<p data-start="129" data-end="210"><strong data-start="129" data-end="142">Location:</strong> Tokyo<br data-start="148" data-end="151" /> <strong data-start="151" data-end="162">Job ID:</strong> 06940-0013314635<br data-start="179" data-end="182" /><strong data-start="182" data-end="193">Annual Salary:</strong> JPY 12,000,000</p><h4 data-start="212" data-end="237"><strong data-start="217" data-end="235">Team Overview:</strong></h4><ul data-start="238" data-end="747"><li data-start="238" data-end="331"><p data-start="240" data-end="331">Responsible for supporting business operations by maintaining a stable IT infrastructure.</p></li><li data-start="332" data-end="424"><p data-start="334" data-end="424">Design and operation of cloud, network, authentication management, and related services.</p></li><li data-start="425" data-end="492"><p data-start="427" data-end="492">Focus on standardizing and automating infrastructure processes.</p></li><li data-start="493" data-end="747"><p data-start="495" data-end="747">Provide global support for IT infrastructure construction, while addressing regional characteristics and complexities.<br data-start="613" data-end="616" /> This role plays a critical part in enhancing global business operations by driving simplification, standardization, and automation.</p></li></ul><h4 data-start="749" data-end="774"><strong data-start="754" data-end="772">Role Overview:</strong></h4><p data-start="775" data-end="1290"><strong data-start="775" data-end="805">(Immediately after hiring)</strong><br data-start="805" data-end="808" /> Based on the strategy and standards defined by the Global Network Services Lead, this role is responsible for the implementation, operation, management, and continuous improvement of network services in the assigned region. Reporting directly to the Japan Infrastructure Lead, you will collaborate with the global team on daily network operations, coordinate with internal IT departments, external vendors, and oversee tasks such as network improvement, automation, and scalability.</p><h4 data-start="1292" data-end="1324"><strong data-start="1297" data-end="1322">Key Responsibilities:</strong></h4><ul data-start="1325" data-end="2289"><li data-start="1325" data-end="1482"><p data-start="1327" data-end="1482"><strong data-start="1327" data-end="1363">Network Design & Implementation:</strong><br data-start="1363" data-end="1366" /> Design, implement, and maintain regional network infrastructure (LAN/WAN/Wi-Fi/voice/SD-WAN/cloud connectivity).</p></li><li data-start="1483" data-end="1658"><p data-start="1485" data-end="1658"><strong data-start="1485" data-end="1522">Infrastructure Health Management:</strong><br data-start="1522" data-end="1525" /> Ensure the health, security, and performance of advanced network systems, including support for manufacturing sites (e.g., PLCs).</p></li><li data-start="1659" data-end="1797"><p data-start="1661" data-end="1797"><strong data-start="1661" data-end="1693">Global Standards Deployment:</strong><br data-start="1693" data-end="1696" /> Deploy global standards and best practices at the regional level to optimize network performance.</p></li><li data-start="1798" data-end="2009"><p data-start="1800" data-end="2009"><strong data-start="1800" data-end="1823">SLA/KPI Management:</strong><br data-start="1823" data-end="1826" /> Manage service level agreements (SLA) and key performance indicators (KPI), including optimization and regular maintenance of network devices (firewalls, switches, routers, etc.).</p></li><li data-start="2010" data-end="2152"><p data-start="2012" data-end="2152"><strong data-start="2012" data-end="2036">Incident Management:</strong><br data-start="2036" data-end="2039" /> Handle critical incidents, perform root cause analysis, and manage vendor relationships for issue resolution.</p></li><li data-start="2153" data-end="2289"><p data-start="2155" data-end="2289"><strong data-start="2155" data-end="2181">Security & Compliance:</strong><br data-start="2181" data-end="2184" /> Ensure compliance with IT security standards, access control practices, and other governance protocols.