Average salary: SG$9,000 /monthly
More statsGet new jobs by email
- ...perform in a team environment. ~ Familiar with OOP design principles and strong Java development skills. ~ In-depth knowledge in secure coding practice. Familiar with code quality tools and enjoy following clean code practice. ~ Knowledge of GIT and experience in...
- 1. Access Control & Security Operations Manage and supervise all site access control processes for personnel, vehicles, and goods.... ...readiness. Oversee daily patrol operations and PIP (Proprietary Information Protection) duty execution. Promote and implement PIP...
- ...responsible for defining and overseeing the organization’s application security architecture, ensuring alignment with target architectures and... ...| YOU WILL HAVE: Bachelor’s degree of computer science, Information Security, or a related field. A Master’s degree would be an...
- ...Education / Experience: Diploma / Degree in IT / Computer Science / Engineering or equivalent Professional certifications in cyber security solutions preferred At least 5 years of experience in cyber security maintenance role or IT security operations Experience in...
- ...Position: Technical Manager (CCTV / Security Systems / ELV) Location: Outram (Office-based) Working Hours: Monday to Friday, 8.30am - 6.00pm Salary (commensurate with experience): Up to $7,500 + Transport Allowance/Reimbursement + AWS + Performance Bonus + Mobile Reimbursement...
- ...Key Responsibilities Oversee and support daily security operations across manufacturing facilities to ensure safety, compliance, and business continuity Monitor access control systems, CCTV, and alarm systems to safeguard critical infrastructure and assets Identify...
- ...you’re not just safeguarding AIA’s financial wellbeing. You’re securing a better future for the people and communities we serve - today... ...Healthier, Longer, Better Lives. You must provide all requested information, including Personal Data, to be considered for this career...
- ...professionally receiving clients and visitors. 2. Documentation & Information Flow Administrative staff act as the "librarians" of... ...the administrative application process for staff entering high-security semiconductor sites. Compliance Documentation: Assisting with...
- ...supervisor. · Comply and follow all procedures within the company security policy. · May perform other duties and responsibilities as... ...basic algebra and geometry. · Ability to effectively present information and respond to questions from groups of managers, clients,...
- ...Education /Experience: o Minimally possess a BachelorDegree in Information Technology/Computer Engineering o Minimally 2 years of... ...administration, virtual machine, storage & backup system,network & security management o Have experience and knowledgeabout security...
- ...taxonomy Respond to technology questionnaires, request for information, other requests from the MAS Acts as the SME on Technology Compliance... ...HAVE Bachelor's degree in computer science, information security, or a related field. Relevant certifications such as CISA,...
- ...you're not just safeguarding AIA's financial wellbeing. You're securing a better future for the people and communities we serve - today... ...Healthier, Longer, Better Lives. You must provide all requested information, including Personal Data, to be considered for this career...
- ...Job Responsibilities Proactively identify and secure new project opportunities and customers. Answer customers’ enquiries on product... ...Keep updated with the market such as new projects, competitors’ information, etc. Understanding the local standards and requirements for...
- ...with our ERP and WooCommerce platforms, and maintaining robust IT security practices. This role requires a proactive and hands-on... ...Requirements: Educational Background: Diploma or degree in Information Technology, Computer Science, or a related field. Technical...
- ...consumables Main Responsibilities: Identify, prospect, and secure new customers in target industries Maintain and grow... ...service industry is preferred Email to: [HIDDEN TEXT] for more information. Do visit and for more job listings and career tips! ...We...
- ...for Delivery: Carefully and accurately pack products for outbound shipments, ensuring items are secure and protected during transit. Label packages with shipping information and handle necessary documentation. Tailor and enhance products with accessories as per the order...
- ...expectations. Ensure project management principles are strictly adhered in all areas including Risk Management. Governance & Security – Ensure information security policies are implemented across all IT functions and strictly adhered. Conduct periodic assessment, identify gaps...
- ...Troubleshoot hardware, software, and network issues. Ensure system security through access controls, firewalls, and patch management.... ...& Experience: ~ Bachelor’s degree in Computer Science, Information Technology, or related field. Technical Skills: Proficiency...
- ...IT procurement Support cybersecurity awareness and good IT security practices Coordinate with vendors, internal teams, and offshore... ...and support audit preparation Requirements: Diploma in Information Technology, Computer Science, Business IT, or related field...
- ...Windows and Linux servers Ensure servers are up to date with security patches Maintaining and upgrading existing infrastructure as... ...: ~ Minimum Diploma in Computer Science, Business Information Technology or relevant field ~2 years of relevant experience...
- ...Conduct regular store / outlets meetings to disseminate and collect information. · Ensure thorough and smooth implementation/launch of new... ...scheduling, ensuring sufficient manpower in the store / outlets to secure a smooth operational flow. · Ensure accurate and prompt...
- ...supervisor. • Comply and follow all procedures within the company security policy. • Additional duties and responsibilities as assigned.... ...to write correspondence. Ability to effectively present information in one-on-one and small group situations to customers, clients,...
- ...· Provide communication forum for the exchange of ideas and information with the department. · Organize verbal and written ideas clearly... ...by supervisor. Comply with all procedures within the company security policy. MINIMUM REQUIREMENTS Bachelor’s degree in...
- ...Comply, follow, and enforce all procedures within the company security policy. · May perform other duties and responsibilities as assigned... ...and create procedural manuals. Ability to effectively present information or training material and respond to questions from relatively...
- ...connectivity. Network and firewall management to safeguard sensitive information and prevent unauthorized access. Constructing network... ...downtime and maintain efficient operations. Install security products such as WAF, firewall, proxy, and antivirus, and manage...
- ...Sales & Business Development Proactively identify, prospect, and secure new corporate business opportunities through outreach,... ...financial planning solutions. Conduct market research to stay informed on industry trends, competitor activities, and client pain points...
- ...asset records • Perform day-to-day IT infrastructure health and security monitoring and checks • Troubleshoot infrastructure and... ...Requirements • Diploma/Bachelor of Science in Computer Science/Computer Information Systems or equivalent • Entry level welcome or relevant...
- ...records to enable supply of spare parts for older systems. To ensure that adequate security is maintained at all times to prevent unauthorized access of the Company's proprietary information. Liaise with Main Contractors for any coordination process. To understand and...
- .... Ensure the efficient and timely exchange of knowledge and information within the Jabil Corporation to ensure best practices are shared... ...organization. . Comply and follow all procedures within the company security policy. . May perform other duties and responsibilities as...
- ...as Microsoft, server, workstations, firewall, emails, internet security, VPN, VOIP and data backup. To support and maintain the activities... ...policy and contract. Requirements: Diploma or Degree in Information Technology, Computer Science or related field At least 2-3...
