Security Jobs in Hong Kong

Find the Best Security Jobs in Hong Kong: Your Comprehensive Guide

Hong Kong, a global hub for finance and technology, presents a robust and ever-evolving job market, particularly within the security sector. The demand for skilled security professionals is driven by the city’s complex infrastructure, stringent regulatory environment, and increasing cybersecurity threats. Let’s examine the nuances of Hong Kong’s security job market, providing essential information for job seekers looking to establish or advance their careers.

Why Security in Hong Kong?

Hong Kong’s strategic importance as an international business center makes it a prime location for security professionals. Several factors contribute to the high demand:

  • Financial Hub: The concentration of financial institutions requires robust security measures to protect assets, data, and infrastructure.
  • Technological Advancement: The rapid adoption of new technologies in various sectors necessitates cybersecurity experts who can safeguard systems and networks.
  • Regulatory Environment: Strict data protection and compliance regulations drive the need for professionals who can navigate and enforce these standards.
  • Geopolitical Factors: Hong Kong’s unique geopolitical position adds another layer of complexity, increasing the importance of comprehensive security strategies.

These elements create a dynamic environment with diverse opportunities, from cybersecurity to physical security and risk management.

Most Popular Security Jobs in Hong Kong

The security job market in Hong Kong encompasses a wide range of roles, each requiring a specific skill set and expertise. Here are some of the most sought-after positions:

  • Cybersecurity Analyst: Responsible for monitoring and analyzing security systems, identifying vulnerabilities, and responding to security incidents. This role requires a deep understanding of network security, threat intelligence, and incident response methodologies.
  • Information Security Manager: Oversees the development and implementation of security policies and procedures, ensuring the confidentiality, integrity, and availability of information assets.
  • Security Architect: Designs and implements security infrastructure, ensuring it aligns with business requirements and regulatory standards. This includes selecting appropriate security technologies, configuring systems, and conducting security assessments.
  • Risk Manager: Identifies and assesses potential risks, develops mitigation strategies, and monitors the effectiveness of risk controls. Expertise in frameworks like ISO 27001 and COBIT is often required.
  • Penetration Tester (Ethical Hacker): Conducts simulated attacks on systems and networks to identify vulnerabilities and weaknesses. This role demands a solid understanding of hacking techniques, security tools, and exploit development.
  • Compliance Officer: Ensures that the organization complies with relevant laws, regulations, and industry standards related to data protection and security.
  • Physical Security Manager: Manages the security of physical assets and facilities, including access control, surveillance systems, and security personnel.
  • Data Protection Officer (DPO): Responsible for overseeing data protection strategies and ensuring compliance with data protection laws, such as the Personal Data (Privacy) Ordinance (PDPO) in Hong Kong.
  • Cloud Security Engineer: Specializes in securing cloud-based systems and applications, addressing unique challenges such as data residency, access management, and compliance in cloud environments.
  • Security Consultant: Provides expert advice and guidance to organizations on security matters, including risk assessments, security audits, and the development of security strategies.

Industries Served by Security Jobs

The demand for security professionals spans across various industries in Hong Kong, each with its own unique security requirements and challenges. Here are some of the key sectors:

  • Financial Services: Banks, insurance companies, and investment firms require robust security measures to protect sensitive financial data and maintain customer trust. This sector often deals with sophisticated cyber threats and regulatory scrutiny, demanding high levels of security expertise.
  • Technology: Technology companies, including software developers and IT service providers, face constant threats to their intellectual property and customer data. They need experts in application security, cloud security, and secure development practices.
  • Retail: Retail businesses, especially those with an online presence, must protect customer data and prevent fraud. Security measures include secure payment processing, data encryption, and monitoring for suspicious activities.
  • Healthcare: Healthcare organizations handle highly sensitive patient data, making them attractive targets for cyberattacks. They require professionals who understand healthcare-specific security regulations and can implement appropriate safeguards.
  • Government: Government agencies need to protect critical infrastructure and sensitive information from cyber espionage and other threats. Roles in this sector often involve national security and require high-level security clearances.
  • Logistics and Transportation: Ensuring the security of supply chains and transportation networks is vital. This includes securing data related to shipments, protecting against theft, and maintaining the integrity of logistics systems.
  • Education: Educational institutions handle student data and need to protect their networks and systems from cyber threats. This sector requires professionals who can balance security with the need for open access and collaboration.

