Browse
···
Log in / Register

Cyber Detection & Automation Engineer

Negotiable Salary

DMV IT Service

Seattle, WA, USA

Favourites
Share

Description

Job Title: Cyber Detection & Automation Engineer  Location: Seattle, WA  Employment Type: Contract About Us:  DMV IT Service LLC is a trusted IT consulting firm, established in 2020. We specialize in optimizing IT infrastructure, providing expert guidance, and supporting workforce needs with top-tier staffing services. Our expertise spans system administration, cybersecurity, networking, and IT operations. We empower our clients to achieve their technology goals with a client-focused approach that includes online training and job placements, fostering long-term IT success. Job Purpose: The Cyber Detection & Automation Engineer will design, build, and maintain advanced detection logic and automation workflows across various security platforms. This role works closely with SOC analysts, threat intelligence teams, and incident responders to enhance threat detection, streamline security operations, and improve overall response capabilities. Requirements Key Responsibilities Develop and automate high-precision detection rules across SIEM, EDR, and cloud telemetry sources (e.g., Sentinel, Defender, AWS). Continuously monitor and optimize detection alerts to minimize false positives and enhance accuracy. Validate and test detection mechanisms to ensure ongoing reliability and effectiveness. Document detection methods, engineering processes, and knowledge transfer materials. Conduct detection coverage assessments and improve resilience and accuracy through gap analysis. Create security automation workflows using SOAR platforms, particularly Microsoft Sentinel and Logic Apps. Build custom integrations between security platforms, including SIEM, EDR, threat intelligence feeds, and ticketing systems. Automate repetitive SOC tasks like alert triage, IOC lookups, and ticket creation. Develop dashboards and utilities that provide insights into SOC metrics and operational performance. Collaborate with SOC analysts and threat intelligence teams to stay ahead of emerging threats using the MITRE ATT&CK framework. Maintain and update playbooks, runbooks, and documentation related to detection strategies and attacker behaviors. Prepare reports on detection performance, automation activities, and recommended improvements for leadership. Required Skills & Experience Bachelor’s degree in cybersecurity, computer science, IT, or related discipline. 5+ years of experience in cybersecurity, with at least 3 years focused on detection and automation engineering. Proficient in writing detection logic using KQL, SPL, or similar query languages. Skilled in scripting with Bash, PowerShell, Python, or JavaScript. Hands-on experience developing automation with SOAR platforms, particularly Microsoft Sentinel/Logic Apps. Strong understanding of SOC operations, incident response workflows, and threat detection strategies. Experience working with RESTful APIs and integrating third-party security tools. Background in cloud environments, preferably AWS and Azure. In-depth knowledge of the MITRE ATT&CK framework and threat modeling. Practical understanding of attacker TTPs and detection methodologies. Familiarity with version control (Git), CI/CD pipelines, and infrastructure as code. Ability to process and analyze large datasets to detect patterns and threats. Effective communication skills for diverse technical audiences. Collaborative mindset with the ability to work across multiple teams in a fast-paced environment. Preferred Certifications Microsoft SC-200, Azure Security Engineer Associate AWS Certified Security – Specialty GIAC (GCIA, GCTI, GDAT) CISSP, CISM

