352 Cyber Security jobs in Malaysia

Cyber Security Analyst

Kuala Lumpur, Kuala Lumpur Dentsu Aegis Network

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

This is an exciting time to join Dentsu Aegis Network (DAN) as we focus on becoming a 100% digital economy business by 2020 through content, media and commerce. We are well placed to build capability, scale and sustainable growth as a high performance business. Our strategy is driven by our unique culture with one vision (to innovate the way brands are built), one set of values and a unique operating model which drives collaboration, client focus and attention. The Global Technology operating model is based around a set of principles and a clear alignment to the Business strategy. Those core themes are formed around scalability, compliant and agile solutions and propagating a significant move to cloud.

Job Description:

Role purpose

The purpose of this role is to work as part of the cyber security team to implement an organised approach to addressing and managing security breaches or cyberattacks. Performing investigations and providing reports with root cause analysis, which will be used as strategic programs of work to improve the overall security assurance of DAN. With a goal to limit damage and reduce recovery time and costs.

Key accountabilities

• Perform daily, weekly, monthly maintenance and management tasks.

• Perform response analytics during and after an incident, determine root cause and proper mitigation of cyber security events.

• Engage with other teams to mitigate cyber security threats, improve processes, and improve security posture, analysing threat intelligence for relevancy, impact, and exposure.

• Conduct log analysis utilising SIEM, IPS, Firewall, Proxy, AV and other to determine the extent of a compromise. • Monitor and manage security tool consoles, ensuring all alerts are responded to, escalating incidents quickly

• Perform risk and vulnerability assessments

• Track cyber threat actors/campaigns based from technical analysis and open source intelligence.

• Maintain current knowledge of tools, techniques, and procedures of attackers

• Keep up to date on current Advanced Persistent Threats and mitigation techniques.

• Conduct research pertaining into cyber threats, campaigns, vulnerabilities, and technological advances in combating unauthorised access.

• Investigate alerts, anomalies, errors, intrusions, and malware for evidence of compromise.

• Take ownership of cyber security call queues ensuring tickets are closed based on defined SLAs.

Professional skills

• Must possess excellent analytical, troubleshooting, and problem-solving skills. • Possess a high level of capabilities in research and data collation • Excellent organization and time management skills. • Able to handle multiple deadlines, and to effectively perform during high pressure or stressful situations. • Good presentation skills both verbal and written on both technical and non-technical information. With a strong eye for detail • Very good organisational and communication skills, with the ability to build relationships with peers. • Experience producing security documentation and other technical analysis reports • Experience working in a team-oriented, collaborative environment.

Key Experiences

• Demonstrates a good knowledge and understanding of cyber security attack techniques and threats, with a strong technical background. • Ability to quickly identify indication of compromise and take appropriate action to mitigate or eradicate.

Location:

Kuala Lumpur

Brand:

Bcoe

Time Type:

Full time

Contract Type:

Permanent #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Kuala Lumpur, Kuala Lumpur Dentsu Aegis Network Ltd.

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

This is an exciting time to join Dentsu Aegis Network (DAN) as we focus on becoming a 100% digital economy business by 2020 through content, media and commerce. We are well placed to build capability, scale and sustainable growth as a high performance business. Our strategy is driven by our unique culture with one vision (to innovate the way brands are built), one set of values and a unique operating model which drives collaboration, client focus and attention. The Global Technology operating model is based around a set of principles and a clear alignment to the Business strategy. Those core themes are formed around scalability, compliant and agile solutions and propagating a significant move to cloud.

Job Description:

Role purpose

The purpose of this role is to work as part of the cyber security team to implement an organised approach to addressing and managing security breaches or cyberattacks. Performing investigations and providing reports with root cause analysis, which will be used as strategic programs of work to improve the overall security assurance of DAN. With a goal to limit damage and reduce recovery time and costs.

Key accountabilities

• Perform daily, weekly, monthly maintenance and management tasks.

• Perform response analytics during and after an incident, determine root cause and proper mitigation of cyber security events.

• Engage with other teams to mitigate cyber security threats, improve processes, and improve security posture, analysing threat intelligence for relevancy, impact, and exposure.

• Conduct log analysis utilising SIEM, IPS, Firewall, Proxy, AV and other to determine the extent of a compromise. • Monitor and manage security tool consoles, ensuring all alerts are responded to, escalating incidents quickly

• Perform risk and vulnerability assessments

• Track cyber threat actors/campaigns based from technical analysis and open source intelligence.

• Maintain current knowledge of tools, techniques, and procedures of attackers

• Keep up to date on current Advanced Persistent Threats and mitigation techniques.

• Conduct research pertaining into cyber threats, campaigns, vulnerabilities, and technological advances in combating unauthorised access.

• Investigate alerts, anomalies, errors, intrusions, and malware for evidence of compromise.

• Take ownership of cyber security call queues ensuring tickets are closed based on defined SLAs.

Professional skills

• Must possess excellent analytical, troubleshooting, and problem-solving skills. • Possess a high level of capabilities in research and data collation • Excellent organization and time management skills. • Able to handle multiple deadlines, and to effectively perform during high pressure or stressful situations. • Good presentation skills both verbal and written on both technical and non-technical information. With a strong eye for detail • Very good organisational and communication skills, with the ability to build relationships with peers. • Experience producing security documentation and other technical analysis reports • Experience working in a team-oriented, collaborative environment.

Key Experiences

• Demonstrates a good knowledge and understanding of cyber security attack techniques and threats, with a strong technical background. • Ability to quickly identify indication of compromise and take appropriate action to mitigate or eradicate.

