Roles and responsibilities:The primary role of a Security Analyst (L1) is the detailed and repeatable execution of all operational tasks as documented in processes and subordinate procedures. Specifically, these analysts will be responsible for monitoring the SIEM tools for security events and closing or escalating those events as necessary. Security Analysts maintain the group email address and distribution lists, answer the main phone lines, and update all relevant documentation such as shift logs and tickets. Additionally, assist the MDR Analyst in an incident workflow and assist the MDR team in incident detection, remediation and communicate with external teams in proper incident resolution.
Specifically, Security Analysts (L1) will: Rapidly identify, categorize, prioritize and investigate events as the initial cyber event detection group for the enterprise using all available security logs and intelligence sources to include but not limited to: * Firewalls. * Systems and Network Devices. * Web Proxies.* Intrusion Detection/Prevention Systems. * Data Loss Prevention.* EDR / Antivirus Systems.* Knowledgebase Framework (Confluence).* Continuously monitor SIEM and logging environments for security events and alerts to threats, intrusions, and/or compromises, including: * SIEM alert queue. * Security email inbox.* Intel feeds via email and other sources (e.g. NH-ISAC). * Incident Ticketing queue (IT Security group). * Validate alerts as they come in to eliminate false positives and use other internal and external data sources to enrich alerts with additional context. * Perform triage of service requests from customers and internal teams. * Use playbook procedures to carry out standard plays for routine event types and escalate alerts to Level 2 Analysts for further triage and remediation. * Assist with containment of threats and remediation of environment during or after an incident. * Act as a participant during Threat Hunting activities at the direction of one or more Incident Response Handlers. * Document event analysis and write comprehensive reports of incident investigations. * Proactively improve security-related operational processes and procedures. * Use available security tools for historical analysis purposes as necessary for detected events; for example, historical searches using SIEM tools. * Maintain operational shift logs with relevant activity from the Analyst’s shift. Document investigation results, ensuring relevant details are passed to Level 2 or MDR Analysts for final event analysis. * Update/reference knowledgebase tool (e.g., Confluence) as necessary for changes to processes and procedures and ingest of daily intelligence reports and previous shift logs. * Conduct research and document events of interest within the scope of IT Security.
Required Technical skills: * Experience with SIEM tools (Sentinel, Splunk, Logrhythm, etc.). * Experience in Azure Sentinel. * Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire) .* Familiarity with incident response process and activities. * Familiarity with TCP/IP protocol, OSI Seven Layer Model. * Knowledge of Windows, Unix-based systems, architectures, and network security devices. * Intermediate level of knowledge of LAN and WAN technologies. * Must have a solid understanding of information technology, information security domains. * Knowledge of security best practices and concepts.* Desired certifications: Security+, C|EH, Network+, Certified Information Systems Security Professional (CISSP), GIAC Certified Intrusion Analyst, GIAC Certified Incident Handler, or GIAC Reverse Engineering Malware. * Familiarity with ticketing tool / ITSM tool. * Personal drive, positive work ethic to deliver results within tight deadlines and in demanding situations.
Qualifications: * Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. * Minimum of 12 months of prior MDR/SOC/Incident response experience. * Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required. * Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics. * Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments. * Demonstrated strong oral and written communication and client facing skills. * Demonstrated strong analytical and communications skills.* Flexibility to adapt to different types of engagement, working hours, work environments, and locations. * Proven ability to work creatively, analytically in a problem-solving environment. * Ability to work nights, weekends, and/or holidays in the event of an incident response emergency.* Be comfortable working against deadlines in a fast-paced environment. * Identify issues, opportunities for improvement, and communicate them to an appropriate senior member.
Roles and responsibilities:A Level 3 Security Analyst is a subject matter expert responsible for managing threats, disseminating information, and handling, responding to, and investigating all incident escalations from the L1 & L2 security teams. Level 3 team members will further an investigation and ensure root cause and resolution for metrics, tracking, lessons learned are compiled, documented and disseminated in conjunction with the CSIRT process. They will provide insight and expertise to examine malicious code (malware), attack vectors, network communication methods, analyze threats against target systems and networks, determine target network capabilities and vulnerabilities, support development and maintenance of new tools and techniques to exploit specific targets, and produce technical after-action reports in support of the SOC. Level 3 analysts will be the focal point for critical security events and incidents and will serve as subject matter experts in providing recommendations to the SOC Manager and other members of Information Security and IT management for escalation and remediation.
