Jobs (InfoComm Technologies)

Techknowledgey Pte Ltd
26Apr
Full Stack Mobile Developer (SGD 6-8K)
Techknowledgey Pte Ltd

This posting is on behalf of our client - Symphony Creative Solutions - an innovation leader of IT solutions in the shipping and logistics industries.Symphony Creative Solutions is looking for a Full Stack developer to take on a key role on our team. This individual will be working alongside a lean team to build world class technology solutions for the shipping and logistics industry.Job Description:Designing overall architecture of    Read more

the applicationMaintaining quality and ensure responsiveness of applicationsMaintain code integrity and organizationUnderstanding and implementation of security and data protectionCreating product prototypes through lean and agile methodologies based on hundreds of solution ideas from the industryJob Requirement:4 - 6 years of professional software development experienceExperience with Ruby on Rails, and related librariesExperience of Mobile development (Android or iOS or both)Experience configuring and deploying servers on a commercial cloud provider (AWS, Google, Azure, etc.) with a strong preference towards AWSExperience with RESTful APIs is essentialWork on full development life cycle of web development projectsExperience in a startup environment would be beneficialConversational ability in Japanese will be an added advantage. Note that this is not mandatoryDegree in Computer Science, Information Technology, Information Systems Engineering or related fieldsPlease do upload your resume in PDF format.

Techknowledgey Pte Ltd
26Apr
Assistant Technical Project Manager (SGD 4-6K)
Techknowledgey Pte Ltd

This posting is on behalf of our client - Symphony Creative Solutions - an innovation leader of IT solutions in the shipping and logistics industries.Symphony Creative Solutions is actively seeking a talented and experienced assistant technical project manager to oversee a wide variety of projects from conceptual design through implementation. You will have the chance to network with clients, vendors, and in-house personnel as well as form a    Read more

dream team of experts for each project to maximize resources and efficiency. If you are ready to steer high-level projects to success, they are excited to have you on their team.Job Description:Develop comprehensive project plans that merge customer requirements with company goals and coordinate various managers and technical personnel during all project phases, from initial development through implementation.Monitor project progress continuously and make detailed scheduled reports on measurable items, such as milestones and deliverables.Communicate proactively with all involved personnel to provide encouragement, identify problems, create solutions, and implement efficiency improvements.Analyze economics of project plans and provide actionable feedback relating to cost benefit and return-on-investment standards.Review proposed modifications on project plans, including meeting with interested parties to approve and implement beneficial changes.Oversee acquisition of resources and materials as needed before and during projects by talking with customers, team members, managers, and in-house accountants and negotiating price and payment agreements with vendors.Anticipate details of future projects by communicating directly with customers and staying informed of relevant trends and industry news.Job Requirement:More than 2 years of working experience as a project manager and a proven record in delivering IT projectsWe're looking for an individual with a good technical background, with understanding or hands-on experience in software developmentExperience in using agile or scrum would be preferredExcellent problem-solving and time management skills Working knowledge of JIRA or other workflow toolsBachelor's Degree in Computer Science or related disciplines is strongly preferredConversational ability in Japanese will be an added advantage. Note that this is not mandatoryPlease do upload your resume in PDF format.

Amadeus IT Group SA
25Apr
Senior System Analyst
Amadeus IT Group SA

If you could change one thing about travel, what would it be? At Amadeus, you can make that happen! Travel makes the world a better place and we are fully dedicated to improving it and making it even more rewarding. We are one of the world's top 15 software companies: we provide technology solutions and services within the travel industry.    Read more