Location:

Kuala Lumpur

Brand:

Bcoe

Time Type:

Full time

Contract Type:

Permanent

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Kuala Lumpur, Kuala Lumpur Dentsu Aegis Network

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

This is an exciting time to join Dentsu Aegis Network (DAN) as we focus on becoming a 100% digital economy business by 2020 through content, media and commerce. We are well placed to build capability, scale and sustainable growth as a high performance business. Our strategy is driven by our unique culture with one vision (to innovate the way brands are built), one set of values and a unique operating model which drives collaboration, client focus and attention. The Global Technology operating model is based around a set of principles and a clear alignment to the Business strategy. Those core themes are formed around scalability, compliant and agile solutions and propagating a significant move to cloud. Job Description: Role purpose The purpose of this role is to work as part of the cyber security team to implement an organised approach to addressing and managing security breaches or cyberattacks. Performing investigations and providing reports with root cause analysis, which will be used as strategic programs of work to improve the overall security assurance of DAN. With a goal to limit damage and reduce recovery time and costs. Key accountabilities • Perform daily, weekly, monthly maintenance and management tasks. • Perform response analytics during and after an incident, determine root cause and proper mitigation of cyber security events. • Engage with other teams to mitigate cyber security threats, improve processes, and improve security posture, analysing threat intelligence for relevancy, impact, and exposure. • Conduct log analysis utilising SIEM, IPS, Firewall, Proxy, AV and other to determine the extent of a compromise. • Monitor and manage security tool consoles, ensuring all alerts are responded to, escalating incidents quickly • Perform risk and vulnerability assessments • Track cyber threat actors/campaigns based from technical analysis and open source intelligence. • Maintain current knowledge of tools, techniques, and procedures of attackers • Keep up to date on current Advanced Persistent Threats and mitigation techniques. • Conduct research pertaining into cyber threats, campaigns, vulnerabilities, and technological advances in combating unauthorised access. • Investigate alerts, anomalies, errors, intrusions, and malware for evidence of compromise. • Take ownership of cyber security call queues ensuring tickets are closed based on defined SLAs. Professional skills • Must possess excellent analytical, troubleshooting, and problem-solving skills. • Possess a high level of capabilities in research and data collation • Excellent organization and time management skills. • Able to handle multiple deadlines, and to effectively perform during high pressure or stressful situations. • Good presentation skills both verbal and written on both technical and non-technical information. With a strong eye for detail • Very good organisational and communication skills, with the ability to build relationships with peers. • Experience producing security documentation and other technical analysis reports • Experience working in a team-oriented, collaborative environment. Key Experiences • Demonstrates a good knowledge and understanding of cyber security attack techniques and threats, with a strong technical background. • Ability to quickly identify indication of compromise and take appropriate action to mitigate or eradicate. Location: Kuala Lumpur

Brand: Bcoe

Time Type: Full time

Contract Type: Permanent #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Engineer

Petaling Jaya, Selangor SLB

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

About Us

We are a global technology company, driving energy innovation for a balanced planet. Together, we create amazing technology that unlocks access to energy for the benefit of all.

About Us

We are a global technology company, driving energy innovation for a balanced planet. Together, we create amazing technology that unlocks access to energy for the benefit of all.

Our inclusive culture is the key to our success. We collaborate with our internal community of colleagues, alumni, and our valued external partners to support each other and achieve our goals. We aim to raise the bar high. We look for people who are committed to innovation and success and act with integrity to become and be a part of one of the most diverse group of experts in our industry, anywhere around the globe.

Global in outlook, local in practice – and with a united, shared passion for discovering solutions, we hire talented, driven people and support them to succeed, personally and professionally.

Job Description

We are looking for experts of various seniority, whether you are a new starter to cybersecurity with experience in related fields like Computer Networking, System Administration, or already had the chance to fight against cyber threats, we are interested in learning more about you.

The position offered will depend on candidate's experience, knowledge, and ability. Ideal applicant will also be highly motivated and self-driven, with a passion for all things IT. Our security operations team offers a large range of opportunities to expand your skillset through responding to real incidents, ranging from commodity malware to nation state actors, and learning from seasoned cybersecurity professionals with hands on experience in a wide array of fields.

Below key points can be used as guidance for who we are mostly likely to consider and what we do, but if you possess some other unique skills or knowledge not mentioned that you think we could find useful, we would love to hear from you. Likewise, even if some of those are foreign to you, we might consider you for a less senior position.

About You

  • Do you possess the investigate mindset, always being on the lookout for potential threat actor activity?
  • Are you interested in more hands-on, technical work that will put your skills in incident triaging, responding, and remediating to the test?
  • Are you motivated individual looking for an opportunity to expand your knowledge and skills?
  • Are you capable of taking the mantle of a leader, driving incident response from start to resolution?
  • Do you love working with other professionals that you can learn from?
  • Is mentoring less experienced people and seeing them grow something that you find satisfying?
  • Do terms like digital forensic, incident response, threat hunting, malware analysis, process injection, advanced persistent threat tactics, techniques, and procedures excite you?
  • Do you love reading and learning more about attacker tools and techniques?

