Jump-start your technology career with our team of experts. We have open positions for Software Engineers, Security Analysts, Collaboration Support Engineers, Cyber Security Risk and Governance Analysts, and Application Delivery roles within our Global Technology team. Click the links below to apply for these opportunities. Software Engineer (Java)- https://lnkd.in/g3h9Sv-8 Collaboration Support Engineer - https://lnkd.in/eTse3fQh Security Analyst - https://lnkd.in/gJVaDqa2 Systems Analyst - https://lnkd.in/eRwk-WPC Software Engineer – Full Stack Web Developer - https://lnkd.in/eSsRDGGQ Senior Software Engineer – Full Stack Web Developer - https://lnkd.in/eV_dk4bA Cyber Security Risk and Governance Analyst - https://lnkd.in/gEWPjqGq Visit www.qbe.com/ph to find more open roles in our Manila and Cebu offices. For inquiries, send an email to recruitment.ph@qbe.com.
QBE Group Shared Services Centre’s Post
More Relevant Posts
-
We are hiring again! 12 new roles in the Digital Identity Department are up and waiting for your application... 1 x Project Manager 1 x Systems Analyst 1 x Security Engineer 1 x Software Architect 2 x Senior Rust Developers 2 x Rust Developers 1 x Junior Rust Developer 2 x Java Developers ...but why join our team? Here's 7 good reasons (there's a lot more, trust me). 1. Super interesting projects that you will be hard pushed to find elsewhere. We aren't building the next taxi app, we invent things! 2. An incredible team. We hire right and have assembled a team of talented, self starting and high performing people that are passionate about what they do (and are absolute rock stars too!) 3. Servant leadership management style. I am here to ensure the roadblocks are removed, that you have what you need to do your job, and that you are supported to be able to do your best, no micromanaging! 4. Flexible work environment. After the probation period has been met, I don't mind where you work, when you work, as long as you don't miss the important stuff and that you deliver. That's the deal. 5. Multicultural International team! 7 nationalities and growing across our department offices in Tallinn and Tartu. 6. You are not viewed as a resource, you are viewed as an asset. Resources are used, assets are maintained, invested in and their value increased. 7. It's Cybernetica, you are surrounded by some of the top people in their respective fields. Check out the roles here: https://lnkd.in/dBiwpypT #hiring #digitalidentity
To view or add a comment, sign in
-
10 June 2024 端午節 🔔 我们目前正在招聘 #前端开发、 #后端开发、 #产品经理、 #DBA、 #安全专家、UI/UX 或者其他IT技术岗位。需要Based 马尼拉工作。公司提供签证和食宿。薪资3000-7000USD。我们欢迎来自中国、缅甸、越南、台湾、印度、印尼、马来西亚人才加入我们公司。 We are currently hiring for positions in #frontend development, #backend development, #product management, DBA, UI/UX, security expertise, or other IT technical roles. The job is based in Manila. The company provides visa sponsorship and accommodation. The salary ranges from $3000 to $7000 USD. We welcome talents from #China, #Myanmar, #Vietnam, #Taiwan, #India, #Indonesia, and #Malaysia to join our company. #Hiring #Software #Web #App #Data #CSS #Database #Network #Cloud #Machine #Cybersecurity #Internet #Ecommerce #Artificial #Financial #Gaming #Telecommunications #Cybersecurity #Java #Python #JavaScript #HTML #SQL #Ruby #C++ #PHP #Swift #Kotlin #golang #php #java #spring #React #vue #backend #Firewall #Software #Frontend #Backend #FullStack #DevOps #Vulnerability #Systems #IT #QualityAssurance #Information #Computer
To view or add a comment, sign in
-
Penetration Tester to Application Security Engineer 👀 Remote (Must be in Australia) $150k package Not many jobs come around where you can get employed for your current skills and get training on the job to transition to your next role. Are you ready to turn from a breaker to a builder? Our customer believes software should be the status quo. Their aim is to fundamentally change the approach to secure software, ensuring it influences every aspect of software engineering and customer experience. If this resonates with you, this could be the transition you’ve been looking for. Maybe you’re frustrated with finding bugs but not solving the real issues. And you like the idea of getting closer to the root cause. This is a mid-level role, meaning you’ll be dedicated to a customer for a period of time, predominantly focused on testing web apps. You’ll need to have experience working as a pentester. It wouldn’t be suitable for someone who believes engineers are the problem; instead, they are looking for someone that wants to support, educate, and influence. You need experience in coding/scripting. You should be able to write and understand code in any language. You can be taught manual code review and help build your skills in the application security industry. You’ll work on solving problems and improving secure software, influencing software engineering functions and customer experience. As part of the interview process, you will take part in a coding challenge. It’s not about syntax but about thinking like a programmer. Tasks could include reversing a linked list or building an algorithm to count a grid of emotions. The goal is to demonstrate your ability to think and write software. Sounds interesting? Reach out for some more information :)
