement, a copy of which is available on our website:
- Responsibilities: Support and maintain security solutions, including antivirus, next generation firewall, web application firew... ...on latest security threats, attacks and updates Assist the Information Security Manager on the following tasks Information securi...
- Senior Manager, Information Security
- Vice President, Information Security
- ...d friendly cyber-defense team Function to recruit: A cyber-security SME cum project coordinator specializing in network and firew... ... Qualifications: # Bachelor's degree in Computer Science, Information Technology, or a related field. # Proven experience in mana...
- ... Job No.: 499438 Employment Type: Full time Departments: Information Technology Department Job Functions: Information Technolog... ...les and Responsibilities & Specific Requirements (Application Security): Assist in reviewing IT initiatives and provide advisory ...
- ...Pose to You: Provide 2nd tier support on Managed Security Services, specifically on information security incident management; Investigate, respond an... ... experience would be considered as Assistant Security Analyst All information received will be kept strictly c...
- We are seeking a diligent and proactive Information Security Officer to oversee and maintain the operational integrity, security, and compliance of our secured room facilities. This role is critical in supporting ongoing monitoring, access control, and administrative ...
- ...T strategy Assist in the development and implementation of security policies, procedures and best practices Collaborate with I... ...sponse (NDR), Endpoint Detection and Response (EDR), Security Information and Event Management (SIEM) system At least one certificat...
- ...rtunities for process improvement and innovative solutions Entry Requirements: Study Fields: ~ Associate degree or above (Information Technology, Business Analysis, Computer Science, or related field is preferable) Knowledge, Skills and Abilities: ~ Unders...
- Job Description Responsibilities Develop information security policies / BCP plan / manuals and procedures Monitor security administration on application logical access and identity management, hardening, security monitoring and vulnerability management De...
- ..., we welcome you to join us. Degree in Computer Science or related disciplines At least 3 years’ experience in information and cyber security, with good knowledge & practical working experience of Next Generation Firewall, Vulnerability Scan, Penetration Test, ...
- ... management policies and procedures regularly Develop data security policies and procedures comply with regulatory and head offic... ...itioner Certificate ~5 years or above working experience in information technology or data management in the banking or similar indus...
- ...report to the Team Head; Executing and refining the monitoring framework and mechanism in respect of technology risks and information security, which extends to physical data / information security and technology risk management for managing the eMPF platform (the Pl...
- All innovators, now is YOUR chance to grow in our future-oriented ICT company! Our 1-year Management Trainee Program (Information Security Stream) is designed to nurture high-calibre IT graduates and provide them with comprehensive exposure to the ICT industry, fast...
- ...rtunities for process improvement and innovative solutions Entry Requirements: Study Fields: ~ Associate degree or above (Information Technology, Business Analysis, Computer Science, or related field is preferable) Knowledge, Skills and Abilities: ~ Unders...
- Role Summary Lead and orchestrate information security initiatives to achieve and sustain security and privacy certifications (e.g., ISO/IEC 27001, ISO/IEC 27701, and related standards). Serve as the project lead to provide technical guidance, drive control impleme...
- ... fast-growing group with investment and funded to nurture the world's leading startups and enterprises, is now seeking an IT Information Security Consultant (3-6 months contract – Immediately available) (40k – 50k) to join their growing team to drive InfoSec project imp...