Security Jobs by Specialty

Within the broader security field, various specialties cater to specific areas of expertise. Understanding these specializations can help job seekers focus their career paths and develop the necessary skills:

  • Network Security: Focuses on securing computer networks and infrastructure from unauthorized access and cyber threats. This includes implementing firewalls, intrusion detection systems, and VPNs.
  • Application Security: Deals with securing software applications from vulnerabilities and attacks. This involves secure coding practices, vulnerability assessments, and penetration testing.
  • Cloud Security: Specializes in securing cloud-based systems and data. This requires expertise in cloud platforms such as AWS, Azure, and GCP, as well as cloud security tools and techniques.
  • Data Security: Focuses on protecting sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction. This involves data encryption, access controls, and data loss prevention (DLP) measures.
  • Endpoint Security: Secures end-user devices such as laptops, desktops, and mobile devices from malware and other threats. This includes implementing antivirus software, endpoint detection and response (EDR) solutions, and mobile device management (MDM) policies.
  • Identity and Access Management (IAM): Manages user identities and access rights to ensure that only authorized users can access specific resources. This involves implementing authentication, authorization, and privileged access management (PAM) systems.
  • Incident Response: Focuses on detecting, analyzing, and responding to security incidents to minimize their impact and prevent future occurrences. This requires expertise in incident handling, forensics, and threat intelligence.
  • Security Governance, Risk, and Compliance (GRC): Encompasses the policies, processes, and controls that ensure an organization’s security practices align with business objectives and regulatory requirements. This involves risk assessments, security audits, and compliance reporting.

Essential Skills for Security Professionals in Hong Kong

To succeed in the competitive security job market in Hong Kong, professionals need a combination of technical skills, soft skills, and industry knowledge. Key skills include:

  • Technical Skills:
    • Network Security: Proficiency in network protocols, firewalls, intrusion detection/prevention systems, and VPNs.
    • Operating Systems: Expertise in Windows, Linux, and macOS operating systems.
    • Cloud Computing: Knowledge of cloud platforms such as AWS, Azure, and GCP, as well as cloud security tools and best practices.
    • Programming: Familiarity with scripting languages such as Python and Bash, as well as programming languages such as Java and C++.
    • Security Tools: Experience with security tools such as Nessus, Metasploit, Wireshark, and Burp Suite.
    • Cryptography: Understanding of encryption algorithms, hashing functions, and digital certificates.
  • Soft Skills:
    • Problem-Solving: Ability to analyze complex security issues and develop effective solutions.
    • Communication: Clear and concise communication skills to explain technical concepts to non-technical audiences.
    • Critical Thinking: Ability to evaluate information and make informed decisions.
    • Teamwork: Ability to collaborate with other security professionals and stakeholders.
    • Adaptability: Ability to adapt to changing security threats and technologies.
  • Industry Knowledge:
    • Security Standards: Familiarity with security standards such as ISO 27001, NIST, and PCI DSS.
    • Regulatory Compliance: Understanding of relevant laws and regulations, such as the Personal Data (Privacy) Ordinance (PDPO) in Hong Kong.
    • Threat Intelligence: Knowledge of current security threats and attack vectors.

Career Progression in Security

The security field offers numerous opportunities for career advancement. Starting in entry-level roles, professionals can progress to more senior positions with increased responsibilities and higher compensation. Common career paths include:

  • Cybersecurity Analyst → Security Engineer → Security Architect: This path involves progressing from monitoring and analyzing security systems to designing and implementing security infrastructure.
  • Security Consultant → Senior Security Consultant → Principal Consultant: This path focuses on providing expert advice and guidance to organizations on security matters, with increasing levels of responsibility and expertise.
  • Risk Analyst → Risk Manager → Chief Risk Officer (CRO): This path involves progressing from identifying and assessing risks to managing and overseeing risk management programs at an organizational level.
  • Compliance Officer → Senior Compliance Officer → Chief Compliance Officer (CCO): This path focuses on ensuring that the organization complies with relevant laws, regulations, and industry standards, with increasing levels of responsibility and authority.
  • Penetration Tester → Senior Penetration Tester → Security Manager: This path involves progressing from conducting simulated attacks to managing and leading security testing teams.