Do you have ideas on how to improve travel for everyone? Do you find the idea of working in a diverse, multicultural environment exciting? Are you ready to make an impact across the world? Great, then join us! Let's shape the future of travel together. #shapethefutureoftravel@Amadeus The job of the .Net developer is to design and develop software which meets customer requirements. As part of this job, the developer is expected to design, develop, and maintain programs, functions, and interfaces; write program documentation and test cases; provide information for the creation of user guides, installation manuals, and customization guides; and support and train other colleagues as needed. Understand Customer requirements, Tasks and Issues Design effective and efficient solution to meet the requirements Adhere to good software programming practices Perform effective developer testing of the code Deliver code to QA and follow up to confirm complete resolution Review code written by peers as needed and come up with improvements Team player who can work efficiently with fellow team members Diploma, Advanced/Higher/Graduate Diploma, Bachelor's Degree, Post Graduate Diploma, Professional Degree in Engineering (Electrical/Electronic), Computer Science / Information Technology or equivalent. At least 5 year(s) of working experience in C# .Net & WPF applications. Experience in J2EE web development with Angular is a big plus. General understanding of the business will be required for an optimal performance of the job Advanced PC Skills Hands-on experience in C# .Net and WPF is a must. Good UI/UX aesthetics. Experience in object-oriented development and service-oriented architecture. Good knowledge in Oracle SQL & PL/SQL. Very good knowledge and hands-on experience in Core Java and J2EE. Good experience with web development and core technologies and development (JavaScript, HTML5, CSS3, and Bootstrap). Familiar with spring 3.0, JMS, Hibernate, REST. Familiar with Java EE Application Server Jboss, Linux, UNIX. Experience with AngularJS or similar JavaScript UI framework is a strong plus. Relevant Technical Certifications in Java or Web technologies is a plus. Highly motivated Team player Willing to share knowledge and experience Analytical and capable of discussing solutions with other stakeholders To apply: https://amadeus.contactrh.com/jobs/9064/25072034

Workday
25Apr
Corporate Counsel, Asia Pacific & Japan
Workday

Join our team and experience Workday! It's fun to work in a company where people truly believe in what they're doing. At Workday, we're committed to bringing passion and customer focus to the business of enterprise applications. We work hard, and we're serious about what we do. But we like to have a good time, too. In fact, we run our company with that principle in mind every    Read more

day: One of our core values is fun. Job Description Workday is looking for an experienced lawyer (to be based in Singapore) to join its high-energy, fun-loving Go To Market Legal Team. Reporting directly to the APJ Legal Director, you will provide legal strategy, advice and support for Workday's business and operations throughout APJ including: 1. Workday's various go-to-market subscription and services agreements, statements of work, RFPs, RFIs, other customer-facing agreements, and in relation thereto, providing advice, negotiating, discussing, training and providing strong deal support for all aspects of Workday's' Go To Market transactions; 2. a variety of general corporate and commercial legal services to a number of in-house clients including data privacy, software licensing and subscription, market-entry, cybersecurity and other transactional issues across the region, 3. acting as advisor on legal issues involving the organization’s government and regulatory compliance 4. reviewing legal data and advising organization on appropriate legal action to be taken 5. managing outside counsel, including costs, budgeting, scope, responses, in relation to Go to Market transactions and issues and where relevant, litigation. 6. Demonstrating experience in general corporate matters, including corporate organization, securities compliance, drafting transactional documents, license agreements, advising on data privacy, risk management asset-backed financing, and contract management. Experience preferred in trade secrets, advertising law, registration and other resolutions specific to the computer and technology industry. Requires a law degree. The expectation is that within 3 months, you will become an indispensable resource to the business stakeholders and a trusted leader in the region. We are looking for a Singapore or Australian-qualified lawyer with 5 - 8 years of relevant post-qualification experience, with sound commercial sense. The position requires first rate drafting, analysis and communication skills, plus admission to the bar in Singapore or Australia. Excellent spoken and English language skills are mandatory. Fluency in other regional languages would be advantageous. You must be able to work independently, remain calm under pressure, manage tight deadlines, navigate grey areas, know how to triage and report/escalate issues, and thrive in a high-pressure, fast-paced and constantly changing and evolving environment. You must be mature, innovative and possess creative problem solving skills. You must also have a love for the cloud software and information technology, a great sense of humour and the ability to have fun.