Additionally, the Level 2 Analysts will: * Validate IOCs that triggered the original alert.* Investigate intrusion attempts and perform in-depth analysis and correlation of network traffic, host-based alerts, and forensic images as needed. Conduct in-depth investigations of events that are escalated by Level 1 Analysts. * Research additional internal and external data sources for additional enrichment of event information. * Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident. * Create filters, data monitors, dashboards, and reports within monitoring utilities. * Troubleshoot security monitoring devices to improve event correlation and performance. * Handle high and critical severity incidents as described in the operations playbook. * Monitor Level 1 Analyst performance investigating incoming events using SOC-available tools. * Ensure the events populated in the SIEM portals are addressed in a timely manner using available reporting and metrics.* Coordinate with SIEM Engineers to tune events and alerts. * Assist with Threat Hunting activities at the direction of one or more Incident Response Handlers. * Drive and monitor shift-related metrics processes ensuring applicable reporting is gathered and disseminated per SOC requirements. * Conduct proactive threat research.
Required Technical skills: * 5+ years of technical experience in Information Security, System Administration, or Network Engineering with at least 4-5 years of experience in Information Security.* Experience scripting with PowerShell, bash/ksh/sh, Cisco IOS.sh, JunOS sh/csh, Perl, Tcl, Lua.* Some programming experience with C, C++, C#, Python, HTML, JavaScript, .NET.* Familiarity with common network vulnerability/penetration testing tools including, but not limited to, Metasploit, vulnerability scanners, Kali Linux, and Nmap.* 2-4 year’s experience with SIEM tools (Sentinel, Splunk, Logrhythm, etc.).* 2-4 year's experience in Azure Sentinel.* Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire).* Knowledge of Windows, Unix-based systems, architectures, and network security devices. * Intermediate level of knowledge of LAN and WAN technologies.* Knowledge of networking protocols and security implications.* 2-4 years' experience with Incident Response activities .* Experience with packet analysis and packet capture tools. * Solid understanding of TCP/IP protocol, OSI Seven Layer Model. * Expert knowledge of security best practices and concepts.* Desired certifications: Security+, C|EH, Network+, Certified Information Systems Security Professional (CISSP), GIAC Certified Intrusion Analyst, GIAC Certified Incident Handler, or GIAC Reverse Engineering Malware .* Familiarity with ticketing tool / ITSM tool.
Qualifications: * Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field.* 18-24 months of prior MDR/SOC/Incident response experience.* Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required.* Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics. * Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments.* Be customer-oriented, flexible and demonstrated tendency to go above and beyond.* Demonstrated strong oral and written communication and client facing skills.* Demonstrated strong analytical and communications skills.* Flexibility to adapt to different types of engagement, working hours, work environments, and locations.* Proven ability to work creatively, analytically in a problem-solving environment.* Ability to work nights, weekends, and/or holidays in the event of an incident response emergency.* Understand SIEM solution design and configuration.* Be comfortable working against deadlines in a fast-paced environment. * Identify issues, opportunities for improvement, and communicate them to an appropriate senior member
Job Description:Demonstrated experience of successful design and delivery of substantial learning courses and programs to high quality standards for demanding audiencesExperience in instructional design, with few years in a management role.Proven track record of designing and developing effective learning programs.Strong understanding of adult learning principles and instructional design models.Experience with various instructional design tools and technologies, such as authoring tools, learning management systems (LMS), and multimedia production software.Excellent project management and organizational skills.Significant attention to detail, a logical approach and the ability to meet challenging deadlines Strong communication, interpersonal, and presentation skills.Ability to work independently and as part of a team.Must Have Skills:8 years experience in learning and development roleCandidate must have experience in consulting backgroundStrong experience in stakeholders management
Roles and Responsibilities:The Security Operations Manager is responsible for leading the day-to-day operations of the SOC Analyst staff. The role coordinates and works with the SOC Analysts to make sure that the analysts, processes, and technology are meeting the SOC security monitoring, analysis, and escalation objectives, organization service level agreements, objectives, and metrics. They are also responsible for communicating with the executive level management team (when deemed necessary) and serving as the principle liaison coordinating incident response functions.