Source:  workable View Original Post

Location
Seattle, WA, USA
Show Map

workable

You may also like

RP Pro Services
Mid-Level Cyber Security Specialist (Top Secret Clearance Required)
Washington, DC, USA
RP Professional Services is a rapidly growing Technology consulting firm headquartered in Virginia. We’re an 8a and Service-Disabled Veteran-Owned Small Business (SDVOSB) serving both federal and commercial customers. At RP, we help our clients achieve their mission by developing value driven, customized solutions that are executed by the best people. Our dedication to our employees and clients is driven by our promise to deliver Excellence, Value, and Flexibility. "People, not just Resources" is more than our motto; it's the foundation on which we are built! RP Professional Services is seeking a Mid-Level Cybersecurity Specialist to support and advise security professionals on emerging cyber threats, risk mitigation strategies, and compliance standards within the Department of Defense (DoD) Intelligence Community (IC). The ideal candidate will have a strong technical background in classified and unclassified systems, insider threat tools, user activity monitoring (UAM), and cyber threat intelligence. This role requires expertise in offensive and defensive cyber capabilities, network security frameworks, and collaboration across government organizations to enhance cybersecurity posture and threat detection capabilities. This position is contingent upon the contract being awarded to RP Professional Services. Requirements: Advise security professionals on emerging cyber threats, risk mitigation strategies, and industry regulations. Support DoD Intelligence Community operations with expertise in cybersecurity threat management. Apply classified and unclassified system knowledge to facilitate security standards and compliance. Assist non-IT professionals in understanding Department of Defense network standards for effective insider threat tool deployment. Coordinate with cyber threat intelligence teams to develop strategic threat assessments and response plans. Promote and implement technical solutions that support mission-critical cybersecurity objectives. Conduct user activity monitoring (UAM) and cybersecurity evaluations to detect anomalous behaviors and insider threats. Assess and advise on both offensive and defensive cybersecurity strategies within DoD and Intelligence frameworks. Utilize expertise in at least one of the following cybersecurity domains: Risk/Vulnerability/Threat Assessments Cloud Security Security Operations Firewall (FW), Intrusion Prevention System (IPS), Intrusion Detection System (IDS) Configuration Penetration Testing Forensics Threat Intelligence Threat Hunting Maintain awareness of state, local, and federal cybersecurity developments, standards, frameworks, and regulations and their impact on operations. Support counterintelligence, insider threat, and law enforcement investigations through cybersecurity expertise. Requirements Bachelor’s degree in Computer Science or a related field. Minimum eight (8) years of experience advising security professionals on emerging cyber threats. Minimum eight (8) years of experience working within the DoD Intelligence Community. Demonstrated knowledge of DoD/IC computer systems, protections, and cybersecurity threats. Experience advising non-IT professionals on DoD network standards for insider threat tools. Strong coordination skills for collaborating across organizations and implementing cybersecurity solutions. Preferred Qualifications:  Certified Information Systems Security Professional (CISSP). Knowledge of user activity monitoring (UAM) software and processes. Expertise in DoD cybersecurity compliance frameworks and regulations. Strong background in counterintelligence and insider threat investigations. Experience working across government security agencies, military cybersecurity teams, and intelligence divisions. Salary Range: $175,000 - $195,000 The salary range for this role considers a wide range of factors, including, but not limited to, skill sets, equity, experience and training, licensure and certifications, and other business and organizational needs. It is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case.   Benefits Health Benefits: Medical, Vision, Dental Up to 4% retirement match with 100% vesting Company paid STD and LTD Company paid basic life insurance Competitive PTO package RP Professional Services, LLC provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training.
$175,000-195,000
Apex Informatics
Cybersecurity Analyst
Atlanta, GA, USA
The Georgia Department of Human Services, Office of Information Technology, is seeking a qualified candidate for the temporary contractor staffing position of Cybersecurity Analyst as part of the Information Security Team. *REQUIRED CERTIFICATIONS MUST BE UPLOADED* The Office of Information Technology is the office within DHS that provides computing, applications management, IT procurement, network and telecommunications services to all DHS divisions and offices. Responsibilities Proven experience in cybersecurity operations with hands-on expertise in monitoring and managing multiple security tools, including vulnerability scanning platforms such as Tenable (Nessus, Tenable.sc, or Tenable.io). Continuously monitor security tools and systems (e.g., SIEM, IDS/IPS, CrowdStrike EDR,  DLP, Tenable vulnerability scanners) to detect, investigate, and respond to