162 Cybersecurity Specialists jobs in Kuala Lumpur
Threat Intelligence Lead
Posted 4 days ago
Job Viewed
Job Description
Canonical Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Join or sign in to find your next jobJoin to apply for the Threat Intelligence Lead role at Canonical
Continue with Google Continue with Google
Canonical Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Join to apply for the Threat Intelligence Lead role at Canonical
The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.
This role will report to the CISO.
You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.
As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.
What you'll do in this role
- Build and own Canonical's threat intelligence strategy
- Build and maintain OSINT research environments
- Develop OSINT tradecraft, principals, and techniques
- Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets
- Collaborate across teams to inform on activity of interest
- Coordinate adversary/campaign tracking
- Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space
- Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies
- Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence
- Identify intelligence gaps and propose new tools and research projects to fill them
- Conduct briefings for executives, internal stakeholders and external customers
- An experienced threat intelligence leader (or similar)
- Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts
- Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.)
- Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data
- Experienced using threat intelligence data to influence enterprise architecture or product development decisions
- An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences
- Able to travel twice a year, for company events up to two weeks long
- A professional portfolio of OSINT related scripts, tools, or frameworks
- Demonstrated involvement in the larger OSINT community (please share relevant links)
- Degree qualified, with a bachelor's degree in computer science, information security, or a related field
- Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc)
- Experience in a tech company or government/military signal intelligence departments
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
- Distributed work environment with twice-yearly team sprints in person
- Personal learning and development budget of USD 2,000 per year
- Annual compensation review
- Recognition rewards
- Annual holiday leave
- Maternity and paternity leave
- Employee Assistance Programme
- Opportunity to travel to new locations to meet colleagues
- Priority Pass, and travel upgrades for long haul company events
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Software Development
Referrals increase your chances of interviewing at Canonical by 2x
Sign in to set job alerts for “Threat Intelligence Lead” roles.Continue with Google Continue with Google
Continue with Google Continue with Google
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrThreat Intelligence Lead
Posted 21 days ago
Job Viewed
Job Description
Join to apply for the
Threat Intelligence Lead
role at
Canonical Continue with Google Continue with Google Canonical Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia Join to apply for the
Threat Intelligence Lead
role at
Canonical The Threat Intelligence Lead will own Canonical's threat intelligence strategy and execution, including understanding of which cyber threat actors are targeting Canonical, and the use of intelligence on Tactics, Techniques and Procedures (TTP) to better our products and internal cybersecurity controls. You will collaborate with internal stakeholders as well as with the wider cybersecurity community, making sure that Canonical is recognised as a thought leader on open source threat intelligence.
This role will report to the CISO.
You will lead intelligence gathering and development activities on threat actors targeting software supply chains. You'll study attack trends across the wider open source software landscape, report findings to internal security teams, and advise the wider engineering community on the best course of action to detect and mitigate possible threats.
As the publisher of Ubuntu, Canonical products are directly or indirectly present in almost every organisation and household in the world, making them a prime target for threat actors. This team's mission is to help Canonical, and by extension countless community members and companies around the world, secure their software infrastructure.
What you'll do in this role
Build and own Canonical's threat intelligence strategy Build and maintain OSINT research environments Develop OSINT tradecraft, principals, and techniques Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets Collaborate across teams to inform on activity of interest Coordinate adversary/campaign tracking Contribute to the wider threat intelligence community, establishing Canonical as a key contributor and thought leader in the space Work with product and engineering teams to explain cybersecurity threats and advise on mitigation strategies Work with the OPSEC and IS team to help implement/update security controls prioritising cyber defence Identify intelligence gaps and propose new tools and research projects to fill them Conduct briefings for executives, internal stakeholders and external customers
The successful Threat Intelligence Lead will be
An experienced threat intelligence leader (or similar) Knowledgeable about the current open source threat landscape and computer networking/infrastructure concepts Highly competent with OSINT tools (e.g., Buscador, Trace Labs OSINT VM, OSINT Framework, Maltego, Shodan, social media scraping tools, etc.) Able to identify, organise, catalogue, and track adversary tradecraft trends — often with incomplete data Experienced using threat intelligence data to influence enterprise architecture or product development decisions An excellent communicator with the ability to clearly articulate and tailor technical content to a variety of audiences Able to travel twice a year, for company events up to two weeks long
Desired Characteristics
A professional portfolio of OSINT related scripts, tools, or frameworks Demonstrated involvement in the larger OSINT community (please share relevant links) Degree qualified, with a bachelor's degree in computer science, information security, or a related field Certifications in related areas (e.g. GOSI, SANS SEC487 & SEC587, IntelTechniques OSIP, etc) Experience in a tech company or government/military signal intelligence departments
What we offer you
We consider geographical location, experience, and performance in shaping compensation worldwide. We revisit compensation annually (and more often for graduates and associates) to ensure we recognise outstanding performance. In addition to base pay, we offer a performance-driven annual bonus. We provide all team members with additional benefits, which reflect our values and ideals. We balance our programs to meet local needs and ensure fairness globally.