In addition, the SOC Manger will: Lead the 24x7 delivery team, foster innovation, and drive accountability within SOC engineering. Oversee the daily activities of the SOC to ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies. Ensure escalation of cases to the appropriate teams. Conduct follow-up meetings of escalated or noteworthy cases and modifies SOPs and playbooks based on policies, standards and best practices learned from previous cases. Provide technical oversight for security tool deployment and implementation . Continuously monitor levels of service as well as interpret and prioritize threats through use of intrusion detection systems, firewalls and other boundary protection devices, and any security incident management products deployed. Recognize potential, successful, and unsuccessful intrusion attempts and compromises thorough review and analyses of relevant event detail and summary information. Monitor and proactively mitigate information security risks. Coordinate shift schedule and deployment of staffing within the established structure. Manage regular, holiday, illness, vacation and emergency scheduling. Keep current with the latest vendor updates, expansion opportunities, and technology directions, utilized in the Clients environment. Ensure daily operational processes effectively support SOC operations objectives. Ensure the Director of Cybersecurity Services is aware of any issues or incidents. Own the successful completion of all daily operational processes and procedures. Ensure analysts follow existing procedures and all procedures are documented in accordance with local guidelines. Establish operational foundations, defining metrics and KPIs to drive governance, quality, and efficiency.Influence and improve existing processes through innovation and operational change. Manage staffing, including recruitment, supervision, scheduling, development, evaluation, and disciplinary actions. Required Technical skills: Minimum 7 years Security leadership, with experience building long-term career development plans for team members at all levels. Exceptional operational rigor with extensive real-world experience in ITIL methodologies and frameworks for IT operations. Experience in designing, implementing and measuring relevant security and technology management critical success factors, key performance indicators, and metrics . Ability to create shift schedules to ensure 24x7 coverage by support personnel . In-depth knowledge of modern security concepts and how to apply the Advanced scripting knowledge with languages like PowerShell, bash/ksh/sh, Cisco IOS.sh, JunOS sh/csh, Perl, Tcl, Lua. Familiarity with Azure Sentinel. Familiarity with common network vulnerability/penetration testing tools including, but not limited to, Metasploit, vulnerability scanners, Kali Linux, and Nmap. 4-6 year's experience with SIEM tools (Sentinel, Splunk, Logrhythm, etc.). Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire). Knowledge of Windows, Unix-based systems, architectures, and network security devices . Intermediate level of knowledge of LAN and WAN technologies. Knowledge of networking protocols and security implications. 4-6 year’s experience with Incident Response activities . Experience with packet analysis and packet capture tools. Expert knowledge of security best practices and concepts. Qualifications: Masters or Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or a related field; or an equivalent experience in lieu of degree. Demonstrated understanding of Information Security and Networking required. Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required. Proven ability to diagnose and troubleshoot technical issues required. Proven ability to make decisions and perform complex problem-solving activities under pressure. Previous management and project leadership experience required. Demonstrated strong oral and written communication and client facing skills. Flexibility to adapt to different types of engagement, working hours, work environments, and locations. Proven ability to work creatively, analytically in a problem-solving environment.
Desired Certifications:Security+, C|EH, Network+, Certified Information Systems Manager (CISM), Certified Information Systems Security Professional (CISSP), GIAC Certified Intrusion Analyst, GIAC Certified Incident Handler, or GIAC Reverse Engineering Malware.
Roles and responsibilities:A Level 3 Security Analyst is a subject matter expert responsible for managing threats, disseminating information, and handling, responding to, and investigating all incident escalations from the L1 & L2 security teams. Level 3 team members will further an investigation and ensure root cause and resolution for metrics, tracking, lessons learned are compiled, documented and disseminated in conjunction with the CSIRT process. They will provide insight and expertise to examine malicious code (malware), attack vectors, network communication methods, analyze threats against target systems and networks, determine target network capabilities and vulnerabilities, support development and maintenance of new tools and techniques to exploit specific targets, and produce technical after-action reports in support of the SOC. Level 3 analysts will be the focal point for critical security events and incidents and will serve as subject matter experts in providing recommendations to the SOC Manager and other members of Information Security and IT management for escalation and remediation.
Additionally, the Level 2 Analysts will: Validate IOCs that triggered the original alert. Investigate intrusion attempts and perform in-depth analysis and correlation of network traffic, host-based alerts, and forensic images as needed. Conduct in-depth investigations of events that are escalated by Level 1 Analysts. Research additional internal and external data sources for additional enrichment of event information. Determine when an event has reached the threshold of an incident and engage Incident Response Handler to declare an incident. Create filters, data monitors, dashboards, and reports within monitoring utilities. Troubleshoot security monitoring devices to improve event correlation and performance. Handle high and critical severity incidents as described in the operations playbook. Monitor Level 1 Analyst performance investigating incoming events using SOC-available tools. Ensure the events populated in the SIEM portals are addressed in a timely manner using available reporting and metrics. Coordinate with SIEM Engineers to tune events and alerts. Assist with Threat Hunting activities at the direction of one or more Incident Response Handlers. Drive and monitor shift-related metrics processes ensuring applicable reporting is gathered and disseminated per SOC requirements. Conduct proactive threat research.
