Threat Intelligence Lead

Kuala Lumpur, Kuala Lumpur Canonical

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

Canonical Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Join or sign in to find your next job

Join to apply for the Threat Intelligence Lead role at Canonical

Continue with Google Continue with Google

Canonical Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Join to apply for the Threat Intelligence Lead role at Canonical

The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

  • Build and own Canonical's threat intelligence strategy
  • Build and maintain OSINT research environments
  • Develop OSINT tradecraft, principals, and techniques
  • Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
  • Collaborate across teams to inform on activity of interest
  • Coordinate adversary/campaign tracking
  • Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
  • Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
  • Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
  • Identify intelligence gaps and propose new tools and research projects to fill them
  • Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

  • An experienced threat intelligence leader (or similar)
  • Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
  • Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
  • Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
  • Experienced using threat intelligence data to influence enterprise architecture or product development decisions
  • An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
  • Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

  • A professional portfolio of OSINT related scripts, tools, or frameworks
  • Demonstrated involvement in the larger OSINT community (please share relevant links)
  • Degree qualified, with a bachelor's degree in computer science, information security, or a related field
  • Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
  • Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

  • Distributed work environment with twice-yearly team sprints in person
  • Personal learning and development budget of USD 2,000 per year
  • Annual compensation review
  • Recognition rewards
  • Annual holiday leave
  • Maternity and paternity leave
  • Employee Assistance Programme
  • Opportunity to travel to new locations to meet colleagues
  • Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Software Development

Referrals increase your chances of interviewing at Canonical by 2x

Sign in to set job alerts for “Threat Intelligence Lead” roles.

Continue with Google Continue with Google

Continue with Google Continue with Google

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Threat Intelligence Lead

Kuala Lumpur, Kuala Lumpur Canonical

Posted 3 days ago

Job Viewed

Tap Again To Close

Job Description

Canonical Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia Join or sign in to find your next job

Join to apply for the

Threat Intelligence Lead

role at

Canonical Continue with Google Continue with Google Canonical Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia Join to apply for the

Threat Intelligence Lead

role at

Canonical The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.

This role will report to the CISO.

You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.

As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.

What you'll do in this role

Build and own Canonical's threat intelligence strategy Build and maintain OSINT research environments Develop OSINT tradecraft, principals, and techniques Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets Collaborate across teams to inform on activity of interest Coordinate adversary/campaign tracking Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence Identify intelligence gaps and propose new tools and research projects to fill them Conduct briefings for executives, internal stakeholders and external customers

The successful Threat Intelligence Lead will be

An experienced threat intelligence leader (or similar) Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.) Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data Experienced using threat intelligence data to influence enterprise architecture or product development decisions An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences Able to travel twice a year, for company events up to two weeks long

Desired Characteristics

A professional portfolio of OSINT related scripts, tools, or frameworks Demonstrated involvement in the larger OSINT community (please share relevant links) Degree qualified, with a bachelor's degree in computer science, information security, or a related field Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc) Experience in a tech company or government/military signal intelligence departments

What we offer you

We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.

Distributed work environment with twice-yearly team sprints in person Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Employee Assistance Programme Opportunity to travel to new locations to meet colleagues Priority Pass, and travel upgrades for long haul company events

About Canonical

Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.

Canonical is an equal opportunity employer

We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.

Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries Software Development Referrals increase your chances of interviewing at Canonical by 2x Sign in to set job alerts for “Threat Intelligence Lead” roles.

Continue with Google Continue with Google Continue with Google Continue with Google We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Engineer

Kuala Lumpur, Kuala Lumpur Tech Titan Group - Titan Guard and Tech Titan Distribution

Posted 21 days ago

Job Viewed

Tap Again To Close

Job Description

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia Tech Titan

Flexible to accommodate urgent customer needs over weekends and public holidays

Perform tasks such as issues, deploying products, collecting artefacts for debugging

Provide high quality technical support by helping customers resolve issues including explaining usage, debugging failures, pinpointing problems, implementing workarounds, increasing performance, improving security, and determining root causes

Documenting all support issue details while supporting customers to ensure details are available for all relevant parties

Work cooperatively with team members to arrive at issue resolution as per Service Level Agreement before escalating to engineering team

Contribute, maintain, and improve knowledge base articles, training materials, and other repositories of information

Report customer use cases, requirements, enhancement requests, and recommend fixes

Practice the give and take model of knowledge and experience exchange by sharing information to the team

Constantly improving job skills through participation in product, technology, and customer service training as it is made available

Participate in improving processes, communication, systems, etc.