Continuous learning and professional development are crucial for career advancement in the security field. Certifications such as CISSP, CISM, CEH, and CompTIA Security+ can enhance your credentials and demonstrate your expertise.

Strategies for Finding Security Jobs in Hong Kong

Finding the right security job in Hong Kong requires a strategic approach. Here are some effective strategies:

  • Networking: Attend industry events, join professional organizations, and connect with other security professionals on LinkedIn. Networking can provide valuable insights into job opportunities and industry trends.
  • Online Job Boards: Utilize online job boards such as LinkedIn, Indeed, Glassdoor, and JobsDB to search for security jobs in Hong Kong.
  • Recruitment Agencies: Work with recruitment agencies that specialize in security and IT roles. These agencies have access to a wide range of job opportunities and can help you find the right fit.
  • Company Websites: Check the career pages of companies in the industries you are interested in. Many companies post job openings directly on their websites.
  • Government Resources: Explore government resources such as the Labour Department’s Interactive Employment Service (iES) for job listings and career advice.
  • Tailor Your Resume: Customize your resume and cover letter to highlight your relevant skills and experience for each job application.
  • Prepare for Interviews: Research the company and the role, and practice answering common interview questions. Be prepared to discuss your technical skills, experience, and problem-solving abilities.

Salary Expectations for Security Jobs

Salary expectations for security jobs in Hong Kong vary depending on the role, experience level, and industry. Here are some general guidelines:

  • Entry-Level Positions: Cybersecurity analysts and junior security consultants can expect to earn between HKD 300,000 and HKD 450,000 per year.
  • Mid-Level Positions: Security engineers, risk managers, and compliance officers with 3-5 years of experience can earn between HKD 500,000 and HKD 800,000 per year.
  • Senior-Level Positions: Security architects, CISOs, and principal consultants with 8+ years of experience can earn between HKD 900,000 and HKD 1,500,000+ per year.

These figures are approximate and can vary based on factors such as company size, industry, and specific job requirements.

Trend and Outlook for Security Jobs

The security job market in Hong Kong is expected to continue to grow in the coming years, driven by factors such as increasing cybersecurity threats, stricter data protection regulations, and the adoption of new technologies. Some key trends to watch include:

  • Increased Demand for Cybersecurity Professionals: As cyberattacks become more sophisticated and frequent, the demand for cybersecurity analysts, security engineers, and incident response specialists will continue to rise.
  • Focus on Cloud Security: With more organizations migrating to the cloud, the demand for cloud security engineers and architects will increase significantly.
  • Emphasis on Data Protection: The implementation of stricter data protection regulations, such as the GDPR and the PDPO, will drive the need for data protection officers and compliance officers.
  • Integration of AI and Machine Learning in Security: AI and machine learning technologies are being increasingly used to automate security tasks, detect threats, and improve incident response. Professionals with skills in these areas will be in high demand.
  • Growing Importance of Security Awareness Training: Organizations are recognizing the importance of training employees to recognize and avoid security threats. Professionals with skills in security awareness training and education will be valuable assets.

Work-Life Balance in Security

Maintaining a healthy work-life balance can be challenging in the demanding security field. However, it is essential for preventing burnout and maintaining overall well-being. Here are some tips for achieving work-life balance:

  • Set Boundaries: Establish clear boundaries between work and personal life. Avoid checking emails or working on weekends and during vacations.
  • Prioritize Tasks: Focus on the most important tasks and delegate or eliminate less critical ones.
  • Manage Time Effectively: Use time management techniques such as the Pomodoro Technique or the Eisenhower Matrix to improve productivity and reduce stress.
  • Take Breaks: Take regular breaks during the workday to rest and recharge.
  • Practice Self-Care: Engage in activities that promote physical and mental well-being, such as exercise, meditation, or hobbies.
  • Seek Support: Talk to friends, family, or a therapist about work-related stress or challenges.
  • Flexible Work Arrangements: Explore flexible work arrangements such as remote work or flexible hours to better balance work and personal life.