VMware
25Apr
Sr. Information Security Analyst
VMware

The VMware Information Security Operations team detects and responds to cyber threats targeting VMware systems, applications, infrastructure, services, information, and users. We are a highly technical team responsible for the triage, containment, and remediation of security threats. You are expected to have proven experience in threat hunting and technical analysis, as well as team leadership and development experience. As a Sr. Information    Read more

Security Analyst, you are responsible for: Driving primary operational activities for security events and alerts. Leading response support to users, driving user alignment to security policies, and leading issues with the team. Driving hunting operations for security threats and malicious activity, developing related tactics and techniques. Planning and implementation of complex playbooks and standard operating procedures. Collaborating to identify and resolve security events, providing education and communication on security practices. Providing review and oversight of analyst responses to requests, communications, and documentation. Establishing requirements, criteria, and processes for evaluation, implementation, and troubleshooting of security tools in the portfolio. Leading incident communications with other teams. Leading evidence collection, documentation, communications, and reporting. Providing feedback on effectiveness of threat intelligence platform and data sources. Reviewing and approving threat indicators submitted by security analysts. Mentoring other security analysts. Maintaining current knowledge and understanding of the threat landscape and emerging security threats. Maintaining a high level of confidentiality. Required skills and experience: 8 years of experience working in a Security Operations Center (SOC). Strong understanding of incident triage and response practices and methodologies. Experience as an operational shift or team lead. Established as a security authority with thorough command of technical concepts in at least one security monitoring and response domain. Experience with cloud computing and security issues related to cloud environments. Experience performing security event investigations, triage, and response on cloud platforms (Amazon Web Services, Microsoft Azure, Google Cloud Platform). Experience with SIEM platforms (Splunk Enterprise Security), log correlation, and event prioritization. Experience with endpoint security analysis on Windows, Mac, and Linux event data and related tools, including endpoint detection and response platforms. Experience with malware analysis or forensic analysis. Authoritative technical knowledge of Internet security and networking protocols. Understanding of security technologies, including UEBA, SIEM, IDS/IPS, firewalls, endpoint security, content filtering, and packet inspection. Understanding of system hardening techniques and practices. Scripting skills such as Python, Perl, Shell, Bash. Strong analytical skills and ability to identify advanced threats. Ability to communicate effectively at all levels of an organization, across diverse cultural and linguistic barriers, and among a geographically distributed team. Ability to collaborate effectively as part of a team and work independently with minimal supervision. Ability to quickly adapt as the external environment and organization evolves. Ability to rapidly adjust to new challenges and changes in priority. Self-motivated, collaborative, and detail oriented. Positive and constructive attitude. Ability to prioritize projects and operational workload. Excellent written and verbal communications. Availability outside working hours for high priority events. Desired skills/experience/certification: Bachelors degree or equivalent experience. Security certifications such as CISSP, GCIH, GIAC.

VMware
25Apr
Threat Intelligence Analyst
VMware

The VMware Threat Intelligence team actively researches cyber threats targeting VMware systems, applications, infrastructure, services, information, and users. We are a highly technical team responsible for researching, investigating, and responding to cyber threats. You are expected to have proven experience in threat research, threat hunting, and technical analysis. As a Threat Intelligence Analyst, you are responsible for:    Read more

Driving cyber threat analysis, including active tracking of threat actors and TTPs. Managing intelligence collection activities. Security event analysis and development of new detection capabilities. Proactive threat hunting and analysis, including identification and hunting for related TTPs across internal and external repositories. Collecting intelligence artifacts for development of IOCs and converting into actionable mitigations. Development of countermeasures in response to threat actor TTPs. Providing subject matter expertise for implementation of threat analytics. Tactical intelligence review, documentation and processing workflows. Collaboration with other teams to integrate and automate threat intelligence with security tools. Strategic intelligence, including identification of new threat concerns and intelligence requirements. Development and delivery of intelligence briefings and threat summaries. Intelligence sharing and reporting, including threat ratings, shared intelligence integration, standardization of data, and coordination with intelligence providers. Participating in external peer sharing groups. Assisting with incident investigation and forensic analysis. Developing and implementing KPI and metric reporting related the threat analysis. Mentoring other security analysts. Maintaining current knowledge and understanding of the threat landscape and emerging security threats. Maintaining a high level of confidentiality. Required skills and experience: 3-5 years of experience in cyber threat hunting, threat research, and analysis. Strong understanding of threat analysis and incident response practices and methodologies. Experience with cloud computing and security issues related to cloud environments. Experience performing threat research and analysis on cloud platforms (Amazon Web Services, Microsoft Azure, Google Cloud Platform). Experience using SIEM platforms (Splunk Enterprise Security). Experience with platforms used for threat analytics and anomaly detection. Experience with endpoint security analysis on Windows, Mac, and Linux event data and related tools, including endpoint detection and response platforms. Experience with malware analysis or forensic analysis. Authoritative technical knowledge of Internet security and networking protocols. Scripting skills such as Python, Perl, Shell, Bash. Strong analytical skills and ability to identify advanced threats. Ability to communicate effectively at all levels of an organization, across diverse cultural and linguistic barriers, and among a geographically distributed team. Ability to collaborate effectively as part of a team and work independently with minimal supervision. Ability to quickly adapt as the external environment and organization evolves. Ability to rapidly adjust to new challenges and changes in priority. Self-motivated, collaborative, and detail oriented. Positive and constructive attitude. Ability to prioritize projects and operational workload. Excellent written and verbal communications. Availability outside working hours for high priority events. Desired skills/experience/certification: Bachelors degree or equivalent experience. Security certifications such as GCTI, GCIH, GCIA, CISSP.