potential threats in real time. Maintain and oversee the CrowdStrike platform, ensuring proper configuration, alert triage, threat hunting, and endpoint coverage across the organization. Analyze data/information from one or multiple sources to conduct preparation of the environment, respond to requests for information, and submit intelligence collection and production requirements in support of planning and operations. Interact at multiple levels of the organization to establish and maintain a strong and adaptive security posture that aligns with organizational risk tolerance, information access requirements, business strategies, and compliance requirements. Integrate overarching security frameworks across multiple, complex disciplines in support of the business needs of the Agency to provide customer-focused technology solutions in a secure, cost-effective, and efficient manner. Strong knowledge of system administration, including configuration, hardening, patch management, and monitoring of Windows and Linux servers Coordinate and oversee the production of evidence to support internal and external audits. Conduct internal risk, vulnerability, and compliance assessments to: Identify risks, vulnerabilities, and compliance shortcomings; and recommend/develop security measures, policies, and controls for risk/vulnerability mitigation and remediation of compliance findings. Prepare and/or update incident response plans and perform incident response activities as directed and in accordance with established Agency procedures and guidelines and those of the Georgia Technology Authority (GTA). Ensure periodic monitoring of audit logs occurs in accordance with requirements, and report findings and concerns for further analysis and/or action, including breach notification and initiation of incident response, in accordance with Agency protocols/procedures and CISO direction/guidance. Work with developers to plan, implement, manage, and coordinate appropriate security measures for information systems/applications that control access to data, and prevent unauthorized modification, destruction, or disclosure of information in accordance with federal, state, local, and agency requirements, policies, and directives. Prepare and/or update Plan of Actions & Milestones (POA&M) that identify security weaknesses and establish milestones and compensating controls for remediating these weaknesses and tracking the progress and effectiveness of the remediation. Serve as a Subject Matter Expert (SME), advising on current best practice and strategies for the protection, auditing, and monitoring of data, data storage, and transmission paths. Work with business owners, IT managers, staff, and vendors to provide timely and efficient coordination of information assurance/security services to meet Agency needs. Prepare and communicate status of Agency information security programs and projects to senior executives through oral and written reports and presentations. Assist with information security awareness training activities and preparation of awareness training materials. Develop and communicate security metrics to assess effectiveness of, and compliance with, the Agency’s InfoSec policies and controls. Performs other professional responsibilities as assigned. Qualifications: Bachelor's degree in information technology, computer science, information assurance, or a related field from an accredited college or university AND Five years of information technology experience, One year of which in information security or information assurance. Note: An equivalent combination of education and job specific experience that provided the knowledge, experience and competencies required to successfully perform the job at the level listed may be substituted on a year-over-year basis. Desired Skills/Qualifications: Certified Information Systems Security Professional (CISSP) Certified Information Security Manager (CISM) Certified Information Systems Auditor (CISA) Demonstrated professional experience developing and communicating an information security strategy and aligning projects, initiatives, and resources to execute against the strategy.
Negotiable Salary
Qode
Security Architect IAM
Massachusetts, USA
Primary responsibilities include Develop and Design Secure platform architectures, ensuring that architecture is consistent with enterprise architecture standards, guidelines and principles. Review Architecture and Implementations for consistency to CFG security standards Develop standards, recommendations, requirements, and security guidance in support of business activities Evaluate, design, and test IAM technologies to ensure secure, scalable, and cost-effective solutions. Guide IAM integration for new tools and systems, including configuration, debugging and deployment. Perform security assessments on projects across multiple CFG business product lines Participate in code and design reviews with teams of software, network and cloud engineers to ensure that solutions meet enterprise IAM and security standards. Collaborate with application teams across CFG to guide the direction of designing secure products.  Collaborate with other functional teams' leadership and engineers to ensure solutions align with organizational goals and user needs.   