Are you ready for a new beginning? We need your talent, knowledge and dedication to better our world with biology. Our purpose…
Job Description: About GBG Enabling safe and rewarding digital lives for genuine people, everywhere We make it our mission to ensure more…
About us At ExxonMobil, our vision is to lead in energy innovations that advance modern living and a net zero future. As…
We are seeking a highly motivated and knowledgeable individual to join our academic team as a Lecturer in Cyber Security. The successful…
Creating a better online experience with cookies. We care about your experience online, that's why we use cookies to make sure our…
Application deadline Country Malaysia Location Kuala Lumpur Workplace Hybrid (office and home working) Working hours 40 Employment type Permanent Legal entity Orsted…
Job Responsibilities: To deliver high quality teaching, research, and professional services in IT and Cybersecurity under the Computing programme standard (MQA), ensuring…
ITL Security Solution (M) Hiring! Full Time Technician (Security System Installer) in Selangor, Earn up to MYR 3,000 Ricebowl Technician (Security System…
Mohon Lokasi Kerja Berhampiran Stesen No. 6A, Jalan BPU 6 Puchong Selangor Malaysia 47100 Penerangan Kerja Kelayakan Sertai pasukan kami di ITL…
Key Roles & Responsibilities: Serve as the first point of contact for security solutions' technical support. Primary responsibility for technical execution/delivery of…
OUR COMPANY Mediexpress (M) Sdn Bhd Who We Are At Mediexpress (M) Sdn Bhd, we're proud to be one of Malaysia's leaders…
Are you ready for a new beginning? We need your talent, knowledge and dedication to better our world with biology. Our purpose…
JOB PURPOSE: The position is responsible for defining, implementing, and continuously improving enterprise wide cybersecurity requirements and governance. This role is responsible…
THE FUTURE IS WHAT WE MAKE IT. Advanced Cyber Security Architect / Engineer Kuala Lumpur Start your career by making an impact…
Fit gap analysis: Review existing ICS/OT security architecture, identify design gaps, and recommend security enhancements by using security by design approach Participate…
Fit gap analysis: Review existing IT security architecture, identify design gaps, and recommend security enhancements by using security by design approach Participate…