VMware
25Apr
Sr. Incident Response and Forensic Analyst
VMware

The VMware Security Incident Response Team (vSIRT) responds to cyber threats targeting VMware systems, applications, infrastructure, services, information, and users. We are a highly technical team responsible for managing the response to computer security incidents and forensic analysis. You are expected to have proven experience leading response to advanced threats, investigations, forensic analysis, and training and awareness for large enterprises. As a    Read more

Sr. Incident Response and Forensic Analyst, you are responsible for: Providing subject matter expertise on incident response and forensic analysis. Implementing processes, capabilities, and techniques for incident response and forensic analysis. Responding to security incidents escalated from other teams. Performing triage and analysis on workstations, servers, mobile devices, cloud platforms, and network infrastructure. Performing forensic acquisitions of systems, memory, and volatile data using forensically sound practices. Identification of malware using memory analysis, live forensics, and hard drive forensics. Performing malware analysis through peer collaboration, sandboxed analysis, and reverse engineering. Identifying key Indicators of Compromise (IOCs) from new or unknown malware and developing rules and signatures for detection. Contributing to active threat hunting programs and security monitoring use cases. Contributing to the strategic direction for incident response and forensic analysis capabilities at VMware. Identifying and documenting lessons learned from incidents, participating in remediation requirements definition. Maintaining current knowledge and understanding of the threat landscape and emerging security threats and vulnerabilities. Maintaining a high level of confidentiality. Required skills and experience: 8 years of experience in incident response, forensic analysis, and malware research. Strong understanding of threat analysis and incident response practices and methodologies. Extensive experience with memory and hard drive forensic analysis using industry standard tools (Encase, X-Ways, BlackBag, FTK, Volatility, Rekall, Mandiant Redline, HB Gary Responder Professional, RegRipper, and FTK Imager). Experience with YARA rule and OpenIOC signature creation. Experience with cloud computing and security issues related to cloud environments. Experience with incident response and forensic analysis on cloud platforms (Amazon Web Services, Microsoft Azure, Google Cloud Platform). Authoritative technical knowledge of Internet security and networking protocols. Strong knowledge of Windows, Linux, and OSX operating systems. Scripting skills such as Python, Perl, Shell, Bash. Strong analytical skills and ability to identify advanced threats. Ability to communicate effectively at all levels of an organization, across diverse cultural and linguistic barriers, and among a geographically distributed team. Ability to collaborate effectively as part of a team and work independently with minimal supervision. Ability to quickly adapt as the external environment and organization evolves. Ability to rapidly adjust to new challenges and changes in priority. Self-motivated, collaborative, and detail oriented. Positive and constructive attitude. Ability to prioritize projects and operational workload. Excellent written and verbal communications. Availability outside working hours for high priority events. Some travel required. Desired skills/experience/certification: Bachelors degree or equivalent experience, Masters degree desirable. Security certifications such as GCIH, GCFE, GCFA, GREM, GNFA, GASF, CISSP.

