With over 70 years of experience, our focus is on helping the most vulnerable children overcome poverty and experience fullness of life.…
\ Company Description Skill Quotient Technologies is a CMMI level 3 & ISO 27001:2013 certified innovative IT company. We work on cutting…
\ \ CnE Global Sdn Bhd was established in 2010 in Malaysia, aimed to be a professional overseas marketing company for Korean…
\ \ Salary : RM4,500 RM5,500 per monthLocation: Malaysian International Aerospace Centre, Sultan Abdul Aziz Shah Airport, 47200 Subang, SelangorWorking days &…
Job PurposeAssociate Cyber Security Specialist requires communication skills for active collaboration with users, associates within the team as well as other IT…
\ Open Position: IT Software Solution Architect (Global MNC Role) A Global MNC Company is looking for IT Software Solution Architect to…
\ RESPONSIBILITIES Risk Management Engage domain service owners, process owner, service leads, SMEs (Domain Stakeholders) to prepare / conduct risk assessment, risk…
Company Description Informa is a leading international events, intelligence and scholarly research group. Were the specialists specialist. Through hundreds of powerful brands,…
Company Description Great internships are not only the ones that prepare you for the work you hope to do after completing your…
Job PurposeCybersecurity Specialist requires a Cybersecurity Subject Matter Expert (SME) with excellent communication skills for active collaboration with associates within the team…
Ninja Van is a tech enabled logistics company on a mission to provide hassle free delivery services for businesses of all sizes…
Company DescriptionGreat internships are not only the ones that prepare you for the work you hope to do after completing your studies,…
\ 4+ years\\\' experience as Azure Cloud Security Engineer Mandatory Bachelor\\\'s Degree in Information Technology, Computer Engineering, Information Security or equivalent Expertise…
Role Responsibilities Responsibilities **Strategy: Develop and implement comprehensive strategies for endpoint protection and threat configuration aligned with the overarching cyber defence goals.…