Distributed work environment with twice-yearly team sprints in person Personal learning and development budget of USD 2,000 per year Annual compensation review Recognition rewards Annual holiday leave Maternity and paternity leave Employee Assistance Programme Opportunity to travel to new locations to meet colleagues Priority Pass, and travel upgrades for long haul company events
About Canonical
Canonical is a pioneering tech firm at the forefront of the global move to open source. As the company that publishes Ubuntu, one of the most important open source projects and the platform for AI, IoT and the cloud, we are changing the world on a daily basis. We recruit on a global basis and set a very high standard for people joining the company. We expect excellence - in order to succeed, we need to be the best at what we do. Canonical has been a remote-first company since its inception in 2004. Working here is a step into the future, and will challenge you to think differently, work smarter, learn new skills, and raise your game.
Canonical is an equal opportunity employer
We are proud to foster a workplace free from discrimination. Diversity of experience, perspectives, and background create a better work environment and better products. Whatever your identity, we will give your application fair consideration.
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Software Development Referrals increase your chances of interviewing at Canonical by 2x Sign in to set job alerts for “Threat Intelligence Lead” roles.
Continue with Google Continue with Google Continue with Google Continue with Google We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Senior Associate - Cyber Threat Intelligence Analyst
Posted 4 days ago
Job Viewed
Job Description
PwC Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Join or sign in to find your next jobJoin to apply for the Senior Associate - Cyber Threat Intelligence Analyst role at PwC
PwC Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
1 week ago Be among the first 25 applicants
Join to apply for the Senior Associate - Cyber Threat Intelligence Analyst role at PwC
Get AI-powered advice on this job and more exclusive features.
- Proactively monitor and communicate cyber threat trends, vulnerabilities, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
- Monitor external data sources and leverage resources to gather cyber threat and setup cyber threat intelligence infrastructure and payloads associated with priority threats.
- Familiarity with deep and dark web, covert communication channels, social media platforms, and other OSINT sources.
- Develop and produce intelligence reports focused on cyber events and trends, industry-level analysis of developing cybersecurity threats, and geopolitical events.
- Analyze cyber-threat actors, groups, and events to report on prioritized TTPs, behaviors, motivations, malware analysis, etc.
- Disseminate finished tactical, operational, and strategic threat intelligence products (reports, briefings, etc.).
- Provide threat intelligence support for security incidents and respond to requests for information (RFIs) and participate in the drafting and production of company threat assessments.
- Support creation of deliverables including but not limited to Security/Incident Alerts, Intelligence Reports, Trend and summary reports, Client briefings
Line of Service
Assurance
Industry/Sector
Not Applicable
Specialism
Risk Architecture
Management Level
Senior Associate
Job Description & Summary
Key Responsibilities:
- Proactively monitor and communicate cyber threat trends, vulnerabilities, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
- Monitor external data sources and leverage resources to gather cyber threat and setup cyber threat intelligence infrastructure and payloads associated with priority threats.
- Familiarity with deep and dark web, covert communication channels, social media platforms, and other OSINT sources.
- Develop and produce intelligence reports focused on cyber events and trends, industry-level analysis of developing cybersecurity threats, and geopolitical events.
- Analyze cyber-threat actors, groups, and events to report on prioritized TTPs, behaviors, motivations, malware analysis, etc.
- Disseminate finished tactical, operational, and strategic threat intelligence products (reports, briefings, etc.).
- Provide threat intelligence support for security incidents and respond to requests for information (RFIs) and participate in the drafting and production of company threat assessments.
