JD in English follows. JD
2013
Go BoldAll for OneBe a Pro3SustainabilityDiversity amp; InclusionTrust amp; OpennessWell-being for Performance4
Mercari Culture Doc
ITITIT
IT
IT
*
Mercari is a Japan-based company with the mission of create value in a global marketplace where anyone can buy amp; sell. Having continuously worked toward this goal since our founding in 2013, we are now transforming from a startup into a global player. While this transformation brings its own specific set of challenges, we believe that solving them one after another will allow us to fully achieve our mission. Are you interested in working together to take on these exciting challenges?
To achieve our mission at Mercari, our organization and each of our employees share the same values and perspectives. Our individual guidelines for action are defined by our three values: Go Bold, All for One, and Be a Pro. Our organization is also shaped by our four foundations: Sustainability, Diversity amp; Inclusion, Trust amp; Openness, and Well-being for Performance. Regardless of how big Mercari gets, the culture will remain essential to achieving our mission and something we want to preserve throughout our organization.
We invite you to read the Mercari Culture Doc, which summarizes the behaviors and mindset shared by Mercari and its employees. We continue to build an environment where all of our members of diverse backgrounds are accepted and recognized, and where they can thrive while holding dear Mercari’s culture.
As an IT Security Specialist, you will work closely with the product divisions and teams to lead security initiatives within the Mercari Group. This position handles a wide range of tasks, from upstream processes like assessing risks facing the corporate IT environment and defining requirements for security measures, to implementing solutions and other downstream processes. You will also work to strengthen security for the IT environment as a whole and contribute to implementing zero-trust architecture.
Formulating risk assessments and security strategies relating to the IT environment
Designing security measures for the IT environment
Implementing and running security solutions