Networking and Professional Development for Security

Networking and professional development are crucial for advancing your career in the security field. Here are some ways to build your network and enhance your skills:

  • Attend Industry Events: Attend security conferences, workshops, and seminars to learn about the latest trends and connect with other professionals.
  • Join Professional Organizations: Join organizations such as the Information Systems Security Association (ISSA), the SANS Institute, or the Cloud Security Alliance (CSA) to network with peers and access professional development resources.
  • Obtain Certifications: Pursue certifications such as CISSP, CISM, CEH, and CompTIA Security+ to demonstrate your expertise and enhance your credentials.
  • Take Online Courses: Enroll in online courses on platforms such as Coursera, Udemy, or SANS to learn new skills and stay up-to-date with the latest technologies.
  • Read Industry Publications: Subscribe to security blogs, newsletters, and magazines to stay informed about industry trends and best practices.
  • Participate in Open Source Projects: Contribute to open-source security projects to gain hands-on experience and collaborate with other developers.
  • Mentor Others: Share your knowledge and experience with others by mentoring junior security professionals.

Top Employers for Security in Hong Kong

Hong Kong boasts a diverse range of employers seeking security professionals. These include:

  • Financial Institutions: Major banks like HSBC, Standard Chartered, and Bank of China (Hong Kong)
  • Technology Companies: Global tech firms with a significant presence, such as IBM, Microsoft, and Amazon Web Services (AWS)
  • Consulting Firms: Consulting giants like Deloitte, Ernst & Young (EY), PricewaterhouseCoopers (PwC), and KPMG
  • Government Agencies: Various departments within the Hong Kong government
  • Telecommunications Companies: Leading providers like PCCW and Hutchison Telecom
  • Retail Companies: Large retailers with online operations needing robust security measures
  • Healthcare Organizations: Hospitals and healthcare providers requiring stringent data protection

Remote Work Options for Security

While some security roles require on-site presence, many positions offer remote work options, particularly in areas such as cybersecurity analysis, security consulting, and software development. Remote work can provide flexibility and improve work-life balance. To succeed in a remote security role:

  • Establish a Dedicated Workspace: Create a quiet and organized workspace free from distractions.
  • Maintain Regular Communication: Communicate regularly with your team and manager using tools such as email, instant messaging, and video conferencing.
  • Set Clear Boundaries: Establish clear boundaries between work and personal life to avoid burnout.
  • Stay Connected: Participate in virtual team meetings and social events to stay connected with your colleagues.
  • Secure Your Home Network: Implement security measures such as firewalls, antivirus software, and strong passwords to protect your home network and devices.

Job Application Tips for Security Roles

To stand out in the competitive security job market in Hong Kong, it’s crucial to present yourself effectively. Here are some job application tips tailored for security roles:

  • Highlight Relevant Skills and Experience: Tailor your resume and cover letter to highlight your skills and experience that are relevant to the specific job requirements. Use keywords from the job description to demonstrate your fit.
  • Showcase Your Certifications: Clearly list your security certifications such as CISSP, CISM, CEH, and CompTIA Security+ to demonstrate your expertise.
  • Quantify Your Achievements: Use numbers and metrics to quantify your achievements and demonstrate the impact of your work. For example, “Reduced security incidents by 30% in one year” or “Implemented a new security system that saved the company HKD 100,000 per year.”
  • Provide Examples of Problem-Solving: Describe specific security challenges you have faced and how you have resolved them. This demonstrates your problem-solving abilities and technical skills.
  • Demonstrate Your Knowledge of Security Standards and Regulations: Show that you are familiar with relevant security standards such as ISO 27001, NIST, and PCI DSS, as well as data protection regulations such as the PDPO.
  • Tailor Your Resume and Cover Letter: Customize your resume and cover letter for each job application to highlight your relevant skills and experience.
  • Proofread Carefully: Proofread your resume and cover letter carefully for any errors in grammar, spelling, or punctuation.

