About the Role The Senior Cloud Security Engineer plays a crucial role in Amartha. You will be the warrior who will spearhead various Information Security programs to protect Ama…
Hello jobseekers! One of our ATM System client in the tech industry is looking for a IT Security and Compliance Assistant Manager to join their team with the following details: C…
DESKRIPSI LOWONGAN KERJA Informasi Tambahan Lowongan Kerja Tingkat Pekerjaan : Kualifikasi : Requirements for Junior IT Security Analyst: Candidates must possess at least…
Develop and oversee key performance indicators (KPIs) for security. Oversee service level agreements (SLAs) for security operations and create risk-based dashboards for reporting.…
Strategic Leadership: Provide strategic direction and vision for the company's cybersecurity posture, aligning it with business objectives and industry best practices. Security G…
Alterra Bills is looking for IT Security Analyst who will be responsible for assessing, configuring, and maintaining security IT infrastructure, systems, and applications against p…
Job Description: Control Risks is currently looking to hire a Country Security Lead to support a global banking client and assume responsibility for the physical security of the …
What We Do At Coda, we break down barriers between publishers and their audiences by thinking outside of the app. Coda is trusted by 300+ top digital content publishers - includi…
Jakarta, Indonesia Security - Application Security / Full-time / Hybrid The Cybersecurity and Data Privacy team reports directly under the office of the CISO headed by Chie…
Proactively identify and analyze IT security vulnerabilities. Provide expert guidance and recommendations on improving security posture. Mitigate ongoing threats and stay ahead o…
Mekari is Indonesia's no. 1 Software-as-a-Service (SaaS) company. Our mission is to empower businesses and professionals to progress effortlessly. Our products (Mekari Talenta, Mek…
Monitor network traffic and log activity to detect cyberattacks and anomalies. Configuration and Management of Security Devices: Design, configure, and manage device security, in…
Building and maintaining system security Conducting system security testing Performing assessments on security products that will be implemented Carrying out Proof of Concept (P…
Monitor the security access and report probable cyberattacks to a superior employee in the company Perform risk analysis and security operations to find any vulnerability that ca…
Introduction The 'IBM Ecosystem' includes thousands of partners who 'Build' on, 'Sell' or 'Service' IBM technologies and platforms. As a Technical Sales OR Partner Technical Speci…
A. Policy and procedure Make research and initial drafts of a policy and procedures. Implementing IT Information Security procedure and policy. B. Communication Create initiative…
Jakarta, Indonesia Security - Blockchain Security / Hybrid The Cybersecurity and Data Privacy team reports directly under the office of the CISO headed by Chief Information S…
Company Description Life at Grab At Grab, every Grabber is guided by The Grab Way, which spells out our mission, how we believe we can achieve it, and our operating principles …