Qualifications

Demonstrated Required Skills and Abilities:

Graduated with Bachelor's Degree in Computer Science or Engineering or equivalent technical experience

Able to communicate in English (written)

For Mac, Windows, Linux, iOS, or Android

In Xcode, Visual Studio, Android Studio, or Eclipse

Ability to troubleshoot system issues

Fundamental understanding of computer architecture and low-level details of the programming languages used by the products you are supporting

Interest and experience in security a great advantage

Ability to work effectively with a remote team using modern, collaborative tools such as Microsoft Teams, Zoom, and Webex

Strong customer service skills ability to work with customers in a manner that is professional, compassionate, and effective

Ability to synthesize and clearly communicate complex technical issues to technical and non-technical audiences at all levels, both internally and externally

Additional Information

Office Hours: Monday - Friday, 9am - 6pm

Smart Casual Fridays

Salary is negotiable depending on experience

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Architect

Kuala Lumpur, Kuala Lumpur Businesslist

Posted 22 days ago

Job Viewed

Tap Again To Close

Job Description

Responsibilities

  • Develop and implement comprehensive cybersecurity strategies tailored to the manufacturing industry.
  • Design secure architectures and solutions to safeguard IT systems and sensitive data.
  • Conduct risk assessments and vulnerability analysis to identify potential threats.
  • Collaborate with cross-functional teams to integrate security measures into technology projects.
  • Ensure compliance with relevant cybersecurity regulations and standards.
  • Monitor and respond to security incidents, providing actionable recommendations.
  • Educate and train employees on cybersecurity best practices and protocols.
  • Stay updated on the latest cybersecurity trends and technologies to enhance defenses.
The Successful Applicant
  • A degree in Computer Science, Information Technology, or a related field.
  • Proven expertise in cybersecurity principles, frameworks, and tools.
  • Experience designing secure IT architectures for large organizations.
  • Knowledge of industry regulations and compliance requirements.
  • Strong analytical and problem-solving skills with attention to detail.
  • Ability to work collaboratively with diverse teams in a fast-paced environment.
  • Excellent communication skills to present technical concepts clearly.
What’s on Offer
  • Attractive salary range of MYR to MYR annually.
  • Performance-based bonus and 13th-month salary.
  • MYR 4000 annual flexible benefits for personal use.
  • Comprehensive insurance and medical coverage, including dependents.
  • Enhanced EPF contribution of 15%.

This is an excellent opportunity for a Cybersecurity Architect to join a leading manufacturing organization in Malaysia. If you are passionate about technology and security, we encourage you to apply.

Contact: Ryan Wong

Phone:

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Kuala Lumpur, Kuala Lumpur Cognizant

Posted 24 days ago

Job Viewed

Tap Again To Close

Job Description

Overview

APAC Talent Acquisition Lead at Cognizant

We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 4 years of hands-on experience to support cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures.

Responsibilities
  • Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.).
  • Investigate and respond to security incidents and vulnerabilities.
  • Assist in the development and enforcement of security policies and procedures.
  • Support vulnerability assessments and penetration testing activities.
  • Maintain and update documentation related to security operations and incident response.
  • Collaborate with IT and business teams to ensure secure system configurations and practices.
  • Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks.
  • Stay updated on emerging threats and recommend mitigation strategies.
Required Skills & Qualifications
  • Bachelor’s degree in Computer Science, Information Security, or related field.
  • Around 4 years of experience in cybersecurity or IT security operations.
  • Familiarity with SIEM tools and antivirus.
  • Understanding of network protocols, system vulnerabilities, and threat vectors.
  • Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR).
  • Strong analytical and problem-solving skills.
  • Good communication and documentation abilities.
Preferred Certifications (Optional but Advantageous)
  • CompTIA Security+
  • Certified Ethical Hacker (CEH)
  • GIAC Security Essentials (GSEC)
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • IT Services and IT Consulting

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Kuala Lumpur, Kuala Lumpur MYR40000 - MYR80000 Y ONESECURE Asia Pte Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

We are inviting anyone with a keen interest in Cybersecurity to join our growing Malaysia team. This role is a technical role and will require someone with some basic understanding of networking technologies. However, if you do not have the required experience but has an analytic mind, we will provide the necessary training for you to grow in our company.