- Support creation of deliverables including but not limited to Security/Incident Alerts, Intelligence Reports, Trend and summary reports, Client briefings
- Bachelor's Degree / Diploma in Information Technology, Information Security, Computer Science or a similar field.
- Minimum 2-3 years of relevant experience working in 24x7 Security Operations Centre (SOC) environment
- Solid understanding of MITRE ATT&CK, Acquired or ability to acquire the following certification:
- GIAC Cyber Threat Intelligence (GCTI)
- CREST Certified Threat Intelligence Manager (CCTIM)
- CREST Registered Threat Intelligence Analyst (CRTIA)
Required Skills
Optional Skills
Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Auditing, Auditing Standards, Audit Internal Controls, Audit Preparation, Audit Reporting, Audit Risk Assessments, Audit Support, Business Process Improvement, Communication, Compliance and Standards, Compliance Assurance, Compliance Auditing, Compliance Risk Assessment, Compliance Training, Creativity, Data Analysis and Interpretation, Developing Policies and Guidelines, Embracing Change, Emotional Regulation, Empathy, Ethics Training {+ 26 more}
Desired Languages (If blank, desired languages not specified)
Travel Requirements
Up to 40%
Available for Work Visa Sponsorship?
No
Government Clearance Required?
Yes
Job Posting End Date
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Professional Services
Referrals increase your chances of interviewing at PwC by 2x
Get notified about new Threat Intelligence Analyst jobs in Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia .
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
(Senior) Security Engineer, Security Engineering & Threat IntelligenceKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSenior Associate - Cyber Threat Intelligence Analyst
Posted 21 days ago
Job Viewed
Job Description
Join to apply for the
Senior Associate - Cyber Threat Intelligence Analyst
role at
PwC PwC Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Be among the first 25 applicants Join to apply for the
Senior Associate - Cyber Threat Intelligence Analyst
role at
PwC Get AI-powered advice on this job and more exclusive features. Proactively monitor and communicate cyber threat trends, vulnerabilities, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
Monitor external data sources and leverage resources to gather cyber threat and setup cyber threat intelligence infrastructure and payloads associated with priority threats.
Familiarity with deep and dark web, covert communication channels, social media platforms, and other OSINT sources.
Develop and produce intelligence reports focused on cyber events and trends, industry-level analysis of developing cybersecurity threats, and geopolitical events.
Analyze cyber-threat actors, groups, and events to report on prioritized TTPs, behaviors, motivations, malware analysis, etc.
Disseminate finished tactical, operational, and strategic threat intelligence products (reports, briefings, etc.).
Provide threat intelligence support for security incidents and respond to requests for information (RFIs) and participate in the drafting and production of company threat assessments.
Support creation of deliverables including but not limited to Security/Incident Alerts, Intelligence Reports, Trend and summary reports, Client briefings
Line of Service Assurance
Industry/Sector Not Applicable
Specialism Risk Architecture
Management Level Senior Associate
Job Description & Summary
Key Responsibilities: Proactively monitor and communicate cyber threat trends, vulnerabilities, indicators of compromise (IOCs), and tactics, techniques, and procedures (TTPs).
Monitor external data sources and leverage resources to gather cyber threat and setup cyber threat intelligence infrastructure and payloads associated with priority threats.
Familiarity with deep and dark web, covert communication channels, social media platforms, and other OSINT sources.
Develop and produce intelligence reports focused on cyber events and trends, industry-level analysis of developing cybersecurity threats, and geopolitical events.
Analyze cyber-threat actors, groups, and events to report on prioritized TTPs, behaviors, motivations, malware analysis, etc.
Disseminate finished tactical, operational, and strategic threat intelligence products (reports, briefings, etc.).
Provide threat intelligence support for security incidents and respond to requests for information (RFIs) and participate in the drafting and production of company threat assessments.
Support creation of deliverables including but not limited to Security/Incident Alerts, Intelligence Reports, Trend and summary reports, Client briefings
Experience and Qualifications: Bachelor's Degree / Diploma in Information Technology, Information Security, Computer Science or a similar field.