Required Technical skills: 5+ years of technical experience in Information Security, System Administration, or Network Engineering with at least 4-5 years of experience in Information Security. Experience scripting with PowerShell, bash/ksh/sh, Cisco IOS.sh, JunOS sh/csh, Perl, Tcl, Lua. Some programming experience with C, C++, C#, Python, HTML, JavaScript, .NET. Familiarity with common network vulnerability/penetration testing tools including, but not limited to, Metasploit, vulnerability scanners, Kali Linux, and Nmap. 2-4 year’s experience with SIEM tools (Sentinel, Splunk, Logrhythm, etc.). 2-4 year's experience in Azure Sentinel. Familiarity with common IDS/IPS and Firewalls (Snort, Cisco, Fortigate, Sourcefire). Knowledge of Windows, Unix-based systems, architectures, and network security devices. Intermediate level of knowledge of LAN and WAN technologies. Knowledge of networking protocols and security implications. 2-4 years' experience with Incident Response activities . Experience with packet analysis and packet capture tools. Solid understanding of TCP/IP protocol, OSI Seven Layer Model. Expert knowledge of security best practices and concepts. Desired certifications: Security+, C|EH, Network+, Certified Information Systems Security Professional (CISSP), GIAC Certified Intrusion Analyst, GIAC Certified Incident Handler, or GIAC Reverse Engineering Malware . Familiarity with ticketing tool / ITSM tool.
Qualifications: Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. 18-24 months of prior MDR/SOC/Incident response experience. Demonstrated technical knowledge of current network security, network hardware, protocols, and standards required. Shall have demonstrated professional experience in incident detection and response, malware analysis, or cyber forensics. Act as a workstream participant to support tier-1, tier-2, or tier-3 SOC environments. Be customer-oriented, flexible and demonstrated tendency to go above and beyond. Demonstrated strong oral and written communication and client facing skills. Demonstrated strong analytical and communications skills. Flexibility to adapt to different types of engagement, working hours, work environments, and locations. Proven ability to work creatively, analytically in a problem-solving environment. Ability to work nights, weekends, and/or holidays in the event of an incident response emergency. Understand SIEM solution design and configuration. Be comfortable working against deadlines in a fast-paced environment. Identify issues, opportunities for improvement, and communicate them to an appropriate senior member.
The Cyber Delivery Leader for KPMG Philippines will be responsible for leading and managing the delivery of cybersecurity solutions and services in alignment with KPMG’s global strategies. The role includes driving delivery excellence, fostering cross-functional collaboration, and ensuring the timely, secure, and high-quality execution of cybersecurity initiatives. This position requires deep expertise in cybersecurity, strong leadership capabilities, and a commitment to delivering value to clients while upholding KPMG’s quality, risk, and governance standards.
Key ResponsibilitiesAs Cyber Delivery Leader:• Lead the end-to-end delivery of multiple cybersecurity engagements, ensuring alignment with client expectations, timelines, and quality standards.• Drive a high-performing cybersecurity team, fostering a culture of collaboration, innovation, and continuous improvement.• Serve as the primary point of contact for clients on cybersecurity delivery matters, ensuring proactive communication, stakeholder alignment, and exceptional client satisfaction.• Lead presales and business development efforts, including RFP responses, proposal development, and client presentations.• Oversee risk management across the delivery lifecycle, proactively identifying and mitigating potential threats to security, timelines, and budgets.• Manage resource planning and allocation, ensuring optimal utilization across internal teams and external partners to support delivery excellence.• Ensure adherence to KPMG’s quality, risk, and compliance standards, embedding industry best practices across all cybersecurity solutions.• Champion continuous improvement initiatives, leveraging client feedback and emerging technologies to enhance delivery methodologies and outcomes.Maintain robust project governance and reporting mechanisms, ensuring transparency, accountability, and alignment with senior leadership and global stakeholders.