Responsibilities

  • Monitor alerts, research threat activity and recommend appropriate remediation
  • Perform triage and alert customer of any suspicious events with recommendations.
  • Maintain an accurate audit trail of security requests and events
  • Generate, execute and analyze security reports
  • Demonstrate exceptional communication skills working with regional teams.

Requirements

  • Candidate must possess at least Degree in Cybersecurity or Computer Science or equivalent.
  • Candidate must
  • Basic system and network security fundamentals.
  • Knowledge of desktop, server, database, application and network principles for problem management, risk identification and analysis
  • Able to work 12 hours shift
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Analyst

Kuala Lumpur, Kuala Lumpur MYR90000 - MYR120000 Y EPS Consultants

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Responsibilities

● Designing and implementing cutting-edge cybersecurity solutions to protect applications, data, and infrastructure.

● Continuously improving security measures to mitigate security risks.

● Conducting vulnerability assessments, penetration testing, and risk analysis to identify and address security gaps.

● Diagnosing and responding to security incidents, ensuring rapid containment and resolution.

● Maintaining security best practices and ensuring compliance with relevant industry standards and regulations.

● Mentoring team members to enhance their cybersecurity knowledge and adherence to best practices.

● Developing and integrating security tools for monitoring, detection, and response.

● Improving automation for security testing and deployment pipelines to ensure rapid and secure software delivery.

● Collaborating with development, DevOps, and IT teams to embed security into the software development lifecycle (SDLC).

Job Requirements

● Bachelor's or Master's Degree in Computer Science, Cybersecurity, or a related field.

● 2+ years of real-world experience in cybersecurity.

● Fresh grads are encouraged to apply.

● Proven experience in anti-fraud systems, particularly in mobile security (APK protection and analysis).

● Strong knowledge of application security principles, including secure coding, encryption, authentication, and authorization.

● Hands-on experience with reverse engineering, obfuscation techniques, and tamper detection for APK security.

● Proficiency in security testing methodologies, including penetration testing, SAST, and DAST.

● Familiarity with tools such as Burp Suite, Metasploit, Frida, IDA Pro, or other reverse engineering tools.

● Experience in implementing and managing security frameworks, such as OWASP, NIST, and ISO 27001.

● Strong understanding of networking protocols, firewalls, IDS/IPS, and other security technologies.

● Proficiency in programming/scripting languages such as Python, Java, Kotlin, or C++.

● Experience with cloud security (AWS, Azure, or GCP) is a plus.

● DevSecOps and CI/CD pipeline security experience is highly preferred.

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity specialists Jobs in Kuala Lumpur !

Cybersecurity Governance

Kuala Lumpur, Kuala Lumpur MYR120000 - MYR240000 Y Nexperia Malaysia Sdn.

Posted today

Job Viewed

Tap Again To Close

Job Description

About the role

The Cybersecurity Governance & Process Analyst is a key role responsible for establishing, maintaining, and overseeing the cybersecurity governance framework and operational processes across the organization.

This position ensures that cybersecurity risks are properly identified, assessed, and managed in alignment with business objectives and regulatory requirements. The analyst focuses on developing and implementing effective cybersecurity policies, procedures, and controls while managing the enterprise risk register and driving audit findings to closure.

What you will do

Cybersecurity Governance Framework:

  • Develop, implement, and maintain the organization's cybersecurity governance framework
  • Ensure alignment with industry standards (NIST, ISO 27001, CIS Controls) and regulatory requirements
  • Establish and maintain cybersecurity policies, standards, and guidelines

Enterprise Risk Management:

  • Maintain and update the enterprise cybersecurity risk register
  • Conduct regular risk assessments and facilitate risk treatment plans
  • Monitor and report on cybersecurity risk posture to senior management

Process Development & Implementation:

  • Design, document, and implement cybersecurity processes and procedures
  • Develop and maintain process documentation, workflows, and SOPs
  • Ensure process integration across security domains and business units

Audit & Compliance Management:

  • Manage internal and external cybersecurity audits
  • Track audit findings and coordinate remediation activities
  • Prepare compliance reports and metrics for management review

Metrics & Reporting:

  • Develop and monitor cybersecurity governance metrics and KPIs
  • Prepare regular reports on governance effectiveness and compliance status
  • Analyze trends and recommend improvements to the governance program

Skills/Competencies

Technical & Functional Competencies:

  • Deep, practical knowledge of NIST CSF, NIST 800-53, ISO 27001, and CIS Critical Security Controls.
  • Superior skill in writing clear, concise, and enforceable policies, standards, and procedures.
  • Proficiency in risk assessment methodologies (e.g., NIST RMF, FAIR) and risk register management.
  • Hands-on experience with GRC platforms (e.g., ServiceNow IRM, RSA Archer, MetricStream) to automate workflows.
  • Strong understanding of audit processes and compliance requirements across multiple regulations.