Minimum 2-3 years of relevant experience working in 24x7 Security Operations Centre (SOC) environment
Solid understanding of MITRE ATT&CK, Acquired or ability to acquire the following certification:
GIAC Cyber Threat Intelligence (GCTI)
CREST Certified Threat Intelligence Manager (CCTIM)
CREST Registered Threat Intelligence Analyst (CRTIA)
Required Skills
Optional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Auditing, Auditing Standards, Audit Internal Controls, Audit Preparation, Audit Reporting, Audit Risk Assessments, Audit Support, Business Process Improvement, Communication, Compliance and Standards, Compliance Assurance, Compliance Auditing, Compliance Risk Assessment, Compliance Training, Creativity, Data Analysis and Interpretation, Developing Policies and Guidelines, Embracing Change, Emotional Regulation, Empathy, Ethics Training {+ 26 more}
Desired Languages
(If blank, desired languages not specified)
Travel Requirements Up to 40%
Available for Work Visa Sponsorship? No
Government Clearance Required? Yes
Job Posting End Date
Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Professional Services Referrals increase your chances of interviewing at PwC by 2x Get notified about new Threat Intelligence Analyst jobs in
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia . Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago (Senior) Security Engineer, Security Engineering & Threat Intelligence
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Cybersecurity Analyst
Posted 2 days ago
Job Viewed
Job Description
Job Summary
Job Summary: We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 4 years of hands-on experience to support cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures.
Key Responsibilities- Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.)
- Investigate and respond to security incidents and vulnerabilities.
- Assist in the development and enforcement of security policies and procedures.
- Support vulnerability assessments and penetration testing activities.
- Maintain and update documentation related to security operations and incident response.
- Collaborate with IT and business teams to ensure secure system configurations and practices.
- Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks.
- Stay updated on emerging threats and recommend mitigation strategies.
- Bachelor’s degree in computer science, Information Security, or related field.
- Around 4 years of experience in cybersecurity or IT security operations.
- Firewalls (e.g., Fortinet, Palo Alto)
- Mobile Device Management (e.g., Microsoft Intune)
- Endpoint Detection & Response platforms (e.g., CrowdStrike, Microsoft Defender)
- Familiarity with SIEM tools and antivirus.
- Understanding of network protocols, system vulnerabilities, and threat vectors.
- Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR).
- Strong analytical and problem-solving skills.
- Good communication and documentation abilities.
- CompTIA Security+
- Certified Ethical Hacker (CEH)
- GIAC Security Essentials (GSEC)
- Cisco CCNA Security
Cognizant (Nasdaq: CTSH) engineers modern businesses. We help our clients modernize technology, reimagine processes and transform experiences so they can stay ahead in our fast-changing world. Together, we're improving everyday life. See how at or @cognizant.
#J-18808-LjbffrCybersecurity Analyst
Posted 2 days ago
Job Viewed
Job Description
Job Summary
We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 4 years of hands-on experience to support cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures.
Responsibilities- Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.)
- Investigate and respond to security incidents and vulnerabilities.
- Assist in the development and enforcement of security policies and procedures.
- Support vulnerability assessments and penetration testing activities.
- Maintain and update documentation related to security operations and incident response.
- Collaborate with IT and business teams to ensure secure system configurations and practices.
- Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks.
- Stay updated on emerging threats and recommend mitigation strategies.
- Bachelor’s degree in computer science, Information Security, or related field.
- Around 4 years of experience in cybersecurity or IT security operations.
- Firewalls (e.g., Fortinet, Palo Alto)
- Mobile Device Management (e.g., Microsoft Intune)
- Endpoint Detection & Response platforms (e.g., CrowdStrike, Microsoft Defender)
- Familiarity with SIEM tools and antivirus.
- Understanding of network protocols, system vulnerabilities, and threat vectors.
- Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR).
- Strong analytical and problem-solving skills.
- Good communication and documentation abilities.
- CompTIA Security+
- Certified Ethical Hacker (CEH)
- GIAC Security Essentials (GSEC)
- Cisco CCNA Security
Cognizant (Nasdaq: CTSH) engineers modern businesses. We help our clients modernize technology, reimagine processes and transform experiences so they can stay ahead in our fast-changing world. Together, we're improving everyday life. See how at or @cognizant.
#LI-CTSAPAC
#J-18808-LjbffrCybersecurity Analyst
Posted 2 days ago
Job Viewed
Job Description
We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 4 years of hands-on experience to support cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures.
**Key Responsibilities:**
· Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.)
