76 Data Compliance jobs in Malaysia
Senior Data Analyst - Compliance, AI
Posted 11 days ago
Job Viewed
Job Description
Binance Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia
Join or sign in to find your next jobJoin to apply for the Senior Data Analyst - Compliance role at Binance
Binance Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia
6 days ago Be among the first 25 applicants
Join to apply for the Senior Data Analyst - Compliance role at Binance
Binance is a leading global blockchain ecosystem behind the world’s largest cryptocurrency exchange by trading volume and registered users. We are trusted by over 250 million people in 100+ countries for our industry-leading security, user fund transparency, trading engine speed, deep liquidity, and an unmatched portfolio of digital-asset products. Binance offerings range from trading and finance to education, research, payments, institutional services, Web3 features, and more. We leverage the power of digital assets and blockchain to build an inclusive financial ecosystem to advance the freedom of money and improve financial access for people around the world.
Responsibilities
- Leading through example: Overseeing high performing, multidisciplinary members of the Data Analyst team, you will design and build complex visualizations and analytical models to help us to meet compliance or regulatory requirements, build several data analytical systems to help business teams improve work efficiency.
- You will work closely with the compliance areas to identify, prioritize and deliver on their most pressing and impactful analytical use case; turning complex findings into simple visualizations and recommendations for execution.
- Analyze and interpret large (PB-scale) volumes of transactional, operational and customer data using proprietary and open source data tools, platforms and analytical tool kits.
- Support and manage data requests from business stakeholders – can understand business change needs and assess the impact of those changes.
- Responsible for working closely with the compliance areas to identify, prioritize and deliver on their most pressing and impactful analytical use cases.
- 5+ year experience; Bachelor’s degree and above in a quantitative or engineering field with professional work experience in a relevant field.
- Strong analytical thinking and communication skills.
- Experience with common analysis tools such as SQL, R, and Python.
- Solid experience with at least one data visualization tool (Tableau, Qlik, PowerBI, etc.).
- Familiar and comfortable with large volumes of data and big data technology (Hadoop, Redshift, Spark, Presto, hive).
- Experience in working with cross-functional teams to gather requirements and ability to set work priorities.
- Good business sense and logical thinking. Ability to synthesize information and generalize the pattern.
- Experience with regulatory compliance and financial trading analyzing will be beneficial.
- Shape the future with the world’s leading blockchain ecosystem
- Collaborate with world-class talent in a user-centric global organization with a flat structure
- Tackle unique, fast-paced projects with autonomy in an innovative environment
- Thrive in a results-driven workplace with opportunities for career growth and continuous learning
- Competitive salary and company benefits
- Work-from-home arrangement (the arrangement may vary depending on the work nature of the business team)
By submitting a job application, you confirm that you have read and agree to our Candidate Privacy Notice . Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology and Engineering
- Industries Technology, Information and Internet
Referrals increase your chances of interviewing at Binance by 2x
Get notified about new Senior Data Analyst jobs in Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia .
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 weeks ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 6 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrManager, Information Security
Posted 7 days ago
Job Viewed
Job Description
Manager, Information Security page is loadedManager, Information Security Apply locations ASIA > MYS > Kuala Lumpur > KL Office time type Full time posted on Posted 30+ Days Ago job requisition id R-20250221-0002
The Cyber Security Manager will support VF’s Global Cyber Security Team by ensuring that information security risks associated with complex business operations are within acceptable tolerances.
You will perform information security risk assessments, provide direction and guidance to stakeholders concerning the handling of security risks associated with assessment findings, assist with the design of appropriate risk mitigation strategies, and serve as an audit quality assurance gate for internal and external auditors while driving compliance and audit work related to data privacy.
How You Will Make a Difference
You will achieve this by:
- Collaborating with information technology and other business units to identify cybersecurity risks associated with current and planned projects.
- Performing assessments of external party information security controls to ensure they meet or exceed VF’s information security risk management requirements for the services to be provided.
- Determining information security risk profiles for various vendor and business partner services using questionnaires, relevant industry best practices and standards, and knowledge of VF policies.
- Recommending solutions to eliminate, reduce, or mitigate cybersecurity risk, and communicate said solutions to external parties and/or internal business stakeholders as appropriate.
- Providing direction and guidance as needed to internal project stakeholders concerning statutory, regulatory, and VF policy requirements.
- Reporting status of engagements to Global Cyber Security management, project managers, and other business stakeholders as appropriate.
