Dapatkan lowongan baru via email
Rp 5juta - Rp 10juta
...Occupations Cyber Security Specialist: Job Description Cyber Security Specialist: Job information Cyber Security Specialist from the Company PT Permata Hijau Makmur , this latest Cyber Security Specialist job vacancy is located in the city Jakarta Selatan...- ...infrastructure, data centers, and communication systems. Once operational, the role transitions to maintaining system reliability, security, and efficiency while leading the IT team in delivering responsive technical support and continuous improvement. Key Outcomes...
- ...registration via BKPM Hospital compliance with local zoning, environmental, and land ownership laws. Contractual and vendor agreements secured legally Drafting, reviewing, and finalizing contracts with construction firms, medial equipment suppliers, IT vendor, and...
- ...Affiliate TypeGeneral Service ReasonRegular Regular Assignment Target Start Date2026-03-01 Standard Job Description Field Security Associate Organizational Setting and Work Relationships The Field Security Associate provides support to all security...
- ...relevant parties to monitor work progress for expedite installation Performing Inspect, Setup, Testing and commissioning electronics security system Installation (Access Control, CCTV, Intrusion Alarm, Intercoms/Public Address, Electronic Lock and keys) and documentations...
- ...About the Role The Software Security Engineer plays an essential role in protecting Amartha from evolving cyber threats. You will be part of our dynamic security team, focusing on identifying and mitigating security risks across our technology stack. About the...
Rp 9.9juta - Rp 10.9juta
...Qualifications : 1. S1 (IT Related Major-Min GPA 3.00) 2. Pengalaman sebagai Security Analyst (2 - 3 tahun) 3. Pengalaman dengan Security Requirement terkait dengan Mobile Banking, Internet Banking, Internet Banking Bisnis 4. Pengalaman dengan aktivitas Penetration...- ...At Stockbit & Bibit, we prioritize the security of our applications and the data of our users. As an Application Security Engineer , you’ll play a key role in ensuring the security and integrity of our products from mobile apps to backend systems by working closely...
- ...customer-centric innovation on technology at Grab come join us and help shape the future of technology. Get to Know the Role As a Security Systems Engineer you will design implement and maintain Grabs physical security systems across offices in the region. This...
- Riverside Golf Club sedang mencari individu yang berdedikasi untuk bergabung dengan tim kami sebagai Staff Keamanan. Sebagai bagian dari komitmen kami untuk memastikan lingkungan yang aman dan terlindungi bagi tamu dan karyawan, Anda akan memainkan peran penting dalam ...
- ...hospital information technology systems. The role encompasses the commissioning of IT infrastructure, ensuring system reliability and security, and leading the IT team in efficient operations. Ideal candidates should have a Bachelor's degree in Information Technology and...
- ...Security Advisor Requirement : · Minimum Bachelor’s degree in Computer Science/ Software Engineering, Computer Management/ Information Technology/information Systems/information Engineering. · Minimum of 5 years of experience in data exchange, data integration,...
- ...Job Description Assistant Chief Security The Assistant Chief Security supports the Chief Security in managing and supervising all security operations to ensure the safety and security of guests employees assets and hotel premises. This role assists in implementing...
Rp 13juta - Rp 15juta
...s/Master’s Degree in Computer Science, Information Systems, or related field. Experience 1. 5–8+ years of experience in IT Security, Infrastructure, or Application Security. 2. Demonstrated experience designing security architecture for applications, networks,...- ...About the Role The Enterprise Security Engineer plays a crucial role in Amartha. You will be the warrior who will spearhead various Enterprise Security programs to protect Amartha from internal and external threats. About the team The Information Security team...
- ...peoples career ambitions. We pledge to make Prudential a place where you can Connect Grow and Succeed. Review Information Security (IS) baseline set by PCA and GHO. Develop review and enhance IT Security policies procedures standards and technical baseline configurations...
- ..., patching, and server upgrades. Lead a cross-region IT operations team to support the company’s infrastructure. Provide IT security support through incident response, periodic security scans, security posture reporting, and coordination of penetration testing with...
- ...Get to Know the Role We are looking for an outstanding Security Engineer who will perform system architecture review code review training of staff and organizing penetration testing and possible red teaming for various systems of Grab Grab Joint Venture initiatives...
- ...national identity and digital ID programs. A minimum of 1 professional certification, such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or an equivalent certification. Experience in at least 1 project...
- ...and cybersecurity now serving the needs of diverse customers in civil sectors. The Cybersecurity Consulting Roles evaluate the security configuration assessment and measures and provides solutions on the management of cybersecurity and information risk to the...
- ...energetic dedicated Technical Sales professionals to work as a bridge between the Reseller/VARs/Solution partners and end-users. Security Solution Consultants would be responsible to utilize end-users and resellers input and sales information to ensure and support the...
- ...Job Title: Security Advisor - Government Identity Card Domain Location: Remote Type: Full Time Salary: Competitive Job Summary The Security Advisor in the Government Identity Card domain will play a crucial role in ensuring the integrity, security, and...
- ...Associate Director will provide strategic and technical leadership for the design execution and monitoring of EpiC Global Health Security (GHS) activities at the country level. This role will deliver high-level technical support to national and sub-national government...
- ...Lead the product management processes for Managed Security Service Provider (MSSP) offerings, including strategy development, product definition, and lifecycle management. Conduct thorough market analysis to understand customer needs, competitive landscape, and...
- ...footprint data to ensure accurate credit assessment. We are looking for a highly skilled and experienced Cloud Infrastructure Security Engineer (SDE4) to join our team as an Individual Contributor . In this critical role, you'll be responsible for leading projects...
- ...such as biometrics data protection and cybersecurity now serving the needs of diverse customers in civil sectors. The Head of Security and Crisis Management is in charge of the security for all countries of the Asia Region including supervision of security managers...
Rp 5juta - Rp 10juta
...to customers. Main Responsibilities: Maintain existing DHL customers by telephone within on regular pre-defined call cycle to secure new business and to ensure that individual agreed targets are achieved. Manage a portfolio of customers via telephone. Act as...Rp 5juta - Rp 10juta
...Managing master data including creation and updates. Managing and designing the reporting environment, including data sources, security, and metadata. Helping develop reports and analysis. Generating reports from multiple systems. Collects data from sales reports...- ...First, Walk the Talk, Accountability, Yes-if Mindset). What you will do, but not limited to: Monitor, analyze, and respond to security incidents across applications, Linux servers, and cloud infrastructure. Design and implement security controls based on Secure...
- ...to deliver quality product and services on time within budget. Tendering and solutioning working closely with Sales team to secure projects. Project drafting planning scheduling execution documentation and proper handing over to service for DLP. Revenue...