· Investigate and respond to security incidents and vulnerabilities.
· Assist in the development and enforcement of security policies and procedures.
· Support vulnerability assessments and penetration testing activities.
· Maintain and update documentation related to security operations and incident response.
· Collaborate with IT and business teams to ensure secure system configurations and practices.
· Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks.
· Stay updated on emerging threats and recommend mitigation strategies.
**Required Skills & Qualifications:**
· Bachelor's degree in computer science, Information Security, or related field.
· Around 4 years of experience in cybersecurity or IT security operations.
· Firewalls (e.g., Fortinet, Palo Alto)
· Mobile Device Management (e.g., Microsoft Intune)
· Endpoint Detection & Response platforms (e.g., CrowdStrike, Microsoft Defender)
· Familiarity with SIEM tools and antivirus.
· Understanding of network protocols, system vulnerabilities, and threat vectors.
· Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR).
· Strong analytical and problem-solving skills.
· Good communication and documentation abilities.
**Preferred Certifications (Optional but Advantageous):**
· CompTIA Security· Certified Ethical Hacker (CEH)
· GIAC Security Essentials (GSEC)
· Cisco CCNA Security
**About Cognizant:**
Cognizant (Nasdaq: CTSH) engineers modern businesses. We help our clients modernize technology, reimagine processes and transform experiences so they can stay ahead in our fast-changing world. Together, we're improving everyday life. See how at or @cognizant.
#LI-CTSAPAC
Cognizant is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.
Be The First To Know
About the latest Cybersecurity specialists Jobs in Kuala Lumpur !
Cybersecurity Analyst
Posted 1 day ago
Job Viewed
Job Description
We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 4 years of hands-on experience to support cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures. Responsibilities
Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.) Investigate and respond to security incidents and vulnerabilities. Assist in the development and enforcement of security policies and procedures. Support vulnerability assessments and penetration testing activities. Maintain and update documentation related to security operations and incident response. Collaborate with IT and business teams to ensure secure system configurations and practices. Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks. Stay updated on emerging threats and recommend mitigation strategies. Required Skills & Qualifications
Bachelor’s degree in computer science, Information Security, or related field. Around 4 years of experience in cybersecurity or IT security operations. Firewalls (e.g., Fortinet, Palo Alto) Mobile Device Management (e.g., Microsoft Intune) Endpoint Detection & Response platforms (e.g., CrowdStrike, Microsoft Defender) Familiarity with SIEM tools and antivirus. Understanding of network protocols, system vulnerabilities, and threat vectors. Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR). Strong analytical and problem-solving skills. Good communication and documentation abilities. Preferred Certifications (Optional but Advantageous)
CompTIA Security+ Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Cisco CCNA Security About Cognizant
Cognizant (Nasdaq: CTSH) engineers modern businesses. We help our clients modernize technology, reimagine processes and transform experiences so they can stay ahead in our fast-changing world. Together, we're improving everyday life. See how at or @cognizant. #LI-CTSAPAC
#J-18808-Ljbffr
Cybersecurity Analyst
Posted 1 day ago
Job Viewed
Job Description
Job Summary:
We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 4 years of hands-on experience to support cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures. Key Responsibilities
Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.) Investigate and respond to security incidents and vulnerabilities. Assist in the development and enforcement of security policies and procedures. Support vulnerability assessments and penetration testing activities. Maintain and update documentation related to security operations and incident response. Collaborate with IT and business teams to ensure secure system configurations and practices. Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks. Stay updated on emerging threats and recommend mitigation strategies. Required Skills & Qualifications
Bachelor’s degree in computer science, Information Security, or related field. Around 4 years of experience in cybersecurity or IT security operations. Firewalls (e.g., Fortinet, Palo Alto) Mobile Device Management (e.g., Microsoft Intune) Endpoint Detection & Response platforms (e.g., CrowdStrike, Microsoft Defender) Familiarity with SIEM tools and antivirus. Understanding of network protocols, system vulnerabilities, and threat vectors. Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR). Strong analytical and problem-solving skills. Good communication and documentation abilities. Preferred Certifications (Optional but Advantageous)
CompTIA Security+ Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Cisco CCNA Security About Cognizant
Cognizant (Nasdaq: CTSH) engineers modern businesses. We help our clients modernize technology, reimagine processes and transform experiences so they can stay ahead in our fast-changing world. Together, we're improving everyday life. See how at or @cognizant.
