Your Browser is Not Supported
To ensure jobstore run smoothly, please use the latest version of the following supported browsers:
AIA Digital+ is a Technology, Digital and Analytics innovation hub dedicated to powering AIA to be more efficient, connected and innovative as it fulfils its Purpose to help millions of people across Asia-Pacific live Healthier, Longer, Better Lives.
If you are hungry and driven to play an active role in shaping a better tomorrow, we want to hear from you. Because the work we do at AIA Digital+ makes a difference in the lives of millions of people, every day. We will equip you with the critical skills, tools and technology, and endless opportunities to learn, contribute and thrive in a dynamic and exciting environment.
If you want to shape a brighter future at AIA Digital+, please read on.
About the Role
Responsible for ensuring the security and integrity of AIA's information systems and cyber environment• Develop AIA's information technology security procedures and overall cyber security framework
• Evaluate, test, recommend, coordinate, monitor and maintain IT security policies, procedures and systems including access management for both hardware and software
• Design, implement and troubleshoot various information systems and cyber security software to identify security risks and exposures
• Determine the causes of security violations and suggest procedures to halt future incidents
• Conduct evaluation and testing of hardware and software for possible impact on system security
• Investigate and resolve security incidents such as intrusion, frauds, cyber attacks or data leakage
Build a career with us as we help our customers and the community live healthier, longer, better lives.
You must provide all requested information, including Personal Data, to be considered for this career opportunity. Failure to provide such information may influence the processing and outcome of your application. You are responsible for ensuring that the information you submit is accurate and up-to-date.
Official account of Jobstore.
Role summary:
As part of the ongoing growth of Experian’s Global Finance Services (GFS) organization, an experienced, motivated and proactive General Ledger Analyst is needed to provide the accounting acumen and reporting required by Experian’s Group Financial Reporting function. This challenging role will be based in Experian’s Global Delivery Centre in Cyberjaya, Malaysia and be part of the Record to Report team (R2R), a key and growing part of the GFS team.
Work that matters - What you’ll be doing:
Official account of Jobstore.
Role summary:
The role would offer a mixture of streamlining existing tasks and assisting with stabilizing and migrating new tasks into the KL SSC. As a result, there will be regular changes in the composition of your responsibilities.
Work that matters - What you’ll be doing:
Official account of Jobstore.
Worker Sub-Type:
RegularJob Description:
PURPOSE
The role of Threat Research Investigations is to monitor and adapt to the ever-changing threat landscape. As a Senior Threat Research & Intelligence Analyst you will be responsible for collecting, analyzing, and interpreting data to identify and mitigate potential security threats. You will identify and analyze new adversarial tactics, techniques and procedures (TTPs) and apply these findings to proactive use cases. You will be a subject matter expert in analyzing malicious files and be an escalation point for the other members of the team. As the Senior Analyst you will possess and develop strong technical and interpersonal skills and will have the ability to handle high profile research. You will mentor junior analysts and contribute to the development of best practices.
In return for your talent and enthusiasm, we will provide you with an attractive compensation & benefits package. You will have the opportunity to thrive in a dynamic environment, working alongside outstanding colleagues. In short, you bring the talent, and we provide the environment, tools and resources for you to succeed, win big and accelerate your professional growth & development in Cybersecurity Centre of Excellence.
KEY RESPONSIBILITIES
In this role you will:
Provide expert knowledge on a wide range of customer focused investigations, threat assessments, and deep dive reports, often with multiple deadlines.
Lead efforts in gathering and analyzing data from various sources to identify potential threats in the region. Utilize advanced analytical techniques to understand threat patterns and behaviors.
Perform reverse engineering (RE), vulnerability research (VR).
Collaborate with other researchers and engineers developing and maintaining automation scripts and tooling when needed.
Document deliverables to facilitate knowledge transfer.
Prepare regular threat intelligence reports for both the internal business and for public consumption.
Work collaboratively with other teams in the business to prepare in-depth deep dive reports on actors in the current threat landscape.
Participate in cross team initiatives as a leader and representative of both the Threat Research Investigations team and BlackBerry Threat Research.
Stay up to date on the latest security/threat analysis techniques and tools; attend applicable training, conferences, and learn new tools as needed.
EDUCATION AND/OR WORK EXPERIENCE
Seven years minimum related experience in threat intelligence analysis and malware analysis.
Bachelor’s or high level degree preferred; relevant and demonstrable experience can be substituted for educational degree.
CRITICAL SKILLS
Experience in researching cyber threat and providing actionable intelligence from that research.