Leadership & Soft Skills:

  • Exceptional ability to build consensus, socialize ideas, and influence change across technical and business teams without direct authority.
  • Ability to translate technical controls and risks into business terms for leadership and legal/compliance teams.
  • Strong organizational skills to manage multiple parallel workstreams and policy review cycles.
  • Attention to detail and process-oriented mindset

What you will need

  • Bachelor's degree in computer science, Cybersecurity, or related field, or equivalent practical experience.
  • 5-8 years in cybersecurity governance, risk management, or compliance roles
  • Relevant industry certifications (e.g. CISSP, CISM, CRISC, CISA, CGEIT, ISO 27001 Lead Auditor/Implementer)
  • Proven, hands-on experience in developing and implementing an enterprise cybersecurity policy framework from the ground up.
  • Demonstrable experience in managing cybersecurity risk registers and facilitating risk assessments.
  • Direct experience supporting external audits and managing remediation plans.
  • Governance Framework: Accountable for the development, maintenance, and effectiveness of the cybersecurity governance framework
  • Risk Management: Accountable for maintaining the enterprise cybersecurity risk register and ensuring risks are properly documented and treated
  • Process Compliance: Accountable for ensuring cybersecurity processes and procedures are documented, implemented, and followed across the organization
  • Audit Management: Accountable for tracking and ensuring timely closure of all cybersecurity audit findings and compliance gaps
  • Reporting Accuracy: Accountable for the accuracy and timeliness of cybersecurity governance reporting to management and relevant committees
  • Policy Management: Accountable for the regular review and update of cybersecurity policies and standards to ensure ongoing relevance and effectiveness

Talent acquisition based on Nexperia vacancies is not appreciated. Nexperia job adverts are Nexperia copyright material and the word Nexperia is a registered trademark.

D&I Statement

As an equal-opportunity employer, Nexperia values diversity not just because it is the right thing to do but because diverse teams perform better. We are dedicated to being inclusive, and a proof point of this dedication is that we were the main partner of the very first Dutch Paralympic Team NL House during the Paris 2024 Paralympic Games. Our recruitment process is inclusive and accessible to all, and we consider all applicants fairly, as well as providing a safe work environment and reasonable adjustments where requested.

In addition, we offer our colleagues the possibility to join employee resource groups such as the Pride Network Group or global and local Women's groups. Nexperia is committed to increasing women in management positions to 30% by 2030.

This advertiser has chosen not to accept applicants from your region.

Cybersecurity Manager

Kuala Lumpur, Kuala Lumpur MYR120000 - MYR240000 Y DayOne

Posted today

Job Viewed

Tap Again To Close

Job Description

Key Responsibilities

1 1. Project Management & Security Tool Implementation

  • Own and drive implementation of core security technologies (e.g., SIEM/Sentinel, SOAR, MDE, MDO, Purview, Intune, PAM, CASB).
  • Define project scope, milestones, deliverables, and success criteria for security initiatives.
  • Ensure on-time delivery of projects, managing risks, dependencies, and vendor support.
  • Develop runbooks, SOPs, and integration workflows for newly deployed tools.
  • Provide executive progress updates and ensure ROI from tool investments.

2. Governance, Policy & Compliance

  • Develop, update, and enforce information security policies (Information Security, Privacy, Acceptable Use, Governance, Risk Management).
  • Maintain ISMS/PIMS scope, Statement of Applicability, and compliance documentation.
  • Deliver compliance and audit-ready reports, including security metrics packs and awareness training records.

3. Risk Management

  • Maintain risk registers, treatment/action plans, and exception registers.
  • Monitor regulatory obligations and implement risk mitigation measures.
  • Deliver actionable reporting on risk exposure and treatment effectiveness.

