Get new jobs by email
- ...查詢及投訴等工作 Requirements : ~ No requirement on academic qualification; Fair Cantonese ; Able to read & write simple Chinese ; Security Training Course Certificate (QAS); Security Personnel Permit Employment Terms: ~ with Discretionary Bonus, Medical Insuran...
- Job Description: ~ Support and maintain Information Security Management System (ISMS) in accordance with the standard of ISO 27001 ~ Ensure the accuracy of the ISMS documentation, develop and maintain information security policies, processes and procedures, design a...
- Responsibilities: Support and maintain security solutions, including antivirus, next generation firewall, web application firew... ...on latest security threats, attacks and updates Assist the Information Security Manager on the following tasks Information securi...
- ...st a job, and an environment where you can be your true and authentic self, like at home. Job Purpose: Assist Head of Information Security to ensure adequate and effective controls are in place. Main Responsibilities: Support security tools including networ...
- ...re looking for highly motivated, responsible, independent, and proactive candidates for the post of: Manager (Governance & Security, Information Technology) Summary: Responsible for driving the company’s IT governance and security management frameworks and th...
- All innovators, now is YOUR chance to grow in our future-oriented ICT company! Our 1-year Management Trainee Program (Information Security Stream) is designed to nurture high-calibre IT graduates and provide them with comprehensive exposure to the ICT industry, fast...
- ...he primary line of defense, designing and implementing robust security measures to protect the integrity and availability of critica... ...rience : Proven track record in a dedicated Cybersecurity or Information Security role. Technical Expertise : Strong knowledge of ...
- ...nd promote human-centric technology and social policies. Further information about Lingnan University is available at Applications are now invited for the following post: Senior Information Security Analyst Information Technology Services Centre (Post Ref.: 2...
- ...Tridge Pay is an innovative trade escrow service designed for secure, efficient, and transparent global B2B transactions. By leverag... ...ds and competitor activity to identify growth opportunities and inform business strategy What you need to succeed: Minimum 3 yea...
- ...d daily operations. Ensure system quality, compliance, and security in line with company standards. Your Profile Minimum... ...e your express consent that Robert Half may use your personal information to process your job application and to contact you from time ...
- ...ering a wide array of integrated services, including banking, securities investment, insurance consultancy, and wealth management. ... ...ted parties, please click Apply Now for application. For more information or inquiries, you are welcome to reach us at +852 9882 7957. ...
- ...cial data Provides support to business units on management information required to drive the business Prepares management reports... ...e, including monthly flash and final results, EXCO schedules, securities and wealth management reports etc. Prepares financial high...
- ...holders, staff and clients; and Provide onsite support and troubleshooting to end-user. Qualifications Degree holder in Information Technology, Computing Science or related disciplines. At least 10 years of relevant experience. Hands on experience in Mic...
- ...management activities within the assigned buildings • Handle clients' inquires and complaints. • Oversee property maintenance, security and cleaning services Requirements • Certificate holder in Estate Management or Diploma holder in Property Management or rel...
- ...ow you will make an impact: Develop, implement, and review security policies, procedures, and emergency response plans Manage ... ...ecruitment purposes. While the provision of full and complete information is necessary for our selection process, sharing your personal...
- ... Performing shift-in-charge duties & responsible for daily security operations Preparing daily & incident reports Safeguard... ...ities and welcome applications from all qualified candidates. Information provided will be treated in strict confidence and used only f...
- Responsibilities: 1. Conduct regular risk and security maturity assessment, maintain IT risk registry, and formulate regular work... ... Requirements: 1. A Bachelor’s degree in Computer Science, Information Technology or related discipline. At least 15 years of ...
- ...east 5 years working experience in all rounded IT network and security solution design, maintenance and support in Banking industrie... ...ent purposes only in accordance with the Bank’s Personal Data Information Collection Statement, a copy of which is available on our web...
- About the job Company Description: Role Description: This is a full-time on-site role for an Information Technology Project Manager, located in Hong Kong SAR. The role involves overseeing IT projects (including Web/App/AI) from initiation to completi...
- Responsibilities Perform security architecture reviews and threat modeling for new and existing systems. Assess AI/LLM imp... .... Requirements ~ Bachelor's degree in Computer Science, Information Security, or related field. ~5+ years in security technolog...
- ...our Hong Kong office. JCDecaux is an Equal Opportunities Employer and welcome applications from all qualified candidates. All information provided will be treated in strict confidence and used for recruitment purposes only. Applicants not hearing fromus within six w...
- ...ss development and operational needs. Ensure data quality, security, and compliance with organizational standards. Collaborate... ... degree or Master’s degree in Computer Science, Data Science, Information Systems, Statistics, or related field. Minimum 1–2 years o...
- ...onsibilities: Responsible for managing channel accounts in security and storage Formula and execute product strategies Deve... ... expected salary by clicking the link " APPLY NOW ". All information provided by applicants will be used for recruitment-related p...
- ...inating and monitoring the operations of various channels for securities/futures trading systems and ensuring the stability of all the... ...isor Requirements ~ University degree in Business, Information technology, Computer Science or related discipline ~4-5 yea...
- ...ary: By email : [email redacted, apply via Company website] WhatsApp : 9786 0992 Applicants who do not hear from us within six weeks of application should consider their applications unsuccessful. Information collected will be used for employment purpose only.
- ... Assist IT Finance team for budget control – IT project/ equipment/ daily operating expenditures monitoring Compile financial information and management reports, including General and Administration monthly report, monthly accrued expense report, etc. Identify op...
- The Challenge We Pose to You: Provide 2nd tier support on Managed Security Services, specifically on information security incident management; Investigate, respond and provide recommendations in a timely manner; Design and maintain SIEM rules with on-going tuning ...
- ...tplaces, wellness expos, lifestyle webinars, movie nights, social outings, arts and craft workshops and much more. For more information on TLC, please go to What you will be doing: Be part of the events team to generate new ideas and design events for ...
- ... our customers transform their business with innovations. Job Description : Provide technical expertise in supporting Cyber Security Technology Assign to complete technical tasks including Project implementation, Project documentation and Post-sales maintenanc...
- ...ply interruption To handle power system alarms and emergency service calls, repair faulty equipment efficiently, restore supply security promptly and carry out tests on high voltage apparatus in the distribution system To assist Engineers in monitoring contractors...