Roles And Responsibilities

  • Carry out incident triage, investigation, and remediation, across variety of systems, from Windows to IoT devices, mobile and cloud.
  • Analyze and remediate email related threats, ranging from phishing to business email compromise
  • Review existing processes and develop new ones for incident detection, investigation, and remediation
  • Evaluate new logging opportunities to expand our coverage and detection capabilities
  • Produce high quality written and verbal communication, recommendation, and finding for our stakeholders and rest of the cybersecurity team
  • Proactively investigate telemetry for signs of compromise
  • Evaluate new attack techniques and exploits to uncover breaches and develop new detection opportunities
  • Learn about modern attacker tactics, techniques and procedures
  • Develop your knowledge and skills

Qualifications And Experience

  • System/Network administration - understanding how systems work is key to protect them, your knowledge and experience provide a great background to dive into cybersecurity
  • Digital Forensics/Incident Response -you already know the drill, learning new tools and processes is only a matter of onboarding
  • Penetration testing/Red teaming- offensive security heavily relies on the underlying understanding of the target, without it, exploitation of properly secured systems is near impossible. You already know what to look for and how attackers think, but you want to see the other side of the cyber fence
  • Programming - you understand how code works, know the ways to secure and debug it, also being aware of potential mistakes that could be leveraged by malicious actors
  • Cloud - Transform businesses with scalable, and innovative cloud solutions which bring new challenges to secure them; your expertise would help driving innovative clod solutions which bring new challenges to secure them your expertise would help driving innovation, efficiency and security
  • Generic IT/Help desk - you have been keeping close relationship with users in your organization, understanding problems they are facing and how to investigate and remediate threats
  • Certifications - You are constantly looking to expand your knowledge, earning certifications from well-respected companies like GIAC, Offensive Security, HackTheBox, 13cubed, and similar. Specific certifications that will not hurt your chances are GCFA, OSEP, OSED, OSCP, 13cubed trainings, HTB CDSA, CCD, CWL, C3SA, and any other hands-on blue/red team credentials.

Skills

Additionally, all our candidates should possess the following skills:

  • Capable of completing technical tasks with little to no supervision
  • Ability to work alone as well as within a larger team
  • Desire to grow and expand both technical and soft skills
  • Ability to foster a positive work environment and attitude
  • At least B2 level in written and spoken English, fluency preferred

Requirements

  • Must be willing to work weekend shifts every 6-10 weeks, as well as on some public holidays as needed.

Benefits Working At SLB

  • Hybrid office working model
  • Above industry standard compensation with additional performance-based monetry rewards
  • High training budget, including SANS certifications
  • Flexible working schedule arrangements
  • Opportunity for business travel to our other offices all around the world
  • Comprehensive and inclusive health benefits
  • Physical wellness reimburement program

SLB is an equal employment opportunity employer. Qualified applicants are considered without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or other characteristics protected by law.

Seniority level
  • Seniority level Not Applicable
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Oil and Gas

Referrals increase your chances of interviewing at SLB by 2x

Get notified about new Cyber Security Engineer jobs in Petaling Jaya, Selangor, Malaysia .

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago

WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago

Federal Territory of Kuala Lumpur, Malaysia 4 weeks ago

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

IT Specialist, Network and Security (MY)

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 4 months ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

IT Administrator (Cyber Security) (m/f/d)

Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 4 months ago

Section Head, Cybersecurity Architecture

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago

Federal Territory of Kuala Lumpur, Malaysia 3 days ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago

Federal Territory of Kuala Lumpur, Malaysia 3 days ago

Federal Territory of Kuala Lumpur, Malaysia 2 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Engineer

Petaling Jaya, Selangor Schlumberger Limited

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

We are a global technology company, driving energy innovation for a balanced planet. Together, we create amazing technology that unlocks access to energy for the benefit of all.

Our inclusive culture is the key to our success. We collaborate with our internal community of colleagues, alumni, and our valued external partners to support each other and achieve our goals. We aim to raise the bar high. We look for people who are committed to innovation and success and act with integrity to become and be a part of one of the most diverse group of experts in our industry, anywhere around the globe.

Global in outlook, local in practice – and with a united, shared passion for discovering solutions, we hire talented, driven people and support them to succeed, personally and professionally.

Job Description

We are looking for experts of various seniority, whether you are a new starter to cybersecurity with experience in related fields like Computer Networking, System Administration, or already had the chance to fight against cyber threats, we are interested in learning more about you.

The position offered will depend on candidate's experience, knowledge, and ability. Ideal applicant will also be highly motivated and self-driven, with a passion for all things IT. Our security operations team offers a large range of opportunities to expand your skillset through responding to real incidents, ranging from commodity malware to nation state actors, and learning from seasoned cybersecurity professionals with hands on experience in a wide array of fields.

Below key points can be used as guidance for who we are mostly likely to consider and what we do, but if you possess some other unique skills or knowledge not mentioned that you think we could find useful, we would love to hear from you. Likewise, even if some of those are foreign to you, we might consider you for a less senior position.