Strategic Focus Areas:· Client Management: Oversee client transitions, solutioning, and project onboarding to the Centre.· Risk Management: Assess and escalate risks appropriately across delivery and support services.· Process Excellence: Implement First Pass Yield, Lean, and Continuous Improvement methodologies to drive delivery innovation.· Business Continuity: Maintain compliance with BCP and certifications like ISO/SOC through rigorous internal audits.· Efficiency & Cost Management: Optimize delivery team utilization, cost-to-serve, and implement year-over-year efficiency plans.· Innovation: Drive digital transformation and automation aligned with KPMG’s global initiatives.
Required Qualifications & Experience:· Bachelor’s or master’s degree in computer science, Information Security, or a related field.· 20+ years of experience in cybersecurity, with at least 5 years in a leadership or project delivery role.· Proven track record of successfully delivering complex cybersecurity programs for enterprise clients.· Strong understanding of cyber transformation (Identity & Access Management) Cyber threats, risk management, Privacy, Third Party Risk Management, security frameworks (e.g., NIST, ISO 27001,GDPR) and regulatory requirements.· Professional certifications such as CISSP, CISM, PMP, or equivalent are strongly preferred.· Strong experience in various Cyber technologies such as SailPoint, CyberArk, Microsoft Security and Google Security products· Exceptional communication, stakeholder management, and negotiation skills.· Strong analytical and problem-solving abilities, with an eye for detail and quality.· Ability to adapt to fast-paced, evolving environments and manage multiple priorities simultaneously.
— 6+ year of experience in SAP MM, Source to Pay, with at least 1 end to end implementation in SAP S/4HANA— In Depth Configuration Knowledge on MM Enterprise Structure, Master Data, Procurement Process and Inventory Management— In Depth Knowledge on Logistics Invoice Verification and Automatic Account Determination Process— Should have hands-on Experience on end to end MM Configuration— Should have experience on PO Pricing Procedure and Inter/Intra Company pricing procedures— Should have experience on Special Procurement processes such as Sub-Contract, Third party, Consignment processes— Should be having experience on Batch Determination process in Inbound and Outbound Logistics— Should be able to work on integration aspects such as SD,PP,QM,PM and Ariba— Should be able to individually work on creation of Sales orders, Work orders, QM orders— Should be able to understand the SAP standard P2P tables and able to understand the ABAP debugging knowledge and Table Maintenance knowledge— Should have knowledge on WRICEF objects and able to work on interfaces and Enhancements— Should be able to prepare test case documents, test plan and Data Migration activities using either LSMW or SAP S/4 LTMC— Should have knowledge on Fiori Apps, should have knowledge or hands-on experience on SAP S/4— Having knowledge and Hands-on Experience/Knowledge on Extended Warehouse Management is addon advantage— Having Knowledge on Ariba is also addon advantage— Preferably Having experience on Pharmaceuticals and Life science projects
Job Summary:The Application Architect will be responsible for the design and implementation of Salesforce solutions as part of the application support services provided to the clients. The ideal candidate would have extensive experience in developing and implementing Salesforce solutions and managing complex projects. The candidate should also be comfortable working in a fast-paced environment, working independently, and providing guidance and direction to technical teams.
Responsibilities:• Work with the team to analyze business requirements and develop solutions that can be implemented in Salesforce.• Develop customized Salesforce applications that meet business requirements.• Design and implement Salesforce solutions that satisfy client needs.• Monitor system performance and ensure scalability of the system architecture.• Create technical documentation that supports the design and development of Salesforce solutions.• Engage with stakeholders to understand business processes, requirements, and challenges and translate them into technical solutions.• Manage the technical teams involved in the design, development, and implementation of Salesforce solutions.• Drive technical excellence, innovation and ensure that the latest Salesforce technology and best practices are being implemented.• Provide thought leadership and mentorship to the technical team.• Being willing to work outside of your scheduled shift or taking on extra hours to ensure the success of a project or meet the needs of customers in different time zones.• Managing time and tasks effectively to complete assigned duties within the scheduled timings.