Career Transition Strategies for Security

Transitioning into a security career from another field requires a strategic approach. Here are some strategies to consider:

  • Identify Transferable Skills: Identify skills from your previous role that are transferable to the security field. For example, project management, problem-solving, communication, and analytical skills are valuable in security roles.
  • Obtain Relevant Certifications: Pursue security certifications such as CompTIA Security+, CEH, or CISSP to demonstrate your knowledge and skills.
  • Take Online Courses: Enroll in online courses on platforms such as Coursera, Udemy, or SANS to learn about security concepts and technologies.
  • Gain Hands-On Experience: Look for opportunities to gain hands-on experience through internships, volunteer work, or personal projects.
  • Network with Security Professionals: Attend industry events, join professional organizations, and connect with security professionals on LinkedIn to learn about job opportunities and industry trends.
  • Tailor Your Resume and Cover Letter: Customize your resume and cover letter to highlight your relevant skills and experience and explain why you are interested in transitioning into a security career.

Recruitment Processes and Insights

Understanding the recruitment processes for security roles can give you a competitive edge. Common steps include:

  • Initial Screening: Recruiters review resumes and applications to identify candidates who meet the minimum requirements.
  • Technical Assessment: Candidates may be required to complete a technical assessment to evaluate their skills and knowledge. This could include coding challenges, security quizzes, or case studies.
  • Interviews: Candidates will typically undergo several rounds of interviews with HR representatives, hiring managers, and team members. Interviews may cover technical skills, experience, problem-solving abilities, and cultural fit.
  • Background Check: Employers typically conduct background checks to verify the candidate’s credentials and criminal history.
  • Offer and Negotiation: If the candidate is successful, the employer will extend a job offer and negotiate the terms of employment, including salary, benefits, and start date.

What Makes a Great/Effective Security Professional?

An effective security professional possesses a combination of technical expertise, soft skills, and personal attributes. Key qualities include:

  • Technical Proficiency: A deep understanding of security concepts, technologies, and best practices.
  • Problem-Solving Skills: The ability to analyze complex security issues and develop effective solutions.
  • Communication Skills: The ability to communicate technical information clearly and concisely to both technical and non-technical audiences.
  • Critical Thinking: The ability to evaluate information objectively and make informed decisions.
  • Attention to Detail: The ability to pay close attention to detail and identify subtle security vulnerabilities.
  • Adaptability: The ability to adapt to changing security threats and technologies.
  • Integrity: A strong ethical compass and commitment to protecting sensitive information.
  • Proactive Approach: A proactive approach to identifying and mitigating security risks.
  • Continuous Learning: A commitment to continuous learning and professional development.

Common Pitfalls/Mistakes of a Security Professional You Should Avoid and Examples

Even seasoned security professionals can fall victim to common pitfalls. Awareness of these mistakes can help you avoid them:

  • Neglecting Basic Security Practices: Overlooking fundamental security practices such as patching systems, enforcing strong passwords, and implementing multi-factor authentication. Example: Failing to regularly update software, leaving systems vulnerable to known exploits.
  • Lack of Communication: Failing to communicate security risks and incidents to stakeholders in a timely and effective manner. Example: Delaying the notification of a data breach, leading to further damage and reputational harm.
  • Ignoring the Human Factor: Neglecting the human element in security, such as social engineering and phishing attacks. Example: Not providing adequate security awareness training to employees, making them vulnerable to phishing scams.
  • Becoming Complacent: Becoming complacent and not staying up-to-date with the latest security threats and technologies. Example: Relying on outdated security tools and techniques, leaving the organization vulnerable to new attacks.
  • Failing to Document Security Processes: Failing to document security policies, procedures, and incident response plans. Example: Lacking a documented incident response plan, leading to confusion and delays during a security incident.
  • Overlooking Third-Party Risks: Failing to assess and manage the security risks associated with third-party vendors and partners. Example: Not conducting due diligence on a cloud provider, leading to a data breach.
  • Not Prioritizing Remediation: Failing to prioritize the remediation of security vulnerabilities and weaknesses. Example: Delaying the patching of a critical vulnerability, leaving the system exposed to attack.
  • Thinking Technology Alone Solves Security: Assuming that technology alone can solve security problems without considering the human and process aspects.