About You
  • Do you possess the investigate mindset, always being on the lookout for potential threat actor activity?
  • Are you interested in more hands-on, technical work that will put your skills in incident triaging, responding, and remediating to the test?
  • Are you motivated individual looking for an opportunity to expand your knowledge and skills?
  • Are you capable of taking the mantle of a leader, driving incident response from start to resolution?
  • Do you love working with other professionals that you can learn from?
  • Is mentoring less experienced people and seeing them grow something that you find satisfying?
  • Do terms like digital forensic, incident response, threat hunting, malware analysis, process injection, advanced persistent threat tactics, techniques, and procedures excite you?
  • Do you love reading and learning more about attacker tools and techniques?
Roles and Responsibilities:
  • Carry out incident triage, investigation, and remediation, across variety of systems, from Windows to IoT devices, mobile and cloud.
  • Analyze and remediate email related threats, ranging from phishing to business email compromise.
  • Review existing processes and develop new ones for incident detection, investigation, and remediation.
  • Evaluate new logging opportunities to expand our coverage and detection capabilities.
  • Produce high quality written and verbal communication, recommendation, and finding for our stakeholders and rest of the cybersecurity team.
  • Proactively investigate telemetry for signs of compromise.
  • Evaluate new attack techniques and exploits to uncover breaches and develop new detection opportunities.
  • Learn about modern attacker tactics, techniques and procedures.
  • Develop your knowledge and skills.
Qualifications and Experience:
  • System/Network administration - understanding how systems work is key to protect them, your knowledge and experience provide a great background to dive into cybersecurity.
  • Digital Forensics/Incident Response - you already know the drill, learning new tools and processes is only a matter of onboarding.
  • Penetration testing/Red teaming - offensive security heavily relies on the underlying understanding of the target, without it, exploitation of properly secured systems is near impossible. You already know what to look for and how attackers think, but you want to see the other side of the cyber fence.
  • Programming - you understand how code works, know the ways to secure and debug it, also being aware of potential mistakes that could be leveraged by malicious actors.
  • Cloud - Transform businesses with scalable, and innovative cloud solutions which bring new challenges to secure them; your expertise would help driving innovation, efficiency and security.
  • Generic IT/Help desk - you have been keeping close relationship with users in your organization, understanding problems they are facing and how to investigate and remediate threats.
  • Certifications - You are constantly looking to expand your knowledge, earning certifications from well-respected companies like GIAC, Offensive Security, HackTheBox, 13cubed, and similar. Specific certifications that will not hurt your chances are GCFA, OSEP, OSED, OSCP, 13cubed trainings, HTB CDSA, CCD, CWL, C3SA, and any other hands-on blue/red team credentials.
Additionally, all our candidates should possess the following skills:
  • Capable of completing technical tasks with little to no supervision.
  • Ability to work alone as well as within a larger team.
  • Desire to grow and expand both technical and soft skills.
  • Ability to foster a positive work environment and attitude.
  • At least B2 level in written and spoken English, fluency preferred.
Requirements
  • Must be willing to work weekend shifts every 6-10 weeks, as well as on some public holidays as needed.
Benefits working at SLB
  • Hybrid office working model.
  • Above industry standard compensation with additional performance-based monetary rewards.
  • High training budget, including SANS certifications.
  • Opportunity for business travel to our other offices all around the world.
  • Comprehensive and inclusive health benefits.
  • Physical wellness reimbursement program.

SLB is an equal employment opportunity employer. Qualified applicants are considered without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or other characteristics protected by law.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Engineer

Petaling Jaya, Selangor BJAK

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Cyber Security Engineer role at BJAK

1 day ago Be among the first 25 applicants

Join to apply for the Cyber Security Engineer role at BJAK

Get AI-powered advice on this job and more exclusive features.

Safeguard the Infrastructure Powering Southeast Asia’s Leading Fintech

At BJAK, technology is our backbone, from real-time insurance quoting to payment infrastructure and claims automation. With millions of users across Southeast Asia and rapidly growing operations, security is not just a function - it's mission-critical.

We are hiring a Cybersecurity Engineer to own and drive the protection of our platforms, devices, and data. This is not a passive role. It’s for someone who can build, monitor, respond, and harden systems in real time, while thinking two steps ahead of evolving threats.

This is a high-responsibility position reporting directly to senior management, designed for someone who thrives in high-stakes environments and is energized by fast execution, shifting priorities, and full accountability. If you're looking for predictability and handholding, this isn’t for you. If you operate with urgency, think like an owner, and love solving complex problems with autonomy, you’ll feel right at home.

What You’ll Do

  • Own and lead the end-to-end cybersecurity function across infrastructure, cloud, endpoints, and applications.
  • Monitor SOC alerts, conduct threat intelligence analysis, and drive incident response from detection to closure.
  • Implement, configure, and manage EDRs, firewalls, antivirus, intrusion detection systems, and other security platforms.
  • Perform vulnerability assessments and penetration testing, prioritize risks, and implement fixes proactively.
  • Drive DevSecOps practices across the software development lifecycle, ensuring security is embedded at every stage.
  • Evaluate and secure cloud infrastructure (GCP, AWS, or Azure), including identity and access controls, encryption, and audit logging.
  • Lead security audits and support regulatory compliance activities, including ISO 27001, NIST, or equivalent frameworks.
  • Collaborate with cross-functional teams (DevOps, Compliance, Legal, Product) to build a culture of security across the company.
  • Conduct security awareness training and simulate real-world attack scenarios to improve employee readiness.
  • Own the security risk register and continuously improve controls based on current and emerging threats.
  • Interface with external auditors, regulators, and third-party vendors to demonstrate readiness and resolve findings quickly.

You’ll Thrive Here If You.

  • Think and operate like an owner - no excuses, no delays, just action.
  • Stay calm under pressure, decisive in incidents, and effective when things break.
  • Are self-directed and proactive - you don't wait to be told what to do.
  • Are comfortable wearing multiple hats and handling shifting priorities.
  • Care deeply about protecting users, systems, and business integrity.
  • Take initiative to improve what’s broken - even if it's outside your scope.
  • Have a strong bias for speed, clarity, and delivering real outcomes, not just activity.
  • Want to be part of a tight-knit, high-output team where your work directly impacts millions.

What You Bring

  • Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or a related technical field.
  • 3+ years of hands-on experience in cybersecurity or information security roles, preferably in high-growth or regulated environments.
  • Strong knowledge of cybersecurity tools and practices - including EDR, firewalls, SIEM, IDS/IPS, and antivirus platforms.
  • Proven track record in handling real incidents, performing root cause analysis, and improving controls.
  • Experience with cloud security (GCP, AWS, Azure) and a working knowledge of IAM, encryption, and cloud-native threat modeling.
  • Familiarity with regulatory and compliance frameworks (e.g., ISO 27001, NIST, HIPAA, local data protection laws).
  • Solid understanding of DevSecOps, secure software development, and CI/CD pipeline security.
  • Able to communicate clearly across functions and escalate with clarity when needed.
  • Immediate availability is highly preferred.