Requirements:• Bachelor’s degree in computer science, Information Technology, or relevant field• A minimum of 8-10 years of experience in developing and implementing Salesforce solutions• Excellent knowledge of Salesforce products and services such as Public Sector Cloud, Financial Services Cloud, Education Cloud, Salesforce OmniStudio (OmniScripts/Integration Procedures), Service Cloud, Salesforce Experience Cloud and Force.com• Strong understanding of Git repo, DevOps process knowledge• Strong understanding of Salesforce architecture and design concepts such as Apex, Visualforce, Lighting Components, and SOQL• Experience in developing Salesforce integrations with third-party cloud platforms.• Strong problem-solving skills, with an ability to analyze complex issues and provide creative solutions.• Excellent communication skills and ability to translate technical concepts to non-technical stakeholders.• Experience of working in Agile/SCRUM methodology would be preferred.• Salesforce certifications such as Salesforce Certified Application Architect, Salesforce Certified Technical Architect, or Salesforce Certified System Architect would be preferred.Overall, the Application Architect is a crucial role that requires a strong technical background in Salesforce, excellent communication and interpersonal skills, and project management experience to design and implement scalable Salesforce solutions that meet client needs. The candidate should be self-motivated, flexible, and able to work independently or in a team and provide mentorship to team members.
We are seeking an experienced SAP EWM Consultant to design, implement, and support SAP Extended Warehouse Management solutions. The role involves configuring warehouse processes, optimizing inventory management, and integrating EWM with other SAP modules to ensure efficient and accurate warehouse operations.Key Responsibilities:Solution Design & ImplementationConfigure and implement SAP EWM functionalities including inbound/outbound processes, storage control, and warehouse task management.Set up warehouse structures (storage types, bins, work centers) and define strategies for putaway, picking, and replenishment.Integrate SAP EWM with SAP ERP (MM, SD) and other logistics systems.
Position: HR LeadLevel: Senior ManagerLocation: Manila, Philippines (BGC)
Role OverviewThe HR Lead – KPMG Philippines (Senior Manager) will be responsible for establishing, leading, and scaling the HR function for KPMG Philippines in a high-growth, technology-driven, shared services/startup-like environment.This role requires a HR leader, with mandatory tech hiring expertise, strong hands-on execution capability, and broad exposure across the HR lifecycle including L&D, employee engagement, retention, compensation & benefits, risk management, labor laws and legal & compliance.The incumbent will work closely with Philippines business leadership, ASPAC Regional HR leadership, global HR CoEs, and central HR support teams in KPMG India to enable rapid workforce scaling, operational stability, and alignment with regional and global people strategies. Collaboration, ownership, and a “roll up your sleeves” mindset are critical to success in this role.
Key ResponsibilitiesHR Strategy & LeadershipSet up and lead the end-to-end HR function for KPMG Philippines, including HR policies, frameworks, governance, and operating models.Act as a trusted HR Lead to KPMG Philippines leadership and regional stakeholders.Align local HR strategies with ASPAC regional and global KPMG people strategies.Drive organizational culture, employee engagement, and values in line with business objectives.Build a scalable HR model leveraging central HR and TA support from India.Talent Acquisition & Workforce PlanningLead and scale technology hiring across engineering, data, digital, and IT services roles.Develop and execute TA strategies aligned to business growth and delivery plans.Conduct industry benchmarking and talent market scans to inform hiring strategy, compensation decisions, and workforce planning.Partner with business leaders on workforce planning, capability building, and succession planning.Bring an advisory mindset to hiring decisions (good to have).HR Operations & Employee Lifecycle ManagementOversee the full employee lifecycle, including:OnboardingPerformance managementCompensation & benefitsLearning & developmentEmployee engagement and retentionEmployee relations and offboardingDesign and implement HR processes that balance speed, compliance, and scalability.Support L&D initiatives, employee capability building, and leadership development programs.Use HR data and insights to support decision-making and continuous improvement.Risk Management, Compliance & GovernanceEnsure full compliance with Philippine labor laws, statutory requirements, and regional HR standards.Manage HR risk, employee relations matters, and compliance issues.Provide guidance on complex HR, employee relations, and governance matters.Ensure audit-ready HR processes and documentation.Stakeholder & Global CollaborationOperate effectively in a global, matrixed organization, partnering with regional and global HR teams.Support and localize global HR programs and initiatives.Act as a key connector between leadership, employees, and cross‑border stakeholders.Collaborate closely across teams; collaboration is key to success in this role.
Preferred / Good-to-Have ExperienceAdvisory or consulting exposure.Prior experience with a Big 4 organization or similar global professional services firm.Exposure to ASPAC or global HR roles within multinational organizations.
Key Competencies & AttributesStrong business partnering and stakeholder management skills.Strategic thinking combined with strong hands-on execution.Highly collaborative, proactive, and solution-oriented.Comfortable operating in ambiguity and fast-paced, startup-like environments.Strong communication, influencing, and leadership capabilities.High ownership mindset with the ability to work independently.