VMware
25Apr
Manager, Information Security Operations
VMware

The VMware Information Security Operations team detects and responds to cyber threats targeting VMware systems, applications, infrastructure, services, information, and users. We are a highly technical team responsible for the triage, containment, and remediation of security threats. You are expected to have solid and applied experience in global information security leadership. As Manager of the Information Security Operations team, you are responsible    Read more

for: Leading and supporting your team, effectively driving team strategy, goals, operational effectiveness, and performance objectives. Establishing daily operations, regular communications, resource planning, providing mentorship, relaying leadership expectations, and leading team activities and projects. Overall accountability for development, implementation, and effectiveness of team playbooks and standard operating procedures. Providing communications across the organization, including senior leadership through resolution of security incidents, driving security standard methodologies, and representing information security with external customers and partners. Partnering with peers on other teams to ensure a consistent customer experience, conveying a positive and professional demeanor, and being a positive catalyst for leading change. Assisting with global security strategy, providing input on selection of capabilities and methods used for security monitoring, and driving improvements. Driving requirements definition, evaluation, recommendation, implementation, and troubleshooting of security tools used by the Security Operations Center (SOC) team. Establishing team and individual goals that support team objectives, coaching and mentoring, and providing career development guidance to members of your team. Maintaining current knowledge and understanding of the threat landscape and emerging security threats. Maintaining a high level of confidentiality and trust with senior leadership. Required skills and experience: 8-10 years of experience working in a global information security team. 5 years of related management experience. Strong understanding of incident triage and response practices and methodologies. Experience with cloud computing and security issues related to cloud environments. Experience leading security monitoring and response capabilities on cloud platforms (Amazon Web Services, Microsoft Azure, Google Cloud Platform). Experience with SIEM platforms (Splunk Enterprise Security). Understanding of endpoint security analysis on Windows, Mac, and Linux event data and related tools, including endpoint detection and response platforms. Understanding of malware analysis and forensic analysis techniques. Understanding of Internet security and networking protocols. Understanding of security technologies, including UEBA, SIEM, IDS/IPS, firewalls, endpoint security, content filtering, and packet inspection. Understanding of system hardening techniques and practices. Strong analytical skills and ability to identify advanced threats. Ability to communicate at all levels of an organization and across diverse cultural and linguistic barriers. Ability to quickly adapt as the external environment and organization evolves. Ability to rapidly adjust to new challenges and changes in priority. Self-motivated, collaborative, and detail oriented. Positive and constructive attitude. Ability to prioritize projects and operational workload. Excellent written and verbal communications. Availability outside working hours for high priority events. Desired skills/experience/certification: Bachelors degree or equivalent experience, Masters degree desirable. Security certifications such as CISSP, CISSP-ISSMP, CISM, CRISC. Project management experience.

VMware
25Apr
Lead Information Security Analyst
VMware

The VMware Information Security Operations team detects and responds to cyber threats targeting VMware systems, applications, infrastructure, services, information, and users. We are a highly technical team responsible for the triage, containment, and remediation of security threats. You are expected to have proven experience in threat hunting and technical analysis, as well as team leadership and development experience. As    Read more