Nice to Have

  • Cybersecurity certifications such as CISSP, CEH, OSCP, or equivalent.
  • Experience in fintech, banking, or any high-risk digital platform environment.
  • Experience interfacing directly with auditors, regulators, or compliance committees.
  • Familiarity with ethical hacking, red teaming, or adversary simulation tools.
  • Scripting or automation skills to improve security operations at scale.

Our Team & Culture

We’re not a big corporate - we’re a high-speed, high-trust startup. We solve hard problems, move fast, and keep execution at the center of everything. Titles don’t matter here. Impact does. Everyone is expected to think independently, act fast, and take full ownership.

Security at BJAK is a leadership-level responsibility. If you want a seat at the table, take it. If you care about doing things right, not just ticking boxes, you’ll thrive here. We value clarity, urgency, and execution, not red tape.

What You’ll Get

  • Competitive salary and performance-based bonuses.
  • Hybrid working model with high autonomy and trust.
  • Direct access to senior leadership and visibility on strategic matters.
  • High-impact role with ownership from day one - your work protects millions.
  • Opportunity to shape BJAK’s security architecture from the ground up.
  • Fast-tracked growth in a mission-driven fintech company backed by tech.

About BJAK

BJAK is Southeast Asia’s largest digital insurance platform. Headquartered in Malaysia with operations in Thailand, Taiwan, and Japan, we help millions of users access transparent, affordable financial protection through Bjak.com.

We simplify complex financial services through automation, AI, and secure digital infrastructure, making finance faster, smarter, and safer for everyone.

If you're ready to lead cybersecurity in a startup that demands speed, integrity, and ownership, we want to talk to you.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at BJAK by 2x

Sign in to set job alerts for “Cyber Security Engineer” roles.

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 7 months ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Internship - Cybersecurity (Security Architecture) (RID-00564)

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago

Petaling Jaya, Selangor, Malaysia 5 months ago

Petaling Jaya, Selangor, Malaysia 2 days ago

Kota Damansara, Selangor, Malaysia 1 week ago

Internship - Network & Information Security Engineer

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago

Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Cyber Security Engineer (Penetration Tester) Security Operations Center Analyst (SOC Analyst)

WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 days ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 5 months ago

IT Administrator (Cyber Security) (m/f/d)

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago

Petaling Jaya, Selangor, Malaysia 2 days ago

Section Head, Cybersecurity Architecture

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago

Petaling Jaya, Selangor, Malaysia 23 hours ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago

Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Engineer

Petaling Jaya, Selangor SLB

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

About Us

We are a global technology company, driving energy innovation for a balanced planet. Together, we create amazing technology that unlocks access to energy for the benefit of all. About Us

We are a global technology company, driving energy innovation for a balanced planet. Together, we create amazing technology that unlocks access to energy for the benefit of all.

Our inclusive culture is the key to our success. We collaborate with our internal community of colleagues, alumni, and our valued external partners to support each other and achieve our goals. We aim to raise the bar high. We look for people who are committed to innovation and success and act with integrity to become and be a part of one of the most diverse group of experts in our industry, anywhere around the globe.

Global in outlook, local in practice – and with a united, shared passion for discovering solutions, we hire talented, driven people and support them to succeed, personally and professionally.

Job Description

We are looking for experts of various seniority, whether you are a new starter to cybersecurity with experience in related fields like Computer Networking, System Administration, or already had the chance to fight against cyber threats, we are interested in learning more about you.

The position offered will depend on candidate's experience, knowledge, and ability. Ideal applicant will also be highly motivated and self-driven, with a passion for all things IT. Our security operations team offers a large range of opportunities to expand your skillset through responding to real incidents, ranging from commodity malware to nation state actors, and learning from seasoned cybersecurity professionals with hands on experience in a wide array of fields.

Below key points can be used as guidance for who we are mostly likely to consider and what we do, but if you possess some other unique skills or knowledge not mentioned that you think we could find useful, we would love to hear from you. Likewise, even if some of those are foreign to you, we might consider you for a less senior position.

About You

Do you possess the investigate mindset, always being on the lookout for potential threat actor activity? Are you interested in more hands-on, technical work that will put your skills in incident triaging, responding, and remediating to the test? Are you motivated individual looking for an opportunity to expand your knowledge and skills? Are you capable of taking the mantle of a leader, driving incident response from start to resolution? Do you love working with other professionals that you can learn from? Is mentoring less experienced people and seeing them grow something that you find satisfying? Do terms like digital forensic, incident response, threat hunting, malware analysis, process injection, advanced persistent threat tactics, techniques, and procedures excite you? Do you love reading and learning more about attacker tools and techniques?

Roles And Responsibilities

Carry out incident triage, investigation, and remediation, across variety of systems, from Windows to IoT devices, mobile and cloud. Analyze and remediate email related threats, ranging from phishing to business email compromise Review existing processes and develop new ones for incident detection, investigation, and remediation Evaluate new logging opportunities to expand our coverage and detection capabilities Produce high quality written and verbal communication, recommendation, and finding for our stakeholders and rest of the cybersecurity team Proactively investigate telemetry for signs of compromise Evaluate new attack techniques and exploits to uncover breaches and develop new detection opportunities Learn about modern attacker tactics, techniques and procedures Develop your knowledge and skills

Qualifications And Experience

System/Network administration - understanding how systems work is key to protect them, your knowledge and experience provide a great background to dive into cybersecurity Digital Forensics/Incident Response -you already know the drill, learning new tools and processes is only a matter of onboarding Penetration testing/Red teaming- offensive security heavily relies on the underlying understanding of the target, without it, exploitation of properly secured systems is near impossible. You already know what to look for and how attackers think, but you want to see the other side of the cyber fence Programming - you understand how code works, know the ways to secure and debug it, also being aware of potential mistakes that could be leveraged by malicious actors Cloud - Transform businesses with scalable, and innovative cloud solutions which bring new challenges to secure them; your expertise would help driving innovative clod solutions which bring new challenges to secure them your expertise would help driving innovation, efficiency and security Generic IT/Help desk - you have been keeping close relationship with users in your organization, understanding problems they are facing and how to investigate and remediate threats Certifications - You are constantly looking to expand your knowledge, earning certifications from well-respected companies like GIAC, Offensive Security, HackTheBox, 13cubed, and similar. Specific certifications that will not hurt your chances are GCFA, OSEP, OSED, OSCP, 13cubed trainings, HTB CDSA, CCD, CWL, C3SA, and any other hands-on blue/red team credentials.