Security Best Practices and Examples

Implementing security best practices is crucial for protecting your organization from cyber threats. Some key best practices include:

  • Implement a Strong Security Policy: Develop and implement a comprehensive security policy that outlines the organization’s security goals, responsibilities, and procedures. Example: A security policy that requires all employees to use strong passwords and multi-factor authentication.
  • Conduct Regular Risk Assessments: Conduct regular risk assessments to identify and prioritize security risks. Example: Conducting a penetration test to identify vulnerabilities in the organization’s network and systems.
  • Implement Access Controls: Implement access controls to restrict access to sensitive data and resources to authorized users only. Example: Using role-based access control (RBAC) to grant users access only to the resources they need to perform their job duties.
  • Monitor and Log Security Events: Monitor and log security events to detect and respond to security incidents. Example: Using a security information and event management (SIEM) system to collect and analyze security logs from various sources.
  • Implement Incident Response Procedures: Develop and implement incident response procedures to effectively respond to security incidents. Example: Having a documented incident response plan that outlines the steps to take in the event of a data breach.
  • Provide Security Awareness Training: Provide regular security awareness training to employees to educate them about security threats and best practices. Example: Conducting phishing simulations to test employees’ awareness of phishing attacks.
  • Keep Systems Up-To-Date: Keep systems up-to-date with the latest security patches and updates to address known vulnerabilities. Example: Implementing an automated patching system to ensure that systems are patched promptly.
  • Encrypt Sensitive Data: Encrypt sensitive data at rest and in transit to protect it from unauthorized access. Example: Using full-disk encryption to protect data on laptops and mobile devices.
  • Regularly Back Up Data: Regularly back up data to protect against data loss due to hardware failure, human error, or cyberattacks. Example: Implementing a cloud-based backup system that automatically backs up data to a secure offsite location.

Security Organizations in Hong Kong

Several organizations in Hong Kong support and promote the security profession. These organizations offer networking opportunities, professional development resources, and advocacy for the security industry. Notable organizations include:

  • Hong Kong Computer Society (HKCS): HKCS has various special interest groups (SIGs) related to security, offering forums, seminars, and workshops.
  • Information Systems Security Association (ISSA) Hong Kong Chapter: ISSA is a global organization dedicated to advancing the security profession. The Hong Kong chapter provides networking opportunities, educational programs, and certifications.
  • Cloud Security Alliance (CSA) Hong Kong & Macau Chapter: CSA promotes cloud security best practices and provides educational resources for cloud security professionals.
  • Hong Kong Internet Service Providers Association (HKISPA): While broader than just security, HKISPA addresses internet-related issues, including security.

By engaging with these organizations, security professionals can stay informed about industry trends, expand their networks, and advance their careers.

Read moreRead less
Post a Job

With modern-day cowboys, known as gauchos, riding across the plains and families of penguins waddling along its southern shores, Argentina is a nation like no other. As the second-largest country in South America, it manages to wrap its expansive borders around a little of everything, perfect for the undaunted, curious, and adventurous international student. Ready to head to the (deep, deep) south to study in Argentina yet?

Read more

Content goes here .. (1)

Content goes here .. (2)

Content goes here .. (3)

Filter by work location

Filter by work location
Filters

Filter by type

Filter by type

Filter by industry

Filter by industry

Filter by XP Level

Filter by XP Level

Filter by application

Filter by application

Filter by salary

Filter by salary

Filter by work location

Filter by work location
Filters
Filters

Tip: Use your left/right arrows on your keyboard as your trusty compass to navigate the jobs.

View Job

Snow Shoveller and Equipment

2081333-snow-shoveller-and-equipment-operator-snow-clearing-services logo
Snow Clearing Services
Entry-Level
Full Time

LINK

Onsite
Others
Tag:
Ottawa, Ontario

View Job

Accounting Assistant – Work onsite

1967251-accounting-assistant-work-onsite-in-makati-global-headstart logo
Global Headstart
Full Time

LINK

Onsite
Accounting
Quickbooks: / General Accounting: /
Makati City, Metro Manila

View Job

Promotor

2080551-promotor-alicante logo
Alicante
Full Time

LINK

Onsite
Architect/Interior Design
Curitiba, PR

View Job

Gestionnaire de comptes clients

2080486-gestionnaire-de-comptes-clients-ipg logo
IPG
Managerial Level
Full Time

LINK

Remote
Accounting
Analytical Skills / Communication Skills / Microsoft Office Proficiency
Montréal, Québec

