Search Results: 15 vacancies
...Role purpose
Control Risks is currently looking to hire a Regional Security Lead to support a global banking client, based in their Singapore regional headquarters. The Cluster Security Lead will provide leadership and mentorship to a team of Security Managers and external...
...valued clients.
The Role :
1. Provide support for internet security surveillance activities.
2. Responsibility for managing and... ...problems. Your expertise and insights will play a crucial role in finding effective solutions.
7. Stay informed about the latest...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...Inventory Support
a. Inventory
- Conduct daily stock checks of products and report findings to Inventory Planner, Senior Security Specialist and Retail Manager.
- Coordinate and follow-up with Retail Operations to resolve inventory issues that require physical checking...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Actxa Pte Ltd.... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...characteristics protected by law.
Protecting your privacy and the security of your data are longstanding top priorities for Activate... ..., and transfer the personal data of our candidates. Here you can find how you can request for access, correction and/or withdrawal of your...
...transportation.
Act as a liaison between executives, clients, vendors, and other stakeholders.
Undertake research and fact-finding missions, as required.
Maintain accurate and detailed records, files, and databases.
Requirements
Bachelor's degree in...
...fulfilling professional projects for our teams, improving efficiency through mutualization, automation and digitalization, assure the security of the activity and the reliability of information, and support our teams to make data based decisions.
To accelerate the...
...of our products & services.
● Ensure the physical availability of our products (store and online stock, orders, etc.).
● Ensure security for me and my customers (store, products and data security).
Benefits
💰 A remuneration That Grows With You:
Kick off with...
...daily tasks (mount, unmount, silo eject, etc.)
• Use of Hewlett Packard Enterprise tools and processes related to Media
Physical Security Activities
• Processing of the Data Centre Access Request
• The data center is manned by security personnel (MAT) on a 24 x 7...