GENERAL REQUIREMENTS

To develop our business, we are currently looking for enthusiastic high motivated persons to fill the vacant positions in our Available roles and would be placed in the head office of bank BRI (Bank Rakyat Indonesia).
  1. Preferably graduates of State Universities / Private Universities with a minimum of Accreditation B.
  2. Prioritized at least having a GPA of 2.75 (PTN) and 3.00 (PTS).
  3. Have English language skills.
  4. Have good communication skills.
  5. Able to work in teams.
  6. Having knowledge, logic, understanding, mastery of science, and good abilities in the field of Information Technology work (evidenced by information on projects that have been handled mentioned in the CV)
  7. Having good analytical skills and solutions to problems.
  8. Willing to work overtime and official travel if needed.
  9. Good behavior, discipline, responsibility, integrity, and good professionalism.
  10. Look neat and polite.
  11. Having integrity, professionalism and obeying the rules / rules of work in the BRI environment.
  12. All work is carried out in BRI's environment.
  13. All source code resulting from the development of application systems, data, information and technical documents are BRI's property and are not permitted to store in personal files, distribute to other parties or use them on other projects outside BRI.
  14. It is not permissible to bring BRI devices to private residences or exit BRI without the permission of BRI's superior (SAD / Kabag).
  15. Comply with the rules and regulations at BRI.

SPECIFICATION

  • D3/S1/S2 from PTN apart as General requirements with courses related to the field of information technology jobs expected.
  • Preferably have experience working in the IT field (Vulnerability Researcher/Exploit Developer) a minimum of 2 years for the D3 and a minimum of 1 year to a graduate of S1/S2.
  • Maximum age for the D3 is 28 years old and has not been 29 years old.
  • Maximum age for S1 is 29 years old and has not been 30 years old.
  • Responsible for identifying the weaknesses of the system, and make the PoC code to validate the findings of the weakness.
APPLY