#J-18808-Ljbffr
(Senior) Security Engineer, Security Engineering & Threat Intelligence
Posted 2 days ago
Job Viewed
Job Description
Overview
(Senior) Security Engineer, Security Engineering & Threat Intelligence – Crypto.com
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
We are looking for an intermediate level security engineer to join our Global Cybersecurity Services Team. As part of our modern cybersecurity operating model, the role will be engaged in enhancing our security technology stack, building AI driven security automation workflows and contributing to security operations and threat management. We are building a modern, multi-cloud, intelligence driven security operations capability that will heavily involve AI and automation; and will require engineering and operational skills at all levels.
We are committed to building a modern, multi-cloud, intelligence driven security operations capability that will heavily involve AI and automation; and will require engineering and operational skills at all levels.
Responsibilities- Automation & DevOps
- CI/CD Development and Management: Build, manage, and optimize Continuous Integration and Continuous Deployment (CI/CD) pipelines to enhance development workflows. Ensure fast, secure, and reliable delivery of code while maintaining a focus on quality and production readiness
- Infrastructure as Code (IaC): Develop, enhance, and maintain Infrastructure as Code (IaC) templates or playbooks using tools such as Ansible, Terraform, CloudFormation, or equivalent. Collaborate with teams to standardize infrastructure provisioning and deployment across cloud and on-premise environments
- Automation & Workflow Orchestration: Design and implement automated solutions and workflows using scripting languages (e.g., Python, Bash, PowerShell) or hyperautomation platforms. Leverage automation to orchestrate repetitive tasks, streamline operational processes, and improve system efficiency
- DevOps Best Practices: Integrate DevOps principles into development lifecycles, promoting practices around collaboration, monitoring, and agile delivery. Continuously evaluate new tools and technologies to enhance the automation and DevOps toolkit
- Security Engineering: Build, maintain and enhance our security operations technology stack, which includes cloud native solutions, cloud-based infrastructure and applications, next generation SIEMs and hyper automation solutions. Build and enhance security logging and detection engineering practices, and incorporate DevOps best practices into Security Engineering. Relentlessly automate and creatively incorporate AI into workflows. Strong interest in Agentic AI systems will be ideal.
- Detection & Response: Build, maintain and enhance infrastructure related to detection & response engineering lifecycle, telemetry and log pipelines, automation and AI. Support alert pipeline and detection use case development
- Threat Intelligence Management: Support backend and infrastructure tasks related Threat Intelligence Projects, Threat Intelligence Collection, Threat Analysis, Making Threat Intelligence Actionable, Collaboration & Incident Support
- Security Projects: Lead projects and initiatives that may involve - Endpoint Security enhancements, Attack Simulation, Use Case Validation, Threat Hunting, Compromise Assessments, Network/Endpoint security reviews, etc.
- Leadership: Be comfortable with cross-functional leadership and stakeholder management. Be willing to mentor and contribute to the growth and capability of the team.
- 5-7 years of experience in Information Security, with technical hands-on experience in Security Engineering, Security Operations, Cyber Threat Intelligence, or Cloud Security.
- Proven experience with CI/CD tools (e.g., Jenkins, GitLab CI/CD, GitHub Actions)
- Proficiency with IaC tools like Terraform, Ansible, or CloudFormation
- Strong scripting skills (e.g., Python, Bash, PowerShell) or familiarity with automation/orchestration platforms
- Working Experience with SIEM, EPP/EDR/XDR, SOAR, Threat Intelligence Platforms (TIPs), Open Source Threat Intelligence solutions (eg. MISP, OpenCTI, etc)
- Working experience with Cloud environments like AWS, Azure and GCP
- Working experience in the practical implementation of operational, tactical and strategic threat intelligence
- Experience in applying AI/ML in cybersecurity use cases.
- Highly self-motivated, attention to detail and outcome driven
- Highly collaborative team player
- Proficiency in verbal and written English
- Senior
- Full-time
- Engineering and Information Technology
Referrals increase your chances of interviewing at Crypto.com by 2x
Note: This refined description excludes extraneous postings and non-essential boilerplate while preserving core responsibilities and requirements.
#J-18808-Ljbffr