View Job

Supply Chain Specialist II

2080340-supply-chain-specialist-ii-nike-inc logo
NIKE, Inc.
Entry-Level
TELECOMMUTE
Full Time

LINK

Hybrid
Logistics/Supply Chain
Microsoft Word: / Excel: / Sales Reporting tools:
Old Toronto, Ontario

View Job

Social Media + Influencer

2080335-social-media-influencer-specialist-duer logo
DUER
Senior Level
ON_SITE
Full Time
USD
60000

-

55000

per

Year

LINK

Onsite
Marketing/Business Dev
Social Media Management: / Influencer Marketing: / Content Creation:
Vancouver, British Columbia

View Job

Manager, Sanitation Corporate

2079999-manager-sanitation-corporate-sanitation-give-go-prepared-foods logo
Give & Go Prepared Foods Corp.
Managerial Level
Full Time

LINK

Onsite
Food/Beverage/Restaurant
Old Toronto, Ontario

View Job

Banking Associate

2079812-banking-associate-td-bank logo
TD Bank
Entry-Level
TELECOMMUTE
Part Time
USD
22.50

-

21.25

per

Hour

LINK

Banking/Financial
Juno, Alberta

View Job

Consultor(a) de Belleza

2079709-consultora-de-belleza-promociones-pdv logo
Promociones Pdv
Entry-Level
Part Time

LINK

Onsite
Personal Care

View Job

Prevencionista de Riesgo

2079707-prevencionista-de-riesgo-importante-empresa-del-rubro-de-alimenta logo
Importante empresa del rubro de alimentación
Part Time

LINK

Food/Beverage/Restaurant

Filter by Country

Filter by Country
  • Philippines (494)
  • Mexico (431)
  • Chile (310)
  • Argentina (154)
  • India (140)
  • France (105)
  • United Arab Emirates (100)
  • Bahrain (95)
  • Finland (79)
  • United Kingdom (74)
  • Qatar (68)
  • Malaysia (66)
  • Netherlands (63)
  • Italy (62)
  • Thailand (61)
  • Hong Kong (59)
  • Egypt (57)
  • Greece (53)
  • Colombia (49)
  • Kuwait (45)
  • Spain (42)
  • Turkey (41)
  • New Zealand (39)
  • Switzerland (33)
  • Luxembourg (30)
  • Saudi Arabia (29)
  • Australia (25)
  • Ghana (25)
  • Romania (24)
  • South Africa (23)
  • Canada (22)
  • Oman (18)
  • Poland (12)
  • Singapore (11)
  • Ecuador (10)
  • Brazil (9)
  • United States (9)
  • Hungary (8)
  • Peru (7)
  • Indonesia (6)
  • Ireland (5)
  • Nigeria (5)
  • Vietnam (5)
  • Germany (3)
  • Sweden (3)
  • Belgium (2)
  • Austria (1)
  • Portugal (1)

Filter by City

Filter by City

Search jobs

Search jobs

Filter by type

Filter by type

Filter by industry

Filter by industry

Filter by XP Level

Filter by XP Level

Filter by salary

Filter by salary

Filter by application

Filter by application
  • Apply via Link (3013)

Filter by work location

Filter by work location
  • Hybrid (3)
  • Onsite (25)
  • Remote (136)

Related Searches

<script async src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-7179870890317021"
     crossorigin="anonymous"></script>
<!-- Below Filter Ad -->
<ins class="adsbygoogle"
     style="display:block"
     data-ad-client="ca-pub-7179870890317021"
     data-ad-slot="5296998369"
     data-ad-format="auto"
     data-full-width-responsive="true"></ins>
<script>
     (adsbygoogle = window.adsbygoogle || []).push({});
</script>
Back

Search jobs

Search jobs

Filter by type

Filter by type

Filter by industry

Filter by industry

Filter by XP Level

Filter by XP Level

Filter by salary

Filter by salary

Filter by application

Filter by application
  • Apply via Link (3013)

Filter by work location

Filter by work location
  • Hybrid (3)
  • Onsite (25)
  • Remote (136)

Filter by work location

Filter by work location
  • Hybrid (3)
  • Onsite (25)
  • Remote (136)
Show Filter Results