4. Identity & Access Management

  • Oversee access recertifications, privileged access reviews, and service account governance.
  • Ensure MFA, conditional access, and jump host governance are enforced.

5. Security Operations & Incident Response

  • Deliver security reports (phishing simulations, DLP, EDR/NDR, incident tickets, PIRs).
  • Ensure tuning and coverage of SIEM use cases, EDR/EPP, NDR, and DLP policies.
  • Oversee incident lifecycle: detection, escalation, investigation, and post-mortems.

6. Vulnerability & Patch Management

  • Deliver patch compliance dashboards and vulnerability remediation tracking.
  • Ensure configuration baselines and deviations are regularly reported.
  • Monitor third-party vulnerability bulletins and coordinate patching actions.

7. Cloud & Platform Security

  • Deliver CSPM tracking and M365 Secure Score plans.
  • Oversee email security baselines, audit logging, and retention compliance.
  • Drive deployment of Purview for DLP, sensitivity labeling, insider risk, and eDiscovery.

8. Business Continuity & Third-Party Risk

  • Deliver Disaster Recovery Plans and test reports with clear action tracking.
  • Ensure vendor onboarding/offboarding processes include security reviews.
  • Maintain supplier due diligence records and third-party monitoring reports.

Key Deliverables

  • Project-based:
  • Security tool implementations completed on time and within scope.
  • Runbooks, SOPs, and playbooks for each deployed tool.
  • Integration of tools into SOC workflows (SIEM, SOAR, EDR, CASB, DLP, PAM).
  • Governance & Risk:
  • Approved and up-to-date security policies and ISMS/PIMS documentation.
  • Risk assessment reports, treatment plans, and compliance dashboards.
  • Regulatory compliance documentation (ISO 27001, SOC 2, PCI-DSS, GDPR, PDPA).
  • Operations & Reporting:
  • Monthly security metrics packs and management dashboards.
  • Incident response reports, tabletop exercise findings, and PIRs.
  • Patch, vulnerability, and configuration compliance dashboards.
  • CSPM, M365, and Intune security baselines with measured improvements.
  • Awareness & Training:
  • Organization-wide training records, phishing simulation results, and awareness metrics.

Skills & Qualifications

  • Bachelor's degree in Information Security, Computer Science, or related field.
  • Certifications: CISSP, CISM, PMP/Prince2 (for project delivery), ISO 27001 Lead Implementer.
  • Proven track record of delivering security tool projects (Microsoft stack preferred).
  • Strong knowledge of GRC frameworks (NIST CSF, ISO 27001, MITRE ATT&CK).
  • Hands-on experience in SIEM, SOAR, DLP, CASB, EDR, PAM, and cloud security controls.
  • Experience in vendor and third-party risk management.
  • Strong leadership, stakeholder communication, and project reporting skills.
This advertiser has chosen not to accept applicants from your region.

Cybersecurity Architect

Kuala Lumpur, Kuala Lumpur MYR120000 - MYR240000 Y YTL Power International

Posted today

Job Viewed

Tap Again To Close

Job Description

Company Description

YTL Power International Berhad is an international multi-utility owner and operator, active across key segments of the utilities industry. With operations, investments, and projects in Malaysia, Singapore, the United Kingdom, Indonesia, Jordan, and the Netherlands, YTL Power engages in power generation, water and sewerage, telecommunications, digital technologies, and investment holding activities. As of February 2025, the company's total assets stand at approximately USD 15 billion. We are committed to sustainable practices and innovative solutions in the utilities sector.

Role Description

This is a full-time hybrid role for a Cybersecurity Architect, located in WP. Kuala Lumpur with some work-from-home flexibility. The Cybersecurity Architect will be responsible for designing and implementing security architecture, ensuring application security, and maintaining robust network and information security. Day-to-day tasks include evaluating and addressing security threats, developing security strategies, and collaborating with various teams to ensure integration of security protocols.

Qualifications

  • Proficiency in Security Architecture Design and Cybersecurity
  • Experience in Application Security and Network Security
  • Strong knowledge in Information Security
  • Excellent problem-solving and analytical skills
  • Ability to work both independently and collaboratively in a hybrid environment
  • Bachelor's degree in Computer Science, Information Technology, or related field
  • Relevant certifications such as CISSP, CISM, or CEH are a plus
  • Experience in the utilities industry is an advantage
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Specialists Jobs View All Jobs in Kuala Lumpur