Skills

Additionally, all our candidates should possess the following skills:

Capable of completing technical tasks with little to no supervision Ability to work alone as well as within a larger team Desire to grow and expand both technical and soft skills Ability to foster a positive work environment and attitude At least B2 level in written and spoken English, fluency preferred

Requirements

Must be willing to work weekend shifts every 6-10 weeks, as well as on some public holidays as needed.

Benefits Working At SLB

Hybrid office working model Above industry standard compensation with additional performance-based monetry rewards High training budget, including SANS certifications Flexible working schedule arrangements Opportunity for business travel to our other offices all around the world Comprehensive and inclusive health benefits Physical wellness reimburement program

SLB is an equal employment opportunity employer. Qualified applicants are considered without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or other characteristics protected by law. Seniority level

Seniority level Not Applicable Employment type

Employment type Full-time Job function

Job function Information Technology Industries Oil and Gas Referrals increase your chances of interviewing at SLB by 2x Get notified about new Cyber Security Engineer jobs in

Petaling Jaya, Selangor, Malaysia . Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago Federal Territory of Kuala Lumpur, Malaysia 4 weeks ago Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago IT Specialist, Network and Security (MY)

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 4 months ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago IT Administrator (Cyber Security) (m/f/d)

Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 4 months ago Section Head, Cybersecurity Architecture

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 days ago Federal Territory of Kuala Lumpur, Malaysia 3 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago Federal Territory of Kuala Lumpur, Malaysia 3 days ago Federal Territory of Kuala Lumpur, Malaysia 2 days ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cyber security Jobs in Malaysia !

Cyber Security Engineer

Petaling Jaya, Selangor Schlumberger Limited

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

We are a global technology company, driving energy innovation for a balanced planet. Together, we create amazing technology that unlocks access to energy for the benefit of all. Our inclusive culture is the key to our success. We collaborate with our internal community of colleagues, alumni, and our valued external partners to support each other and achieve our goals. We aim to raise the bar high. We look for people who are committed to innovation and success and act with integrity to become and be a part of one of the most diverse group of experts in our industry, anywhere around the globe. Global in outlook, local in practice – and with a united, shared passion for discovering solutions, we hire talented, driven people and support them to succeed, personally and professionally. Job Description

We are looking for experts of various seniority, whether you are a new starter to cybersecurity with experience in related fields like Computer Networking, System Administration, or already had the chance to fight against cyber threats, we are interested in learning more about you. The position offered will depend on candidate's experience, knowledge, and ability. Ideal applicant will also be highly motivated and self-driven, with a passion for all things IT. Our security operations team offers a large range of opportunities to expand your skillset through responding to real incidents, ranging from commodity malware to nation state actors, and learning from seasoned cybersecurity professionals with hands on experience in a wide array of fields. Below key points can be used as guidance for who we are mostly likely to consider and what we do, but if you possess some other unique skills or knowledge not mentioned that you think we could find useful, we would love to hear from you. Likewise, even if some of those are foreign to you, we might consider you for a less senior position. About You

Do you possess the investigate mindset, always being on the lookout for potential threat actor activity? Are you interested in more hands-on, technical work that will put your skills in incident triaging, responding, and remediating to the test? Are you motivated individual looking for an opportunity to expand your knowledge and skills? Are you capable of taking the mantle of a leader, driving incident response from start to resolution? Do you love working with other professionals that you can learn from? Is mentoring less experienced people and seeing them grow something that you find satisfying? Do terms like digital forensic, incident response, threat hunting, malware analysis, process injection, advanced persistent threat tactics, techniques, and procedures excite you? Do you love reading and learning more about attacker tools and techniques? Roles and Responsibilities:

Carry out incident triage, investigation, and remediation, across variety of systems, from Windows to IoT devices, mobile and cloud. Analyze and remediate email related threats, ranging from phishing to business email compromise. Review existing processes and develop new ones for incident detection, investigation, and remediation. Evaluate new logging opportunities to expand our coverage and detection capabilities. Produce high quality written and verbal communication, recommendation, and finding for our stakeholders and rest of the cybersecurity team. Proactively investigate telemetry for signs of compromise. Evaluate new attack techniques and exploits to uncover breaches and develop new detection opportunities. Learn about modern attacker tactics, techniques and procedures. Develop your knowledge and skills. Qualifications and Experience:

System/Network administration - understanding how systems work is key to protect them, your knowledge and experience provide a great background to dive into cybersecurity. Digital Forensics/Incident Response - you already know the drill, learning new tools and processes is only a matter of onboarding. Penetration testing/Red teaming - offensive security heavily relies on the underlying understanding of the target, without it, exploitation of properly secured systems is near impossible. You already know what to look for and how attackers think, but you want to see the other side of the cyber fence. Programming - you understand how code works, know the ways to secure and debug it, also being aware of potential mistakes that could be leveraged by malicious actors. Cloud - Transform businesses with scalable, and innovative cloud solutions which bring new challenges to secure them; your expertise would help driving innovation, efficiency and security. Generic IT/Help desk - you have been keeping close relationship with users in your organization, understanding problems they are facing and how to investigate and remediate threats. Certifications - You are constantly looking to expand your knowledge, earning certifications from well-respected companies like GIAC, Offensive Security, HackTheBox, 13cubed, and similar. Specific certifications that will not hurt your chances are GCFA, OSEP, OSED, OSCP, 13cubed trainings, HTB CDSA, CCD, CWL, C3SA, and any other hands-on blue/red team credentials. Additionally, all our candidates should possess the following skills:

Capable of completing technical tasks with little to no supervision. Ability to work alone as well as within a larger team. Desire to grow and expand both technical and soft skills. Ability to foster a positive work environment and attitude. At least B2 level in written and spoken English, fluency preferred. Requirements

Must be willing to work weekend shifts every 6-10 weeks, as well as on some public holidays as needed. Benefits working at SLB

Hybrid office working model. Above industry standard compensation with additional performance-based monetary rewards. High training budget, including SANS certifications. Opportunity for business travel to our other offices all around the world. Comprehensive and inclusive health benefits. Physical wellness reimbursement program. SLB is an equal employment opportunity employer. Qualified applicants are considered without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, or other characteristics protected by law.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Engineer

Petaling Jaya, Selangor BJAK

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the

Cyber Security Engineer

role at

BJAK 1 day ago Be among the first 25 applicants Join to apply for the

Cyber Security Engineer

role at

BJAK Get AI-powered advice on this job and more exclusive features. Safeguard the Infrastructure Powering Southeast Asia’s Leading Fintech

At BJAK, technology is our backbone, from real-time insurance quoting to payment infrastructure and claims automation. With millions of users across Southeast Asia and rapidly growing operations, security is not just a function - it's mission-critical.

We are hiring a Cybersecurity Engineer to own and drive the protection of our platforms, devices, and data. This is not a passive role. It’s for someone who can build, monitor, respond, and harden systems in real time, while thinking two steps ahead of evolving threats.

This is a high-responsibility position reporting directly to senior management, designed for someone who thrives in high-stakes environments and is energized by fast execution, shifting priorities, and full accountability. If you're looking for predictability and handholding, this isn’t for you. If you operate with urgency, think like an owner, and love solving complex problems with autonomy, you’ll feel right at home.

What You’ll Do

Own and lead the end-to-end cybersecurity function across infrastructure, cloud, endpoints, and applications. Monitor SOC alerts, conduct threat intelligence analysis, and drive incident response from detection to closure. Implement, configure, and manage EDRs, firewalls, antivirus, intrusion detection systems, and other security platforms. Perform vulnerability assessments and penetration testing, prioritize risks, and implement fixes proactively. Drive DevSecOps practices across the software development lifecycle, ensuring security is embedded at every stage. Evaluate and secure cloud infrastructure (GCP, AWS, or Azure), including identity and access controls, encryption, and audit logging. Lead security audits and support regulatory compliance activities, including ISO 27001, NIST, or equivalent frameworks. Collaborate with cross-functional teams (DevOps, Compliance, Legal, Product) to build a culture of security across the company. Conduct security awareness training and simulate real-world attack scenarios to improve employee readiness. Own the security risk register and continuously improve controls based on current and emerging threats. Interface with external auditors, regulators, and third-party vendors to demonstrate readiness and resolve findings quickly.

You’ll Thrive Here If You.

Think and operate like an owner - no excuses, no delays, just action. Stay calm under pressure, decisive in incidents, and effective when things break. Are self-directed and proactive - you don't wait to be told what to do. Are comfortable wearing multiple hats and handling shifting priorities. Care deeply about protecting users, systems, and business integrity. Take initiative to improve what’s broken - even if it's outside your scope. Have a strong bias for speed, clarity, and delivering real outcomes, not just activity. Want to be part of a tight-knit, high-output team where your work directly impacts millions.

What You Bring

Bachelor’s degree in Computer Science, Cybersecurity, Information Security, or a related technical field. 3+ years of hands-on experience in cybersecurity or information security roles, preferably in high-growth or regulated environments. Strong knowledge of cybersecurity tools and practices - including EDR, firewalls, SIEM, IDS/IPS, and antivirus platforms. Proven track record in handling real incidents, performing root cause analysis, and improving controls. Experience with cloud security (GCP, AWS, Azure) and a working knowledge of IAM, encryption, and cloud-native threat modeling. Familiarity with regulatory and compliance frameworks (e.g., ISO 27001, NIST, HIPAA, local data protection laws). Solid understanding of DevSecOps, secure software development, and CI/CD pipeline security. Able to communicate clearly across functions and escalate with clarity when needed. Immediate availability is highly preferred.

Nice to Have

Cybersecurity certifications such as CISSP, CEH, OSCP, or equivalent. Experience in fintech, banking, or any high-risk digital platform environment. Experience interfacing directly with auditors, regulators, or compliance committees. Familiarity with ethical hacking, red teaming, or adversary simulation tools. Scripting or automation skills to improve security operations at scale.

Our Team & Culture

We’re not a big corporate - we’re a high-speed, high-trust startup. We solve hard problems, move fast, and keep execution at the center of everything. Titles don’t matter here. Impact does. Everyone is expected to think independently, act fast, and take full ownership.

Security at BJAK is a leadership-level responsibility. If you want a seat at the table, take it. If you care about doing things right, not just ticking boxes, you’ll thrive here. We value clarity, urgency, and execution, not red tape.