To view or add a comment, sign in
-
9 June 2024 🔔 我们目前正在招聘#前端开发、 #后端开发、 #产品经理、 #DBA、 #安全专家、UI/UX或者其他IT技术岗位。需要Based 马尼拉工作。公司提供签证和食宿。薪资3000-7000USD。我们欢迎来自中国、缅甸、越南、台湾、印度、印尼、马来西亚人才加入我们公司。 We are currently hiring for positions in #frontend development, #backend development, #product management, DBA, UI/UX, security expertise, or other IT technical roles. The job is based in Manila. The company provides visa sponsorship and accommodation. The salary ranges from $3000 to $7000 USD. We welcome talents from #China, #Myanmar, #Vietnam, #Taiwan, #India, #Indonesia, and #Malaysia to join our company. #Hiring #Software #Web #App #Data #CSS #Database #Network #Cloud #Machine #Cybersecurity #Internet #Ecommerce #Artificial #Financial #Gaming #Telecommunications #Cybersecurity #Java #Python #JavaScript #HTML #SQL #Ruby #C++ #PHP #Swift #Kotlin #golang #php #java #spring #React #vue #backend #Firewall #Software #Frontend #Backend #FullStack #DevOps #Vulnerability #Systems #IT #QualityAssurance #Information #Computer
To view or add a comment, sign in
-
3 June 2024 📣 我们目前正在招聘#前端开发、 #后端开发、 #产品经理、 #DBA、 #安全专家、UI/UX或者其他IT技术岗位。需要Based 马尼拉工作。公司提供签证和食宿。薪资3000-7000USD。我们欢迎来自中国、缅甸、越南、台湾、印度、印尼、马来西亚人才加入我们公司。 We are currently hiring for positions in #frontend development, #backend development, #product management, DBA, UI/UX, security expertise, or other IT technical roles. The job is based in Manila. The company provides visa sponsorship and accommodation. The salary ranges from $3000 to $7000 USD. We welcome talents from #China, #Myanmar, #Vietnam, #Taiwan, #India, #Indonesia, and #Malaysia to join our company. #Hiring #Software #Web #App #Data #CSS #Database #Network #Cloud #Machine #Cybersecurity #Software #Frontend #Backend #Full Stack #DevOps #Vulnerability #Systems #IT #Quality Assurance #Information #Computer #Internet #E-commerce #Artificial #Financial #Gaming #Telecommunications #Cybersecurity #Java #Python #JavaScript #HTML #SQL #Ruby #C++ #PHP #Swift #Kotlin #golang #php #java #spring #React #vue #backend #Firewall
To view or add a comment, sign in
-
Recently I was approached by a head-hunter from a reputable source working for a reputable source. Or at least, that's what is looked like. They were looking for an experienced, senior developer for mostly remote work with a decent, not outrageous offer as starting salary. For technical pre-interview vetting they provided a repo with a skeleton project and unit-tests. To get an interview you must make all unit-tests pass. As I'm not a node-dev nor currently looking for new dev-job, I was about to fully ignore the offer. But something about this rang a bell somewhere deep and I remembered hearing about this as an attack vector. So I asked for the code and looked a bit deeper in the info they had already provided. The domains of course used Punycode to look like the reputable companies, perfectly reflecting the sites with the key contacts added to comfort the target. The code in the repository was completely harmless and offered a fair challenge to demo understanding of node.js and supposed business domain. The catch was in the dependencies. As any modern application code, it depended on 3rd party libraries. On dependency was one letter off the expected package name and the real package contained preinstall script delivering the real payload of this "offer" when you install the project dependencies. No need to even execute any of the actual code. The scripts detected run-time environment, had separate provisions for Windows, MacOS and Linux (hence using npm preinstall script), it would download and install malware with quite recent privilege escalation exploits (I quickly tested on a full patched sandbox with Windows and Linux, didn't do any in-depth analysis). The code looked like there would be many variants for the payloads from keyloggers to full remote control. So, would you have fallen for this recruitment attack? Be honest. I would have, were I looking for a new job and not have heard about this scam earlier. #security #SupplyChainAttack #recruitment
To view or add a comment, sign in
-
