Reviewing Online Videos//Content/Complaints/Legal Notices received from the end customer on any incorrect decisions taken related to their copyright work/material Reviewing/updating contents on a popular social media platform Audit of content rec
The TEH Group is looking for a Graphic Designer to create engaging and on-brand graphics for a variety of media. We believe that graphics should capture the attention of those who see them and communicate the right message.
We are doing a Financial Consultant. Also known as Financial Advisors, we provide advice to clients on taxes, retirement planning, investments, and insurance decisions to help clients achieve their financial objectives.
Greetings from AMK Group of Companies!!! Positions :Senior System Admin - Level 2 Support Job Type : 03 Month extended project Location : Cyberjaya Malaysia Payroll : AMK Technologies , Notice Period : Who can join immediately or Max 2 Weeks
Monitor day-to-day operation for server and network devices and connectivity, SAN storage, tape, operation report, batch job, ensure workable. Provide OS support related activities such as corrective & preventive maintenance patching & configuration.
Our client is an established IT consulting and software provider, specializing in banking and insurance. Be part of a team responsible for the architecture design, installation, configuration, technical support and maintenance of systems.
Resident Engineer to provide day-to-day operation service deliveries (i.e. Incident, Problem, Asset & Change Management) then to track, monitor and close the assigned service calls / tickets in meeting customer Service Level Agreement.
Job Title: IT Infrastructure Team Leader (Network) Location: Cyberjaya Job type: Permanent • Experience in managing and implementing the following (mandatory): o Basic network routing and switching o Cisco Nexus/Catalyst o Load Balancer (A10, F5)
We are hiring for Head of Cyber Security (MSSP) accountable to safeguard all IT systems and operations from potential security threats and exposure through the development, execution and enforcement of information security controls and policies