What You’ll Get

Competitive salary and performance-based bonuses. Hybrid working model with high autonomy and trust. Direct access to senior leadership and visibility on strategic matters. High-impact role with ownership from day one - your work protects millions. Opportunity to shape BJAK’s security architecture from the ground up. Fast-tracked growth in a mission-driven fintech company backed by tech.

About BJAK

BJAK is Southeast Asia’s largest digital insurance platform. Headquartered in Malaysia with operations in Thailand, Taiwan, and Japan, we help millions of users access transparent, affordable financial protection through Bjak.com.

We simplify complex financial services through automation, AI, and secure digital infrastructure, making finance faster, smarter, and safer for everyone.

If you're ready to lead cybersecurity in a startup that demands speed, integrity, and ownership, we want to talk to you.

Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Software Development Referrals increase your chances of interviewing at BJAK by 2x Sign in to set job alerts for “Cyber Security Engineer” roles.

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 7 months ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago Petaling Jaya, Selangor, Malaysia 1 month ago Internship - Cybersecurity (Security Architecture) (RID-00564)

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago Petaling Jaya, Selangor, Malaysia 5 months ago Petaling Jaya, Selangor, Malaysia 2 days ago Kota Damansara, Selangor, Malaysia 1 week ago Internship - Network & Information Security Engineer

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Cyber Security Engineer (Penetration Tester)

Security Operations Center Analyst (SOC Analyst)

WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 5 months ago IT Administrator (Cyber Security) (m/f/d)

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 5 months ago Petaling Jaya, Selangor, Malaysia 2 days ago Section Head, Cybersecurity Architecture

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago Petaling Jaya, Selangor, Malaysia 23 hours ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Manager

Pengerang, Johor PRefChem

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Get AI-powered advice on this job and more exclusive features.

Direct message the job poster from PRefChem

The Manager Cyber Security is responsible for leading the overall cybersecurity strategy, governance, and operations across the refinery and petrochemical plant. The role ensures the protection of IT systems, digital assets, and sensitive data from cyber threats. The position includes overseeing cyber defense operations, policy development, risk assessment, and security technology implementations tailored for industrial environments.

The role also to monitor the integration between IT and OT (Operational Technology)

Key Accountabilities

Strategic Leadership

Develop and execute a comprehensive cybersecurity strategy aligned with industry standards (e.g., NIST, ISA/IEC 62443) and the company’s operational risk profile.

Provide strategic direction and leadership to the cybersecurity team, covering IT, OT, and industrial control systems (ICS).

Serve as the key advisor to executive leadership on cybersecurity risks and mitigation strategies.

Cyber Defense & Monitoring

Lead the Security Operations Center (SOC) to ensure 24/7 monitoring, threat detection, and response.

Implement intrusion detection/prevention systems (IDS/IPS), SIEM, and endpoint protection across IT and OT networks.

Oversee incident response and recovery plans, including tabletop exercises and forensic investigations.

Policy & Compliance

Develop and enforce security policies, procedures, and standards for the plant’s digital environment.

Ensure compliance with internal governance and external regulatory requirements such as NIST, ISO 27001, PETRONAS TCS, or relevant local cybersecurity laws.

Coordinate audits, risk assessments, and penetration tests for continuous improvement.

OT Focus

Collaborate with OT to ensure cybersecurity controls in DCS, PLC, and other ICS environments.

Identify and support to secure legacy industrial systems with limited security capabilities that will integrate back to IT network

Cybersecurity Technology & Architecture

Evaluate, implement, and maintain security technologies, including firewalls, secure remote access, network segmentation, and identity management solutions.

Lead secure architecture reviews for new systems or technology deployments in the refinery and plant environment.

Lead cross-functional cybersecurity awareness programs and trainings.

Act as a liaison with external agencies, regulators, and industry peers on cyber intelligence sharing and coordination.

Qualification & Experience

Education:

Bachelor’s degree in Computer Science, Information Security, Engineering, or related field.

Master’s degree or MBA is an added advantage.

Certifications (Preferred):

CISSP, CISM, CISA, GICSP, or equivalent

ISA/IEC 62443, SABSA, TOGAF (if relevant)

Experience:

- Minimum 10 years of experience in cybersecurity with at least 5 years in a leadership role.

- Prior experience in oil & gas, refinery, petrochemical, or energy sectors is highly preferable and

an added advantage.

- Deep understanding of ICS/OT environments and cyber-physical system risks.

  • Competitive salary and benefit package
  • JV of giants (PETRONAS and Saudi Aramco)
  • Future leading world class integrated refinery and petrochemicals producer.
Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Strategy/Planning, Engineering, and Information Technology
  • Industries Manufacturing, Data Infrastructure and Analytics, and Information Services

Referrals increase your chances of interviewing at PRefChem by 2x

Get notified about new Cyber Security Manager jobs in Pengerang, Johore, Malaysia .

Assistant Director/Senior Manager (Cybersecurity Oversight) Chief Information Security Officer - Fintech VP, Cyber Security Program Manager, COO's Office Regional Manager, Business Security & Governance Manager Roles in Cyber Security Fusion Center (Express of Interest) Cybersecurity Manager (Network Infrastructure) Manager (Penetration Test & Vulnerability Assessment) Principal/Lead Consultant (Cybersecurity), Transformation Office AVP/VP (12 months contract), Cybersecurity (Governance Oversight) Deputy Director (Security Engineering), Cybersecurity Engineering Centre VP, AI Security Risk Manager, COO's Office Vice President, Global Cybersecurity Awareness and Training Client Information Security Lead/Senior Manager (Infra Enterprise) (Senior/Executive) Manager, Resilience and Cybersecurity Planning Director, APAC Solutions Consulting (Cybersecurity) Senior Manager – Cyber Security Architecture – IT/OT Projects – APAC (1 year Contract)

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cyber Security Jobs