Certified LinkedIn Recruiter || Strategic Sourcing ||Employee Engagement and Retention || Stakeholder Management || Talent Acquisition Professional || Team Leader || Recruitment Operations Specialist
Title: Senior System Analyst Location: Kuala Lumpur, Malaysia Role Type: Permanent. Job Description: Functional Responsibilities · Minimum of 8 years experience working on multiple systems from various industries varying from small to large solutions. · Familiarity with development and database technologies is a must. · Experienced in recommending, sourcing, assessing and evaluating technology/frameworks for specifics projects. · Experienced in troubleshooting systems issues and propose solutions or · workarounds. · Able to develop and maintain system documentation structure. · Experience working with Micro Service architecture · Experience with cloud – preferably AWS · Experienced work in Linux, Java, Tomcat, JBoss, Apache are plus point. Organizational Responsibilities · Strong understanding skills to comprehend existing systems linkages. · Documentation of systems in a systematic way. · Able to gather business needs and make technical recommendations while also being able to communicate business needs of stakeholders to technical teams. · Manage systems issues and error logs, proposing quick fixes and · permanent fixes. · Ability to effectively prioritize and manage recurring or ongoing tasks and one-off projects · Self-sufficient, forward and critical thinking, self-starting, problem solver, and work with little direct supervision. · Keep up with current technical knowledge. If you are interested please share your updated resume at aankit@aryan-solutions.com #SeniorSystemAnalyst #PermanentRole #ITProfessional #FunctionalResponsibilities #DevelopmentTechnologies #DatabaseTechnologies #TechnologyFrameworks #Troubleshooting #SystemDocumentation #MicroServiceArchitecture #CloudComputing #AWS #Linux #Java #Tomcat #JBoss #Apache #OrganizationalResponsibilities #SystemsLinkages #BusinessNeeds #TechnicalRecommendations #ErrorLogs #Prioritization #SelfSufficiency #CriticalThinking #ProblemSolver #CurrentTechnicalKnowledge #CareerOpportunity #JobRequirements #ProfessionalExperience #ITManagement
To view or add a comment, sign in
-
This is a really god example of the threats we are all facing with increasing frequency. The attack vectors are constantly changing - and this is why a structured and continuous approach to cyber security is important for any business of today. Thanks for sharing Antti Kuntsi and Thomas Henriksen
Recently I was approached by a head-hunter from a reputable source working for a reputable source. Or at least, that's what is looked like. They were looking for an experienced, senior developer for mostly remote work with a decent, not outrageous offer as starting salary. For technical pre-interview vetting they provided a repo with a skeleton project and unit-tests. To get an interview you must make all unit-tests pass. As I'm not a node-dev nor currently looking for new dev-job, I was about to fully ignore the offer. But something about this rang a bell somewhere deep and I remembered hearing about this as an attack vector. So I asked for the code and looked a bit deeper in the info they had already provided. The domains of course used Punycode to look like the reputable companies, perfectly reflecting the sites with the key contacts added to comfort the target. The code in the repository was completely harmless and offered a fair challenge to demo understanding of node.js and supposed business domain. The catch was in the dependencies. As any modern application code, it depended on 3rd party libraries. On dependency was one letter off the expected package name and the real package contained preinstall script delivering the real payload of this "offer" when you install the project dependencies. No need to even execute any of the actual code. The scripts detected run-time environment, had separate provisions for Windows, MacOS and Linux (hence using npm preinstall script), it would download and install malware with quite recent privilege escalation exploits (I quickly tested on a full patched sandbox with Windows and Linux, didn't do any in-depth analysis). The code looked like there would be many variants for the payloads from keyloggers to full remote control. So, would you have fallen for this recruitment attack? Be honest. I would have, were I looking for a new job and not have heard about this scam earlier. #security #SupplyChainAttack #recruitment
To view or add a comment, sign in
-