</p></li></ul><h4 data-start="2291" data-end="2317"><strong data-start="2296" data-end="2315">Qualifications:</strong></h4><p data-start="2319" data-end="2334"><strong data-start="2319" data-end="2332">Required:</strong></p><ul data-start="2335" data-end="2887"><li data-start="2335" data-end="2447"><p data-start="2337" data-end="2447">Practical experience in network design, operation, and maintenance based on global standards and governance.</p></li><li data-start="2448" data-end="2564"><p data-start="2450" data-end="2564">Experience in the design, construction, and management of corporate networks (LAN/WAN/Wi-Fi/Voice/SD-WAN/Cloud).</p></li><li data-start="2565" data-end="2655"><p data-start="2567" data-end="2655">Solid understanding of IT security and compliance, with practical hands-on experience.</p></li><li data-start="2656" data-end="2792"><p data-start="2658" data-end="2792">Ability to collaborate and communicate effectively with global and regional IT teams, as well as internal and external stakeholders.</p></li><li data-start="2793" data-end="2887"><p data-start="2795" data-end="2887">Proficiency in English communication for technical discussions (reading, writing, speaking).</p></li></ul><p data-start="2889" data-end="2905"><strong data-start="2889" data-end="2903">Preferred:</strong></p><ul data-start="2906" data-end="3156"><li data-start="2906" data-end="3012"><p data-start="2908" data-end="3012">Experience managing network infrastructure in manufacturing environments, including PLC-level systems.</p></li><li data-start="3013" data-end="3098"><p data-start="3015" data-end="3098">Experience in network automation and deployment/operation of large-scale systems.</p></li><li data-start="3099" data-end="3156"><p data-start="3101" data-end="3156">Relevant certifications (e.g., CCNP, CISSP) are a plus.</p></li></ul><h4 data-start="3158" data-end="3182"><strong data-start="3163" data-end="3180">Competencies:</strong></h4><ul data-start="3183" data-end="3482"><li data-start="3183" data-end="3283"><p data-start="3185" data-end="3283"><strong data-start="3185" data-end="3206">Innovation Drive:</strong> Ability to identify new and better ways to enhance organizational success.</p></li><li data-start="3284" data-end="3386"><p data-start="3286" data-end="3386"><strong data-start="3286" data-end="3315">Stakeholder Coordination:</strong> Ability to anticipate and balance the needs of diverse stakeholders.</p></li><li data-start="3387" data-end="3482"><p data-start="3389" data-end="3482"><strong data-start="3389" data-end="3405">Flexibility:</strong> Capacity to adjust approach and attitude in response to changing situations.</p></li></ul><p><em>By clicking 'apply', you give your express consent that Robert Half may use your personal information to process your job application and to contact you from time to time for future employment opportunities. For further information on how Robert Half processes your personal information and how to access and correct your information, please read the Robert Half privacy notice <a href="https://www.roberthalf.com/jp/en/privacy">https://www.roberthalf.com/jp/en/privacy</a>. Please do not submit any sensitive personal data to us in your resume (such as such as race, beliefs, social status, medical history or criminal record) as we do not collect your sensitive personal data at this time.</em></p><hr /><p>お客様が「今すぐ応募」ボタンをクリックすることにより、ロバート・ハーフ(以下、当社)がお客様の応募内容を処理し、求人情報を今後随時ご連絡する目的で個人情報を使用することに明示的に同意ただいたこととなります。当社による個人情報の処理方法、またお客様自身の個人情報へのアクセスおよびその訂正に関する詳細については、プライバシー規約(<a href="https://www.roberthalf.com/jp/ja/privacy">https://www.roberthalf.com/jp/ja/privacy</a>)をお読みください。当社は、要配慮個人情報はお預かりしておりませんので人種、信条、社会的身分、病歴、犯罪の経歴など、取扱いに特に配慮を要する個人情報は、ご提出いただく職務経歴書・レジュメ等に含めないようお願いいたします。</p><img src="https://counter.adcourier.com/bHVrZS5mdXJuaXZhbC42MDU2Ny4xMDg5OEByaGlqcC5hcGxpdHJhay5jb20.gif">
