Dapatkan lowongan baru via email
- ...tours of the entire facility for appearance, safety, staffing, security, and maintenance. • Celebrates successes and publicly recognizes... ...operations. • Ensures property policies are administered fairly and consistently, disciplinary procedures and documentation are...
- ...Shows compassion for others, makes people feel safe, respected and fairly treated. Core Competencies – behavioural indicators Level 2... ..., accreditation, any residency or visa requirements, security clearances. Vacancies close at 23:59 local time Geneva, Switzerland...
- ...Shows compassion for others, makes people feel safe, respected and fairly treated. Core Competencies – behavioural indicators (Level 2)... ...fit for appointment, verification of Education certificate and security clearances. IOM applies local United Nations Salary Scale. IOM...
- ...Listening and acting on feedback is part of our culture to support colleagues and customers. Rentokil Initial regards equality and fairness as fundamental rights of all of its colleagues. We live our values of service, Relationships, and Teamwork which our colleagues...
- ...support to employees for hardware, software, and connectivity issues. Install, configure, and update company-approved software and security patches on devices. Collaborate with vendors for IT-related purchases and service maintenance. Ensure compliance with IT...
- ...Listening and acting on feedback is part of our culture to support colleagues and customers. Rentokil Initial regards equality and fairness as fundamental rights of all of its colleagues. We live our values of service, Relationships, and Teamwork which our colleagues...
- ...and materials (e.g. pens, forms and informative leaflets). •Train, supervise and support company staff, including receptionists, security guards and call center agents. •Ensure timely and accurate customer service. •Handle specific customer complaints and requests...
- ...key role in shaping the architecture and design of the iOS platform, ensuring the code is reusable and maintainable. Safeguard security and ensure data privacy in mobile apps. Actively participate in agile processes, including sprint planning, daily stand-ups, and...
- ...Listening and acting on feedback is part of our culture to support colleagues and our customers. Rentokil Initial regards equality and fairness as a fundamental right of all of its colleagues. We live our values of service, Relationships and Teamwork which were identified...
- ...Responsibilities Architect and maintain scalable, secure, and highly available cloud infrastructure on AWS . Design and manage CI/CD pipelines for rapid and reliable deployment across multiple environments. Implement and maintain Infrastructure as Code (IaC...
- ...payment methods. - Count bank at end of shift, complete designated cashier reports, resolve any discrepancies, drop off receipts, and secure bank. - Secure liquors, beers, wines, coolers, cabinets, and storage areas. - Complete closing duties. - Follow all company...
- ...footprint are made to support focus segment growth Develop sustainable and long-term relationships with key accounts, negotiate and secure key accounts contracts Improve pipeline of projects Steers join innovation roadmap with customers and develop unique business...
- ...Location: Green Lake, Tangerang Are you a highly skilled and experienced cybersecurity professional with a passion for offensive security? We're looking for a Red Team Leader to spearhead our dynamic Red Team, driving our security posture to new heights. As our Red...
- ...national identity and digital ID programs. A minimum of 1 professional certification, such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or an equivalent certification. Experience in at least 1 project...
- ...IT infrastructure and applications according to the requirement of the company. Manage and enhance IT governance including IT Security frameworks, policies, and processes to ensure alignment between IT strategy and business objectives, mitigate IT-related risks,...
- ...including calculating the infrastructure capacity. Lead the design of network architecture, considering factors such as scalability, security, and cost-effectiveness. Conduct capacity planning to anticipate network traffic growth and ensure the network can...
- ...~ Bachelor’s degree in Cybersecurity, Computer Science, or equivalent experience ~3+ years experience in Red Team, Offensive Security, or Penetration Testing ~ Strong knowledge of Windows, Linux, AD environments, and network protocols ~ Proficiency in scripting...
- ...experimentation. Focus on Impact: Create impact through bias for action and tangible results. We are looking for a Security Engineer - Detection & Response to join our Information Security Team and lead efforts to identify, analyse, evaluate, and act upon...
- ...At Stockbit & Bibit, we prioritize the security of our applications and the data of our users. As Cloud Security Engineer, you will help safeguard our cloud infrastructure and ensure the security of sensitive financial data. In a fast-paced, highly regulated fintech environment...
- ...others are among the impact players who are held match-fit for your brand. About The Job: We are looking for an expertise in security governance frameworks. Strong skills in risk assessment and compliance monitoring. Proven experience in designing and implementing...
- ...Security Advisor Requirement : · Minimum Bachelor’s degree in Computer Science/ Software Engineering, Computer Management/ Information Technology/information Systems/information Engineering. · Minimum of 5 years of experience in data exchange, data integration,...
- ...We are seeking a skilled and proactive IT Security Engineer to join our team. In this role, you will be responsible for implementing, maintaining, and monitoring security systems and procedures to protect our company's assets and data. You will play a crucial role in...
- ( English ) Our client is seeking a Head of Security who will be responsible for the comprehensive management of all security operations across a complex property. This includes ensuring the safety of tenants, visitors, employees, and assets, while also overseeing the...
- ...Design, implement, and deliver integrated security solutions tailored to meet client needs. Conduct comprehensive assessments of clients' existing security measures and infrastructure to identify vulnerabilities and areas for improvement. Collaborate with...
- ...About the Role The Software Security Engineer plays an essential role in protecting Amartha from evolving cyber threats. You will be part of our dynamic security team, focusing on identifying and mitigating security risks across our technology stack. About the...
- ...to enable real-time account to account transfers through our platform, and on the other-side we’re giving consumers a reliable and secure payment experience which is better than anything else they’ve experienced in the Indonesian ecosystem. #128640; Where We Are Now...
- ...footprint data to ensure accurate credit assessment. We are looking for a highly skilled and experienced Cloud Infrastructure Security Engineer (SDE4) to join our team as an Individual Contributor . In this critical role, you'll be responsible for leading projects...
- ...Job Title: Security Advisor - Government Identity Card Domain Location: Remote Type: Full Time Salary: Competitive Job Summary The Security Advisor in the Government Identity Card domain will play a crucial role in ensuring the integrity, security, and...
- ...About the Role The Enterprise Security Engineer plays a crucial role in Amartha. You will be the warrior who will spearhead various Enterprise Security programs to protect Amartha from internal and external threats. About the team The Information Security team...
- Job Description: ~Monitor IT Security threats identified by the client’s security software and co-ordinate any responses or actions that may be required. ~Monitor IT Security in Network, System and Database ~Review the effectiveness and relevance of security controls...