Experience in identifying, investigating and documenting techniques and technology relating to threats and threat actors.
Knowledge and application of low-level computer fundamentals including operational knowledge of multiple operating systems.
7 years minimum of experience programming in x86 Assembly, ARM Assembly, C, C++ or Python.
Demonstrate advanced skills in query languages such as SQL, SPL, or similar, for extracting and analyzing data from databases and data lakes.
Work with data lakes to store, process, and analyze large datasets. Ensure efficient data retrieval and high-performance data processing.
Strong understanding of low-level computer fundamentals, assembly, and processor architecture.
Experience reverse engineering COTS software, malware, or hardware.
Proficiency with software version control systems (e.g., Git).
Proficiency with TCP/IP and networking fundamentals.
Excellent oral and written communication skills with strong analytical and troubleshooting skills.
Understanding of virtualization and sandboxing.
Fluent in both Malay and English (written and oral).
OTHER SKILLS
Ideally, you will have:
Experience presenting at technical conferences and leading training sessions.
Experience with data manipulation and analysis in Python and Jupyter Notebooks for creating and sharing documents that contain live code, equations, visualizations, and narrative text.
Proficiency with IDA Pro, Ghidra, Windbg, Ollydbg, GDB, or equivalent debugger.
Experience with fuzzing, crash analysis and runtime instrumentation (AFL, Intel PIN, WinDbg, OllyDbg, etc).
Windows, Linux, Android, iOS kernel experience and development skills.
Low-level system security / programming (e.g., kernel, driver, hypervisor, secure boot).
#LI-JC1
Scheduled Weekly Hours:
40Official account of Jobstore.
We are looking for a Customer Experience Analyst to join our team in Cyberjaya.
As a Customer Experience Analyst, you will provide support for all end-user/ desktop technology requests or issues that customers present.
Your core objective is to restore service for the customer as quickly as is possible and, where further escalation is required, provide a single point of contact and ownership.
Responsibilities
As a valued member of ‘Logicalis Australia’ you will enjoy several benefits, such as;
*Do I need to meet all the requirements to apply?*
No. Studies by several different sources have shown that, on average, men will apply for a job if they meet 60% of the requirements. In contrast, women, non-binary, and neurodivergent people aim for closer to 90%! Please don’t let us miss out on everything you have to offer just because there is some upskilling to do. We can teach the specifics of the job. What we can’t teach is Character – ie Confidence, Capability, Curiosity
About us
We are Logicalis, Architects of Change™. We assist organizations in succeeding in a digital-first world by harnessing our collective technology expertise. Our lifecycle services, including cloud, connectivity, collaboration, and security, optimize operations, reduce risk, and empower employees. As a global tech service provider, we also deliver managed services to provide real-time visibility and insights across clients' digital ecosystems. With 7000+ employees in 27 countries, we help 10,000+ clients globally create sustainable outcomes through technology.
For people living with disabilities, chronic illnesses, or neurodiversity; adjustments and support will be made available to create a more comfortably aligned application process. If you need any specific accommodations (tools, time, etc.), and feel comfortable disclosing this, please let us know and we’ll be glad to facilitate.
Official account of Jobstore.
Worker Sub-Type:
RegularJob Description:
BlackBerry® – the iconic brand you know and trust – is now a market leading security software and services company. As the Internet of Things (IoT) has become the next great wave in business transformation, BlackBerry already secures over 500 million endpoints. We are leading the way with a single platform for securing, managing and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve. BlackBerry’s top customers include all the G7 governments, 9 of the top 10 global financial institutions, automotive OEMs, aerospace, defense, healthcare and media companies. Our mission is “Intelligent Security. Everywhere.”
OVERVIEW
As part of a global team, the ThreatZERO Security Consultant will focus on delivering security services and work with our customers to operationalize and optimize BlackBerry PROTECT and BlackBerry OPTICS in the customer environment.
In return for your talent, enthusiasm and ambitious mindset, we will provide you with an attractive compensation, commission & benefits package. You will have the opportunity to thrive in a dynamic environment with great internal growth opportunities, working alongside outstanding colleagues. In short, you bring the talent and we provide the environment, tools and resources for you to succeed, win big and accelerate your professional growth & development.
