A global software company mainly focused in East Asia & South East Asia market.
Create software platform systems with information integrity, security, and privacy
Participate in software system service tasks while understanding business logic and functional requirements. Propose architecture design, software development, testing, release, and user feedback throughout the entire process
Proactively collaborate with software project managers, cross-team software engineers, and software test engineers to jointly create high-quality software systems with a mature and thoughtful approach
Address frontend issues efficiently, avoiding pitfalls in problem-solving. Seek and implement long-term solutions to reduce or prevent negative user experiences, ensuring uninterrupted business operations and services
Willingness to embrace collaboration, deliver high-quality work, commit to team goals, and actively support them through actions
Possess imagination and curiosity, explore business logic with a fresh perspective, and use software development to bring ideas to life
Solve real-world problems using technology, and be willing to dive deep into research and complete tasks promptly
Enthusiastic about providing users with an intuitive and friendly interface, and willing to actively respond to user feedback
Over 3 years of experience in React and Redux application development
Bachelor's degree, preferably in Information Engineering or Information Management
The IT Services Company is seeking a skilled Security Engineer who is passionate about security and holds extensive expertise in the field. In this position, you will be responsible for designing, implementing, and overseeing security measures to safeguard our computer systems, applications, and infrastructure. This includes handling aspects such as WAF, DDoS, DNS, Networking, VPN, and more.
We are currently seeking a capable Sr. Security Engineer to take charge of our company's security operations. this role will be responsible for the strategic planning, coordination, execution, and reporting of technical assessments and audits related to networks, applications, system development, and IT processes. The primary objective is to fortify our defenses against cyber threats and potential attacks.