Contribute to technology direction, develop architecture and influence implementation to gain measurable business improvements. Stay ahead of industry trends to advise CFG identity strategies and strengthen the company security posture. Qualifications, Education, Certifications and/or Other Professional Credentials 8+ years of professional Security & Identity experience with 5+ years as a Principal Architect Experience designing security and identity solutions for 10K+ headcount organizations Extensive experience designing and implementing IAM solutions in enterprise environments with strong knowledge of identity lifecycle, access control, authentication and hybrid cloud security Demonstrable experience in leading IAM modernization initiatives, encompassing Active Directory, Entra ID, Single Sign On, MFA, Privileged Identity Management, and Zero Trust. Experience with IAM tools such as SailPoint, Okta, CyberArk, HashiCorp, Entra ID and Active Directory preferred Strong working knowledge of regulatory and compliance frameworks, including GDPR, NIST, and ISO 27001, and their application to enterprise identity preferred. Familiar with public cloud platforms (e.g. AWS, Entra, GCP) and Continuous Integration/Continuous Delivery (CI/CD) practices preferred. Deep understanding of Zero Trust, SD WAN and SASE approaches and platforms preferred Industry certifications like CISSP, CISM, CCSP, AWS, Azure or GCP highly valued
Negotiable Salary
Control Risks
Principal, Cyber Assurance
Washington, DC, USA
This role may be based in NYC or Washington DC. We are seeking a senior leader to drive the growth of Digital Risks in the United States, with a primary focus on cyber assurance, third-party risk management, and large-scale regulatory compliance audits. In this role, you will collaborate closely with our cyber threat intelligence, advisory, and response teams to expand our digital risk business. Your responsibility will include overseeing the assessment, and improving client cybersecurity programs, ensuring alignment with industry standards and regulatory requirements, and guiding clients through complex third-party audits. Key Responsibilities Cybersecurity Program Evaluation Lead cyber assurance engagements, assessing client cybersecurity programs for compliance with industry standards such as NIST, ISO 27001, and other relevant frameworks. Act as a trusted advisor, ensuring client cybersecurity postures are resilient, compliant, and in line with regulatory requirements. Third-Party Risk Management Audits Oversee large-scale third-party risk and compliance audits, ensuring alignment with industry-specific frameworks, regulatory standards, and contractual obligations. Regulatory Compliance Audits Oversee regulatory compliance audits to ensure clients meet required standards and regulations. Advise clients on audit preparation and guide them through maintaining compliance while improving cybersecurity measures. Ensure clients' compliance programs address both current and emerging regulatory requirements. Penetration Testing & Vulnerability Management Support Partner with the penetration testing team to incorporate findings into broader cyber assurance reviews. Lead remediation efforts for high-risk vulnerabilities, aligning them with the client’s overall compliance and cybersecurity objectives. Client Relationship & Business Development Build and sustain relationships with key stakeholders, especially C-suite executives, positioning Digital Risks as a leader in cyber assurance and regulatory compliance. Identify and capitalize on new business opportunities in cyber assurance, third-party risk assessments, and compliance audits. Provide thought leadership on cyber assurance trends, regulatory updates, and best practices to enhance client relationships and grow the practice. Advise clients on continuously improving their cybersecurity and compliance frameworks based on audit findings and risk assessments. Practice Development & Team Leadership Recruit, develop, and lead a high-performing team specializing in cyber assurance, third-party risk management, and regulatory compliance. Foster a culture of continuous learning, ensuring the team stays ahead of emerging trends in cybersecurity and compliance. Contribute to the creation of innovative services and solutions to meet clients' evolving needs in cyber assurance and compliance auditing. Requirements Candidates must be legally authorized to work in the US on a permanent basis without sponsorship. Candidates must possess unrestricted US work authorization. Experience & Knowledge: 12+ years of experience in cybersecurity, specializing in cyber assurance, third-party risk management, and regulatory compliance audits. Proven track record of leading cyber assurance engagements and guiding clients through risk management and compliance processes based on industry frameworks (e.g., NIST, ISO 27001). Expertise in managing third-party audits and ensuring regulatory compliance across audit lifecycles. In-depth understanding of regulatory frameworks, with hands-on experience delivering compliance audits for both commercial and government sectors. Experience integrating penetration testing and vulnerability assessments into broader cyber assurance strategies. Education & Certifications: Bachelor's or master’s degree in information security, Computer Science, Engineering, or a related field. Relevant certifications such as CISSP, CISM, CISA, ISO 27001 Lead Auditor, SANS, or other recognized credentials in cybersecurity, third-party risk management, and compliance auditing. Skills: Strong commercial acumen, with proven ability to generate new business