a Lead Information Security Analyst, you are responsible for: Leading primary tactical activities for security events and alerts. Leading response support to users, driving user alignment to security policies, and leading issues with the team. Driving hunting operations for security threats and malicious activity, developing related tactics and techniques. Oversight of the development of complex playbooks and standard operating procedures. Maintenance and monitoring of standards for accuracy and response timelines. Leadership and prioritization of security event resolution, providing education and communication on security practices. Providing review and oversight of analyst responses to requests, communications, and documentation. Establishing requirements, criteria, and processes for evaluation, implementation, and troubleshooting of security tools in the portfolio. Leading incident communications with other teams. Leading evidence collection, documentation, communications, and reporting. Providing feedback on effectiveness of threat intelligence platform and data sources. Reviewing and approving threat indicators submitted by security analysts. Mentoring other security analysts. Maintaining current knowledge and understanding of the threat landscape and emerging security threats. Maintaining a high level of confidentiality. Required skills and experience: 8 years of experience working in a Security Operations Center (SOC). Strong understanding of incident triage and response practices and methodologies. Experience as an operational shift or team lead. Established as a security authority with thorough command of technical concepts in at least one security monitoring and response domain. Experience with cloud computing and security issues related to cloud environments. Experience performing security event investigations, triage, and response on cloud platforms (Amazon Web Services, Microsoft Azure, Google Cloud Platform). Experience with SIEM platforms (Splunk Enterprise Security), log correlation, and event prioritization. Experience with endpoint security analysis on Windows, Mac, and Linux event data and related tools, including endpoint detection and response platforms. Experience with malware analysis or forensic analysis. Scripting skills such as Python, Perl, Shell, Bash. Authoritative technical knowledge of Internet security and networking protocols. Understanding of security technologies, including UEBA, SIEM, IDS/IPS, firewalls, endpoint security, content filtering, and packet inspection. Understanding of system hardening techniques and practices. Strong analytical skills and ability to identify advanced threats. Ability to communicate at all levels of an organization and across diverse cultural and linguistic barriers. Ability to quickly adapt as the external environment and organization evolves. Ability to rapidly adjust to new challenges and changes in priority. Self-motivated, collaborative, and detail oriented. Positive and constructive attitude. Ability to prioritize projects and operational workload. Excellent written and verbal communications. Availability outside working hours for high priority events. Desired skills/experience/certification: Bachelors degree or equivalent experience. Security certifications such as CISSP, GCIH, GIAC.

VMware
25Apr
Sr. Information Security Engineer - Security Testing
VMware

The VMware Security Testing team identifies vulnerabilities affecting VMware systems, applications, infrastructure, and services. We are a highly technical team responsible for vulnerability detection and assessment, risk reviews, security testing, and penetration testing. You are expected to have proven experience in application and infrastructure assessments and penetration testing for large enterprises. As a Sr. Information Security Engineer Security Testing, you are responsible    Read more

for: Performing comprehensive security testing that includes the identification, reporting, and recommendations for identified vulnerabilities. Conducting attack surface reviews and recommending layered defenses to prevent exploits, detect and intercept attacks, and discover threat agents. Performing complex security test data analysis in support of security vulnerability assessment processes, including root cause analysis. Performing security research on known and unknown vulnerabilities. Implementing processes, capabilities, and techniques for security testing. Monitoring external vulnerability disclosure and threat intelligence sources to identify and triage new threats and vulnerabilities targeting VMware. Serving as an escalation point on issues, dependencies, and risks related to security testing. Contributing to the strategic direction for vulnerability management and security testing capabilities at VMware. Supporting compliance and risk management activities, recommending security controls and corrective actions to mitigate vulnerability risks. Providing technical expertise for VMware information security policies and standards. Maintaining current knowledge and understanding of the threat landscape and emerging security threats and vulnerabilities. Maintaining a high level of confidentiality. Required skills and experience: 8 years of experience in application and infrastructure penetration testing. Strong understanding of security testing practices and methodologies. Extensive experience using security testing and analysis tools (Metasploit, Burp Suite, Kali, Wireshark, Nmap, AppCheck, Fortify). Experience using common vulnerability scanning tools (Nessus, Qualys, AppScan, etc). Experience with cloud computing and security issues related to cloud environments. Experience conducting security testing for cloud services (Amazon Web Services, Microsoft Azure, Google Cloud Platform). Expert knowledge of common vulnerability frameworks (CVSS, OWASP Top 10). Expert knowledge of system, application, and database hardening techniques and practices. Experience with security source code review and development experience in C/C++, Java, Python. Authoritative technical knowledge of Internet security and networking protocols. Experience with software development. Scripting skills such as Python, Perl, Shell, Bash. Strong analytical skills and ability to identify advanced threats. Ability to communicate effectively at all levels of an organization, across diverse cultural and linguistic barriers, and among a geographically distributed team. Ability to collaborate effectively as part of a team and work independently with minimal supervision. Ability to quickly adapt as the external environment and organization evolves. Ability to rapidly adjust to new challenges and changes in priority. Self-motivated, collaborative, and detail oriented. Positive and constructive attitude. Ability to prioritize projects and operational workload. Excellent written and verbal communications. Availability outside working hours for high priority events. Some travel required. Desired skills/experience/certification: Bachelors degree or equivalent experience. Certifications such as OSCP, OSCE, GPEN, CEH, CISSP.