Our client is an international banking group in Brussels Job title Full Stack Developer (ReactJS Developer with Java skills) Start date 01/04/2024End date 31/03/2025Description FullStack developer – Software development Willing to push the boundaries with us for a more sustainable world? Are you passionate about protecting the digital realm from evolving cyber threats? Do you thrive on the challenge of staying one step ahead of cyber criminals? If so, we have the perfect opportunity for you! The world changes at lightning speed. You, as professional, will play a crucial role in protecting our employees, our data, ensuring our systems integrity and staying ahead of evolving cyber threats. You will arrive in an environment where continuous learning is part of our DNA. Within CyberSecurity department, the entity at the heart of the bank Security, you will be part of the squad ‘Fraud Investigation & case handling services’, team directly contributing to the Bank Fraud detection services. Your future job You are in the lead of the implementation of the Front-End interface and its related back-end development. You refine this implementation into small Agile iterations from the definition, design and build of the activities to the deployment of the new package in PROD. You focus on the best possible user experience, performance, quality, and uptime of the application by: Using all best practices at each stage of the DevSecOps pipeline. Identifying & solving bottlenecks. Ensuring High Code quality and organization. Highlight your strengths You’re the physical embodiment of the scrum values: involvement, focus, openness, and respect, with a good dose of courage to boot. You’re inquisitive and driven—and you’re always on the ball. You thrive in a team environment, happily sharing your knowledge and insights. You are quick to make connections and dare to question everything that deserves it. You’re able to work under pressure 😊. You always search to improve yourself by learning new technologies, methodologies and/or how to be a better you. You are excited by having responsibilities, making decisions & vulgarizing them. You have a great knowledge of English. Dutch/French knowledge is a plus. You have (at least) 6 years’ experience as developer: Strong expertise on the Front-end side with at least 1-2 years’ experience on the back-end side. You have (at least) a strong interest in the Security domain such as the Fraud Detection. You know your way around: Security embedding in the DevOps pipeline. Continuous Integration/Continuous Delivery. Clean code principles and apply them effectively. Test driven development. Scripting and incident handling. You surprise us with your experience in the following technologies/programming languages: (Most important): ReactJS, Java Spring (Boot) Gitlab Jenkins SonarQube Fortify Maven
To view or add a comment, sign in
-
Beware of the scammers! Very interesting approach here:
Recently I was approached by a head-hunter from a reputable source working for a reputable source. Or at least, that's what is looked like. They were looking for an experienced, senior developer for mostly remote work with a decent, not outrageous offer as starting salary. For technical pre-interview vetting they provided a repo with a skeleton project and unit-tests. To get an interview you must make all unit-tests pass. As I'm not a node-dev nor currently looking for new dev-job, I was about to fully ignore the offer. But something about this rang a bell somewhere deep and I remembered hearing about this as an attack vector. So I asked for the code and looked a bit deeper in the info they had already provided. The domains of course used Punycode to look like the reputable companies, perfectly reflecting the sites with the key contacts added to comfort the target. The code in the repository was completely harmless and offered a fair challenge to demo understanding of node.js and supposed business domain. The catch was in the dependencies. As any modern application code, it depended on 3rd party libraries. On dependency was one letter off the expected package name and the real package contained preinstall script delivering the real payload of this "offer" when you install the project dependencies. No need to even execute any of the actual code. The scripts detected run-time environment, had separate provisions for Windows, MacOS and Linux (hence using npm preinstall script), it would download and install malware with quite recent privilege escalation exploits (I quickly tested on a full patched sandbox with Windows and Linux, didn't do any in-depth analysis). The code looked like there would be many variants for the payloads from keyloggers to full remote control. So, would you have fallen for this recruitment attack? Be honest. I would have, were I looking for a new job and not have heard about this scam earlier. #security #SupplyChainAttack #recruitment
To view or add a comment, sign in
4,146 followers