in cyber assurance and regulatory compliance services. Exceptional communication, presentation, and analytical skills with the ability to influence senior stakeholders and deliver impactful insights that improve cybersecurity resilience and regulatory compliance. The base salary range for this position in Washington DC is $180,000-$205,000 per year. The base salary range for this position in New York City is $200,000-$215,000 per year. Exact compensation offered may vary depending on job-related knowledge, skills, and experience. Control Risks is committed to a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age or veteran status. If you require any reasonable adjustments to be made in order to participate fully in the interview process, please let us know and we will be happy to accommodate your needs. Control Risks participates in the E-Verify program to confirm employment authorization of all newly hired employees. The E-Verify process is completed during new hire onboarding and completion of the Form I-9, Employment Eligibility Verification, at the start of employment. E-Verify is not used as a tool to pre-screen candidates. For more information on E-Verify, please visit www.uscis.gov. Benefits Control Risks offers a competitively positioned compensation and benefits package that is transparent and summarized in the full job offer. Control Risks supports hybrid working arrangements, wherever possible, that emphasize the value of in-person time together - in the office and with our clients - while continuing to support flexible and remote working. Medical Benefits, Prescription Benefits, FSA, Dental Benefits, Vision Benefits, Life and AD&D, Voluntary Life and AD&D, Disability Benefits, Voluntary Benefits, 401 (K) Retirement, Nationwide Pet Insurance, Employee Assistance Program. As an equal opportunities employer, we encourage suitably qualified applicants from a wide range of backgrounds to apply and join us and are fully committed to equal treatment, free from discrimination, of all candidates throughout our recruitment process.
$180,000-215,000
ENS Solutions, LLC
Ping Identity SME - Active TS/SCI with CI Poly
Joint Base Anacostia-Bolling, Washington, DC 20032, USA
As an Identity and Access Management (IAM) specialist, you have the skills and experience to keep hackers from taking data and breaking processes. We’re looking for someone like you to help our clients meet their missions without disruption. As a Ping Identity Subject Matter Expert, you’ll play a critical role in the world of IAM and zero trust. You’ll interface with stakeholders and engineering teams to delve into the details and dependencies of critical processes and users’ roles within them. You’ll analyze the identity lifecycle, articulating access requirements and defining enterprise identity records. You’ll use your experience in IAM to design, deploy, and support systems that verify appropriate user privileges and manage credentials for accessing our clients’ most valuable assets. From single sign-on to privileged access systems, you’ll have the chance to implement enterprise-class solutions and stop adversaries in their tracks. Requirements 5+ years of experience designing and deploying Identity and Access Management systems 3+ years of experience with PingFederate, PingAccess, PingDirectory, and PingAuthorize, including design, implementation, and integration in large-scale, complex environments Experience with IAM concepts such as Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), Zero Trust, and Passwordless Experience with IAM protocols such as SAML, OAuth, or OIDC Experience with IAM concepts such as federation and single sign-on (SSO) Active TS/SCI and willingness to obtain a CI Poly HS diploma or GED Security+ certification required. Nice If You Have: Experience with Identity governance processes and entitlement management programs Knowledge of system, network, application, and security architectures and cybersecurity solutions Knowledge of key cyber processes such as incident handling, risk measurement, and change management Knowledge of key cyber threats, including nation state actors, malware or ransomware, command and control infrastructures, and mitigations   Ability to collaborate with the professional confidence and credibility to effectively engage and interact with technologists and leaders across the enterprise Ability to quickly comprehend complex problems, draw logical conclusions, make sound decisions, develop solutions, and drive closure Benefits Essential Network Security (ENS) Solutions, LLC is a service-disabled veteran owned, highly regarded IT consulting and management firm. ENS consults for the Department of Defense (DoD) and Intelligence Community (IC) providing innovative solutions in the core competency area of Identity, Credential and Access Management (ICAM), Software Development, Cyber and Network Security, System Engineering, Program/Project Management, IT support, Solutions, and Services that yield enduring results. Our strong technical and management experts have been able to maintain a standard of excellence in their relationships while delivering innovative, scalable and collaborative infrastructure to our clients. Why ENS? Free Platinum-Level Medical/Dental/Vision coverage, 100% paid for by ENS 401k Contribution from Day 1 PTO + 11 Paid Federal Holidays Long & Short Term Disability Insurance Group Term Life Insurance Tuition, Certification & Professional Development Assistance Workers’ Compensation Relocation Assistance
