Get new jobs by email
- ...ws, unit/integration testing Plan and coordinate and manage system deployment, upgrades and patches to ensure seamless operation ... ...ment purposes only in accordance with the Bank’s Personal Data Information Collection Statement, a copy of which is available on our webs...
- ... Ensure smooth integration of EDI workflows into enterprise systems. • DevOps & Infrastructure Implement CI/CD pipelines and ... .... Qualifications Bachelor’s degree in Computer Science, Information Technology, or a related field. Minimum 3 years’ experience...
- ...manufacturer of primary and secondary test equipment for power systems. Our products are used in more than 160 countries by electric ... ... The role also involves maintaining computer systems and other information technologies and equipment within the company. The position is...
- ...uced the world's first contactless multi-modal transit payment system in 1997. Since then, this homegrown FinTech company has pionee... ... of Core Java / C / C++ / Python is preferred Familiar with information security standards such as ISO27001 and HKMA C-RAF is a plus ...
- ...eir team. The role: Act as the coordinator for all HR system implementation activities with vendor and internal teams Do... ...related disciplines Minimum of 2- 3 years’ experience in HR Information System Strong understanding of complex payroll environments...
- ...Leasing and play a pivotal role in overseeing the department’s system operations while communicating the business needs to various s... ...users. Requirements University degree in Computer Science, Information Systems, or related fields Minimum 15 years of IT experience,...
- ...e in supporting the firm’s operations through data management, system optimization, reporting automation, and technology-driven solu... ...edical Insurance * Public Exam Leave The Role As an Information Analyst in our IT & Admin team, you will play a key hands-on r...
- Job Description: # Support and maintain Information Security Management System (ISMS) in accordance with the standard of ISO 27001 # Ensure the accuracy of the ISMS documentation, develop and maintain information security policies, processes and procedures, design a...
- ... Extend compliance oversight to IoT devices, including CCTV systems, door access control, and other network-connected physical sec... ...ication: A bachelor's degree / diploma in computer science, information technology, or a related field is often preferred. Possess ...
HKD 50k - HKD 80k per month
As an Information Security Manager in the business services industry, you will be responsible for implementing and managing security pol... ...ng and implementing security tools and technologies to enhance system protection. Monitoring and analyzing security systems to de...- ...viding technical support to staff, and managing our multimedia systems to facilitate smooth business operations. Key Responsibili... ...ignage/banners. General IT Assistance: Deliver all-around information technology support to employees and assist with their daily te...
- ...rvices have branched out from Electronic Toll Collection (ETC) System since 1998 to multiple smart solutions after 2000s, such as Tr... ...d. About You: ~ Diploma or Degree in Computer Science, Information Security, or a related field. ~1-3 years of hands-on experie...
- ...ity Policy and Governance: ~ Develop, implement and maintain information security policies and procedures, and security configuration b... ...s are timely removed. Monitor and manage security tools and systems (e.g., IDS/IPS, endpoint protection). Respond to security i...
- Position Summary: The Assistant Manager, Information Technology supports the Information Systems Manager in delivering reliable IT and AV services across the College. The role focuses on infrastructure maintenance, user support, security implementation, vendor coo...
- ... Job Responsibilities: Analyses and interprets financial data Provides support to business units on management information required to drive the business Prepares management reports in accordance with the stipulated time-table, including monthly ...
- Role Objective Provide end-to-end IT procurement, budget management, and administrative support to the IT function, ensuring effective cost control, compliance with internal policies, and smooth operational execution. Job Duties IT Procurement & Vend...
- ...enges as well as controls Requirements: Degree holder in Information Security, IT, Computer Science or other related disciplines ... ...y and threat simulation Knowledgeable in TCP/IP, Linux/UNIX System Administration, and Windows System Administration Knowledge...
- ...n. About the Role This position supports the Director of Information Security in advancing the organization's information and cyber... ...feguarding the confidentiality, integrity, and availability of systems and data, while driving continuous improvement in security ope...
- Computational Scientist Physics Informed ML Computational Scientist (Physics-Informed ML) Working Location Hong Kong Jo... ...ring: Deploy scalable research code/large scale neural network systems onto a robust cloud-computing platform to solve real-world urb...
- ... Hong Kong Stock Exchange under the stock code 1828. For more information, please visit For more information about FWD Hong Kong, ple... ...(FE) portfolio delivery, execution governance, and large-scale system modernization outcomes. This role provides enterprise-level ov...
- Duties: Coordinate and oversee the implementation of cybersecurity, data security, and information system security management across the company’s Hong Kong and overseas offices. Ensure the company’s cybersecurity framework remains compliant, effective, and w...
- ...es: · Build and maintain IT infrastructure, including backup systems, VMware virtualization resource pools, storage, and disaster r... ...am head. Requirements: · Bachelor's degree or above in Information Technology or related fields. · Min. 3 years of experience i...
- ...routine infrastructure operations and maintenance, network and system performance and stability, capacity planning, system upgrade, ... ... professional qualifications in Infrastructure and Networking; Information Security is a plus (e.g. MCSE, MCSA, CCNP, ITIL, CISA, CISSP, ...
- ...IT, as and when required, to ensure the Hotel is technologically advanced and efficient with all matters relating to hospitality information technology. Proactively support hotel guests with any IT related issues within the guest rooms, function rooms or public area...
- ... establish appropriate data policy and governance, process and system to enhance data quality management and ongoing monitoring C... ...quirements: Bachelor’s degree or above in Computer Science, Information Technology, Business Administration or related disciplines ...
- ... a recognized bachelor’s degree or higher in Computer Science, Information Technology, Information Engineering, or a related discipline; ... ...nd experience. To apply, please submit your application via system. The College reserves the right to fill or not to fill the pos...
- Job Responsibilities ~ Act as the single point of contact for Security Governance, Risk and Compliance ~ Build and maintain a client relationship especially with the client’s GRC & security organization (CISO) and staff ~ Represent Atos within the customer ...
- ... and maintenance of the Profitability Analysis Management (PAM) system Support users in system optimization and user acceptance tes... ...he Mandatory Reference Checking. Our responsible recruiter will inform you the details of the MRC process and the requirements in due ...
- Position Summary: We are seeking an experienced professional in Information Security Management. The ideal candidate should have a strong understanding of IT Security policies, industry control frameworks, and local regulatory requirements, as well as the ability t...
- .... ~Develop security control reviews and settings for banking systems to ensure appropriate controls are in place and in adherence t... ...cies in IT infrastructure and systems, and assist in preparing information security audit ~Review the security tasks in related to IT a...