Experience 5–7 years of professional experience in cybersecurity, information security, or technology project delivery roles. Demonstrated experience delivering enterprise security projects involving EDR, NG SIEM, IPS, and/or DLP platforms. Experience working in regulated or large scale enterprise environments is strongly…
We’re looking for an experienced VAPT (Vulnerability Assessment & Penetration Testing) Specialist to manage and deliver security testing services for global clients. This role includes responsibilities across presales, consulting, implementation, service delivery, customer support, and team management. Key Responsibilities: Lead…
Responsibilities: Research, review, and resolve location based and related data Validate and update POI information to ensure accuracy and consistency Handle data transactions while meeting defined productivity and quality KPIs Identify and correct data issues following project guidelines Requirements: Experience…
As a Growth Consultant/Lead Malaysia based in Kuala Lumpur you will join client's team and own new business growth, partner channel and ongoing client success efforts within your market. This hybrid role is perfect for someone who thrives in both…
We are looking for a Service Build Engineer to provision, configure, and deliver enterprise ready Linux based middleware environments, including JBOSS, WebLogic, and messaging platforms like IBM MQ or Apache Kafka. The role demands strong system level knowledge in RHEL,…
Key Responsibilities Centralized Data Demand Management & Program Oversight Lead the centralized management of all data demand across the Group, covering both strategic initiatives and ABAU (ad hoc/BAU) requirements. Assess data demand requests for alignment with the strategic data architecture…
Key Responsibilities BAU Ownership & Stabilisation Assume business product ownership of existing legacy customer data platforms. Establish a standard operating model across platforms for governance, change management, user access control, and issue resolution. Own the User Access Management (UAM) process,…