Negotiable Salary
Triage Staffing
Cybersecurity Systems Administrator
Cincinnati, OH, USA
The Cybersecurity Systems Administrator plays a critical hybrid role, bridging traditional IT systems administration with advanced information security responsibilities. This position ensures the confidentiality, integrity, and availability of organizational systems by managing security tools, responding to threats, and maintaining secure infrastructure across cloud and on-prem environments.  This is a hands-on role assisting with Tier 2/Tier 3 escalations and strategic cybersecurity tasks, such as monitoring security alerts, conducting phishing campaigns, managing vendor relationships, and writing security policies. You'll work cross-functionally to support tool integrations, secure network operations, and align the organization with industry security standards.    Core Functions & Responsibilities  Cybersecurity & Risk Management  Monitor and respond to security alerts and incidents, using tools such as SIEMs and endpoint protection platforms.  Manage and maintain core security infrastructure, including firewalls, antivirus, encryption, and multi-factor authentication systems.  Lead phishing simulation campaigns and drive employee cybersecurity awareness training.  Write, implement, and maintain information security policies, procedures, and best practices.  Oversee identity and access management (IAM) systems, including SSO implementations and integrations with enterprise platforms.  Assist with vulnerability scanning, patching coordination, and hardening of systems based on industry frameworks.  Support regulatory and compliance needs (e.g., Joint Commision, HIPAA, GDPR, PCI-DSS), ensuring ongoing audit readiness.  IT Systems Administration & Tool Management  Administer and configure Microsoft-based infrastructure, including Active Directory, Azure AD, and Microsoft 365.  Manage security groups, application integrations, and group policy management across systems.  Provide Tier 2/Tier 3 escalation support for complex IT and security issues, including advanced troubleshooting.  Maintain and support cloud and on-prem environments, including campus networking, DNS, Web Application Firewall (WAF), servers, and endpoint provisioning.  Configure and optimize Intune, Windows Deployment Services, and automation tools to improve operational efficiency.  Support system stability and reliability across enterprise networks and SaaS platforms.  Collaboration & Strategic Support  Partner with IT, compliance, and business teams to integrate security best practices into daily operations and project workflows.  Serve as a technical lead during incident response efforts, including documentation, colleague communication, and root cause analysis.  Collaborate with third-party vendors for tool evaluation, contract review, and ongoing vendor management.  Manage cloud-based applications and infrastructure including Azure AD, Microsoft 365, and enterprise SaaS platforms.  Requirements Bachelor’s degree in Computer Science, Information Systems, Cybersecurity, or a related field.  2+ years of experience in a hybrid IT/security role or cybersecurity-focused systems administration.  Proficient in managing and securing cloud platforms such as Microsoft Azure and SaaS environments.  Familiarity with security frameworks and tools (e.g., NIST CSF, SIEM, IDS/IPS, MFA, VPNs).  Hands-on experience with firewalls, encryption, group policy, and endpoint protection tools.  Strong knowledge of network protocols and system hardening best practices.  Experience responding to incidents and conducting root cause analysis and remediation.  Working knowledge of compliance frameworks like Joint Commission, HIPAA, PCI-DSS, and GDPR.  Experience with vulnerability scanning (e.g., Qualys, Tenable, Rapid7) and code scanning tools (e.g., Snyk, SonarQube, GitHub Advanced Security).  Excellent troubleshooting skills, communication skills, and documentation habits.  Preferred:  Certifications such as Security+, CISSP, CISM, CEH, or Microsoft/Azure certifications.  Experience with ITIL processes or other service management methodologies.     Work Schedule  In-office with flexibility to work from home with manager approval.    Benefits Why Triage? Our commitment to creating a unique work culture sets us apart from the rest—no corporate robots here. Triage values transparency and autonomy, and we believe in recognizing your efforts and dedication. Join us on this exciting journey as we continue to be recognized among Inc. Magazine's 5000 fast-growing companies in America. Triage Staffing is an equal-opportunity employer committed to fostering diversity and inclusion in the workplace. We prohibit discrimination and harassment based on race, color, sex, religion, sexual orientation, national origin, disability, genetic information, pregnancy, or any other protected characteristic as outlined by federal, state, or local laws. Note: This job description outlines the primary duties and responsibilities of the Intern role but is not an exhaustive list. Additional tasks may be assigned by your supervisor or manager. All duties are subject to change and may be modified to reasonably accommodate individuals with disabilities. Your performance will be evaluated based on your execution of the tasks outlined in this job description.
Negotiable Salary
Cookie
Cookie Settings
© 2025 Servanan International Pte. Ltd.