<p>Security Governance</p><ul><li>Security Education: Support security awareness measures targeting risks associated with the use of generative AI, such as information leaks, unauthorized data entry, and model abuse. We create educational content, plan and implement employee training, assess understanding, and propose improvements.</li><li>NIS2 Directive Compliance: Evaluate governance, risk management, incident reporting systems, supply chain security, and more. Implement management measures, operational processes, and management responsibility systems based on NIS2 requirements.</li></ul><p>Engineering</p><ul><li>Device authentication: Utilizes device certificates, MDM integration, and hardware-based identification information (TPM, etc.) to help prevent access from unauthorized or unregistered devices.</li><li>Strengthening remote access security: Based on zero trust, supports the implementation of MFA, device authentication, network isolation, and access control policy optimization.</li><li>Strengthening security of AD domain and PC local administrator privileges: Minimizing privileged accounts, deleting unnecessary accounts, protecting authentication information, and centralizing local administrator password management using LAPS, etc. Support for reducing the risk of privilege abuse and authentication information leakage.</li></ul><p>Application</p><ul><li>Strengthening authentication methods: Review authentication methods and help reduce the risk of unauthorized logins and credential leaks.</li><li>Support for strengthening cloud security: Support for the implementation and operation of CSPM. Detecting configuration errors, visualizing compliance violations, vulnerability management, continuous monitoring, etc.</li><li>Support for standardizing password and secret management and implementing remote support solutions: Protecting privileged accounts and application secrets, implementing vault management, and supporting the establishment of regular rotation operations, etc. Support for the implementation of remote support solutions.</li></ul><p>SecOps</p><ul><li>Sentinel POC and Microsoft security infrastructure development: Strengthening access with Entra ID, integrating protection and detection with Defender, and supporting the implementation and operation of SIEM/SOAR with Sentinel.</li><li>AI-based security process automation: Leveraging AI technology to support the automation of operational processes such as security monitoring, incident response, threat analysis, and TPRM.</li><li>Evilginx implementation and operation support: Building, configuring, and operating the Evilginx environment, providing the environment necessary for verifying phishing attack methods, and providing technical support.</li></ul><p> </p><p>Reference No.: 06940-0013322943</p><p><em>By clicking 'apply', you give your express consent that Robert Half may use your personal information to process your job application and to contact you from time to time for future employment opportunities. For further information on how Robert Half processes your personal information and how to access and correct your information, please read the Robert Half privacy notice <a href="https://www.roberthalf.com/jp/en/privacy" target="_blank">https://www.roberthalf.com/jp/en/privacy</a>. Please do not submit any sensitive personal data to us in your resume (such as such as race, beliefs, social status, medical history or criminal record) as we do not collect your sensitive personal data at this time.</em></p><hr /><p>お客様が「今すぐ応募」ボタンをクリックすることにより、ロバート・ハーフ(以下、当社)がお客様の応募内容を処理し、求人情報を今後随時ご連絡する目的で個人情報を使用することに明示的に同意ただいたこととなります。当社による個人情報の処理方法、またお客様自身の個人情報へのアクセスおよびその訂正に関する詳細については、プライバシー規約(<a href="https://www.roberthalf.com/jp/ja/privacy">https://www.roberthalf.com/jp/ja/privacy</a>)をお読みください。当社は、要配慮個人情報はお預かりしておりませんので人種、信条、社会的身分、病歴、犯罪の経歴など、取扱いに特に配慮を要する個人情報は、ご提出いただく職務経歴書・レジュメ等に含めないようお願いいたします。</p><img src="https://counter.adcourier.com/bHVrZS5mdXJuaXZhbC42ODQzMC4xMDg5OEByaGlqcC5hcGxpdHJhay5jb20.gif">