In this role, you will:
Work with customers to implement and tune all aspects of BlackBerry PROTECT and BlackBerry OPTICS following proven process
Train customers on solution best practices
Assist customers in dealing with Threats and other findings
Assist in the deployment, tuning, management, and overall operational strategy of the solution in the customer environment,
Ensure the Customer reaches and maintains an optimized configuration state with the solution
Develop tools to assist in deployment and with product configuration
Identify potential opportunities for expansion and growth
You will have:
Bachelor’s Degree with 7 years of experience as a Security Consultant, Security Engineer, Endpoint Security Admin or Analyst
Strong systems and network technical experience
EDR, Threat Hunting, SOC, SEIM and incident response work preferred
Strong Scripting, Python, and or PowerShell skills
Must be able to demonstrate experience
Solid understanding of endpoint security, network/ general security, AV/Malware industry
Ability to plan, develop, and execute solution deployments
Demonstrate excellent communications skills, both oral and written
Experience working with diverse professional clientele with varying skill levels and technical experience/competency.
Ability to partner with internal resources outside of department in a collaborative and beneficial manner
Ability to research highly technical topics, pull together various sources into one concise document and explain technical details clearly and concisely
Excellent time management skills
Flexible and adaptable self-starter with ability to begin to develop trust in first conversation
Must have a passion for your work and an ability to apply that passion to both daily tasks and larger projects
Collaborative and team-oriented attitude
Effective non-linear problem-solving capabilities
Takes initiative and approaches all tasks and projects proactively
Prioritizes and completes multiple tasks with little/no supervision
Approaches life/work with intellectual curiosity, humility, accountability and positivity
Python and PowerShell scripting a plus
Exceptional written and verbal communication skills in both English & Bahasa Malay
#LI-HY1
Scheduled Weekly Hours:
40Official account of Jobstore.
Worker Sub-Type:
RegularJob Description:
Location: KUALA LUMPUR, MALAYSIA
BlackBerry® – the iconic brand you know and trust – is now a market leading security software and services company. As the Internet of Things (IoT) has become the next great wave in business transformation, BlackBerry already secures over 500 million endpoints. We are leading the way with a single platform for securing, managing, and optimizing how intelligent endpoints are deployed in the enterprise, enabling our customers to stay ahead of the technology curve. BlackBerry’s top customers include all the G7 governments, 9 of the top 10 global financial institutions, automotive OEMs, aerospace, defense, healthcare, and media companies. Our mission is “Intelligent Security. Everywhere.”
The position
Red Team Services is a practice within BlackBerry Spark Professional Services who conduct all offensive security focused assessments. The engagements delivered by this group range from results oriented red team assessments to embedded systems reverse engineering and exploitation and everything in between.
The Professional Services - Red Team Security Consultant will deliver consistent, technically sound high-quality engagements. This consultant will deliver many of the core Red Team Services and possess an authority skill level in multiple fields. Consultants must have validated time and project management capabilities. They exercise wisdom, excel at communication and setting expectations, and complete short and long-term red team engagements.
What you will do
Deliver high-quality red team work to critical customers.
Collaborate on research, whitepapers, and conference talks to drive awareness of the practice’s expertise and capabilities
Contribute to tool development, both software and hardware, as well as processes and infrastructure, to advance the capabilities of the practice
Be able to travel to customer locations up to 10%; otherwise, you will work remotely.
Who we are looking for
7 years’ experience as a penetration tester in your area of expertise with experience in consulting preferred with BS/BA
A passion for challenging technical work and the desire to constantly push yourself and excel in both your chosen specialities and new subject areas.
A strong curiosity and desire to discover how a thing works (and how it can be broken) that takes you down the rabbit hole, but also the pragmatism and time management to know when to let it go and try to a different approach.
A desire to share knowledge with your teammates and in turn learn from others.
Strong attention to detail and the compulsion to deliver amazing work as a point of professional pride.
Strong communication and report writing skills, with the ability to succinctly convey technical topics to a non-technical audience.
Exercising good judgement in setting customer expectations, but always meeting those expectations once set.
Deep knowledge in some of the following technical subject areas:
Mobile Application Penetration Testing
Cloud Security (AWS, Azure, GCP, etc.)
Web Application / Web API Penetration Testing
Network Penetration Testing
802.11 Wireless Penetration Testing
Embedded Systems / Hardware Penetration Testing
Social engineering tactics and techniques
Windows/Linux/UNIX/OSX internals
Interpreted languages (Ruby, Python, PHP, etc.)
Compiled languages (Java, C, C++, Assembly, etc.)
Exceptional written and verbal communication skills in both English & Bahasa Malay
Above and beyond
Validated community contributions through published research, CVE’s, conference presentations, publications, media interviews, tool development, etc.
Significant binary and/or hardware reverse engineering experience
Exploit development experience (x86/64 and/or ARM)
#LI-HY1
Scheduled Weekly Hours:
40Official account of Jobstore.