Average salary: SG$3,671 /monthly
More statsGet new jobs by email
- ...Role and Responsibilities: Able to provision, deployment, configuration, and administration of many different pieces of network and security-related hardware and software. These include firewalls, routers, switches, various network-monitoring tools, and virtual private...
- Roles & Responsibilities We're Hiring: Security Officer Our members, guests, and colleagues are at the heart of everything we do. As... ...Comfortable with desk duties and basic computer use. Prior training in CERT and First Aid (AED) will be an advantage. A positive...
- ...Key Responsibilities 1. Deliver comprehensive training programs tailored to the specific requirements of the security industry, including topics such as security procedures, emergency response, surveillance techniques, and conflict resolution. 2. Utilize a variety of instructional...
- ...Join our Digital Infrastructure & Cybersecurity team as a Network & Security Specialist, securing and maintaining IT systems across on-premise... ...cloud environments 5. Collaboration & Support: • Support and train IT staff and end-users on cybersecurity awareness, phishing...
- ...Weare looking for a skilled Endpoint Security Engineer to manage, operate,and enhance our endpoint protection capabilities across the enterprise. Thisrole is responsible for the day-to-day administration, monitoring, andcontinuous improvement of endpoint security controls...
- ...expanding and seeking suitable individuals to apply for the position of Security Officer to perform the following duties and responsibilities :... ...✅ Supportive management ✅ 100% Singaporean workforce Training Provided for Individuals without licence! Our EVP: “At...
- ...Design, deploy, and manage network security solutions such as firewalls, IDS/IPS, VPNs, and NAC Monitor network traffic for security threats and respond to incidents promptly Perform vulnerability assessments, security audits, and penetration testing Implement security...
- ...Good verbal communication skills. Demonstrate a client service orientation. Hands-on proactive in approach. Knowledge on security concepts and application of those concepts. Ability in configuring/managing security controls, such as SIEM, Firewall, IDS/IPS, EDR...
- ...Responsibilities ~ Provide day-to-day end user support of a Secure Service Edge solution in a 24/7 staffed operations ~ Ensure all... ...:30pm – 8:30am). Selected candidates will undergo on-the-job training (OJT) prior to being assigned to the formal shift roster....
- ...candidate will support tasks within the data Protection Portfolio, such as provision of computing resources, installing and configuring security software, managing network/firewall requests, account provisioning, backend integrations (SSO, SIEM, SOAR, MyAccess, DataDog), and...
- ...from the initial presales stage into actual setup for our clients. Responsibilities: Position Overview: As the Senior Network Security Post-Sales Engineer, you will be a key leader within our post-sales engineering team, responsible for overseeing the successful implementation...
- ...Xvantage set us apart. The Channel Presales Engineer, Cyber Security will serve as the primary technical and commercial liaison... ...reseller partners, and end customers through technical expertise, training, and joint go-to-market initiatives. This role blends deep...
- ...(Suppliers) and Hakuto Singapore Sales team together to drive for achieving sales goal. Selected candidate will be receiving product training, which may include product information, product application, maintenance, service support or deal with system breakdowns that occurred...
- ...Provides leadership in presales support, quality assurance, training and will lead the execution of the sales management system to enhance... ..., with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. Our consulting...
- ...Job Highlights Opportunities for in-house training and external courses Work-Life balance mindset Attractive & Competitive salary... ...), Computer Science/Information Technology, Cyber Security or equivalent. ~ At least 1-2 Year(s) of working experience in...
- ...opportunities and workshop sessions Design and implement scalable, secure, and high-performance AI architectures on AWS. Develop and... ...model development lifecycle including (but not limited to) training, fine tuning feature engineering techniques and deployment options...
- ...Oversees and manages the provision of the relevant documentation, training and support to the relevant teams to ensure the highest level of... ..., with unmatched capabilities in enterprise-scale AI, cloud, security, connectivity, data centers and application services. Our consulting...
- ...members and working across various technology domains such as Cloud, Security, Networking, and Applications. You will conduct necessary... ...responsibility is to create knowledge articles for frequent tasks/issues and train junior team members in executing those tasks. Provide inputs to...
- ...Police Regulatory Department (PRD). We specialize in comprehensive security and investigation services for diverse clientele including MCSTs... ...will ensure Acestes maintains its PRD compliance, SSG-approved training standards,and reputation for operational excellence while...
- ...align with: - Enterprise architecture standards - Government security policies - Compliance and audit requirements - Public... ...cases - Test cases and validation criteria - User manuals and training materials Support UAT coordination and traceability of...
- ...strategies to achieve monthly and annual sales targets. Identify and secure new business opportunities within the on-trade and off-trade... ...campaigns. Plan and execute wine tastings, events, and staff training sessions for trade partners. Ensure proper product placement,...
- ...Business Development & Growth: · Proactively identify, target, and secure new customers and accounts. · Recruit, manage, and develop a... ...: Excellent opportunities for career development and overseas training. Join Us If you are a motivated sales leader with a...
- ...Provide day-to-day operational support and maintenance of the Cyber Security service in a 24/7 staffed Operations · Ensure all incident... ...cyber security are welcome Other Working Conditions · On Job Training (OJT) will be provided · Able to perform 12-hour shift duties...
- ...You will be responsible for developing and driving effective IT security programs involving activities such as reviewing and developing security... ...exercise To conduct information security awareness training Point of contact to assist and advise customer for ICT security...
- ...across two or more technologies, namely Networking, Data Centre, Security, Customer experience, Collaboration and/or End User Compute.... ...Administrator Associate (MD-100, MD-101); Microsoft Azure Fundamentals Training & Certification (AZ-900); Microsoft 365 Certified - Teams...
- ...with Global and Regional requirements, including risk assessment, training and communications, and enhanced controls (including third-party... ...stakeholders (e.g., HR, Legal, Internal Audit, Finance, Security, Marketing, Warehouse, and other functions) to identify, mitigate...
- ...While Keyence products are highly technical, you will receive the training to become an expert on our products, solving applications,... ...you. Respond promptly and efficiently to customer requests. Secure new customers consistently and efficiently. Travel to customer...
- ...delivering Excellent QSC standards Interviews, conducts OJEs and trains restaurateurs based on profit center needs and goals Supports... ...employees on all appropriate HR policies, labour laws, security and safety procedures Supports,coaches, consults, develops and...
- ...system performance and identify improvement opportunities Support security remediation and compliance initiatives Analyze AWS resource... ...cases, and system documentation Support system testing, user training, and change management Perform data analysis and create...
- ...create, manage and continuously improve electronic batch records, securing a smooth transition from project and tech transfer into routine... ...-exception workflows). Change Management: Leading adoption, training, and governance/template rollout across site or network. Data...