- Assisting in enforcing information security policies, standards, and procedures. Review requests for exceptions to security policies and provide recommendations to management.
- Serving as a focal point for MLPS and provide advisory around MLPS and other APAC data privacy laws related controls and processes.
- Acting as focal point for Regional PCI-DSS assessments, vulnerability assessments and other security operations.
- Researching and advocate new technologies, architectures, and products that will support security requirements for the enterprise and its customers, business partners, and vendors.
- Performing other information security risk management tasks as assigned.
Skills for Success
Aformal education and subsequent University Bachelor or Master’s degree in information systems, computer science, or related field are preferred, but we are mostinterested in your total experience and professional achievements. That’s why:
- You rely on 5+ years of information security risk management, IT audit, and/or IT controls design and implementation experience.
- You possess a Certified Information Systems Security Professional (CISSP) certification, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) or similar credentials.
- You are familiar with industry best practises related to security and data privacy in Cloud environments.
- You have functional understanding of industry frameworks, regulations, legislation, and audit methodologies, including SOC 1, SOC 2, ISO 27001, SIG, NIST Cybersecurity Framework, Sarbanes-Oxley (SOX), PCI-DSS, MLPS and various other privacy laws.
- You are apt to broker complex discussions to achieve the proper balance between business needs and cybersecurity best practices.
- You possess the ability to influence others through persuasion to arrive at desired outcomes.
- You communicate effectively with a broad range of people and roles, including vendors, information technology professionals, and other business personnel.
- You desire to seize the initiative, operate proactively, and work in a highly independent manner.
- You are fluent in English and Mandarin, any other Asian languages are a plus.
VF Corporation outfits consumers around the world with its diverse portfolio of iconic lifestyle brands, including Vans, The North Face, Timberland, and Dickies. Founded in 1899, VF is one of the world's largest apparel, footwear and accessories companies with socially and environmentally responsible operations spanning numerous geographies, product categories and distribution channels. VF is committed to delivering innovative products to consumers and creating long-term value for its customers and shareholders.
VF Vision Statement
VF is committed to creating an inclusive environment that welcomes and values the differences among all of our associates, customers, suppliers and the communities in which we live and conduct business. The continued success and growth of VF is enhanced through initiatives that promote inclusion throughout VF around the world.VF is an equal opportunity employer. VF provides equal employment and advancement opportunities to all qualified individuals. VF bases employment decisions on skills, qualifications, and abilities. To learn more, read our Equal Opportunity Employment Policy here .
VF is committed to meeting the diverse needs of people with disabilities in a timely manner that is consistent with the principles of independence, dignity, integration and equality of opportunity, and will do so by striving to identify, prevent and remove barriers to accessibility wherever possible as well as by meeting the accessibility requirements under the ADA, AODA, and other applicable state, local or provincial regulations.
VF is committed to digital accessibility, and to conforming to the Web Content Accessibility Guidelines (WCAG) 2.1, Level AA and complying with the ADA and AODA Standards for Accessible Design, and other applicable regulations.
If you need an accommodation or have any questions regarding this statement, please send your request to .
#J-18808-LjbffrInformation Security Analyst
Posted 11 days ago
Job Viewed
Job Description
Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric #LifeAtRazer experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities : We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties and Responsibilities
- Conduct vulnerability assessments and provide actionable remediation plans
- Perform penetration testing on networks, applications, and infrastructure.
- Review and optimize firewall rules and configurations.
- Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
- Investigate and respond to security incidents in a timely manner.
- Review and validate bug bounty submissions, coordinating with researchers and internal teams.
- Collaborate with IT, DevOps, and compliance teams to implement security best practices.
- Collaborate closely with business units to provide expert support and guidance on information security matters.
- Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
- Perform ad hoc tasks that are assigned by team leader or team manager.
Requirements
- Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
- At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
- Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
- For lead roles, experience in people management, ability to lead and influence people is expected.
- Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
- Strong understanding of network protocols, web application security, and threat detection.
- Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
- Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
- Applicants must be willing to work in ICITY SHAH ALAM.
Are you game?
Pre-Requisites :Are you game?
#J-18808-LjbffrInformation Security Analyst
Posted 11 days ago
Job Viewed
Job Description
Join to apply for the Information Security Analyst role at Razer Inc.
Join to apply for the Information Security Analyst role at Razer Inc.
Get AI-powered advice on this job and more exclusive features.
Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities
We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.
This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties And Responsibilities
- Conduct vulnerability assessments and provide actionable remediation plans
- Perform penetration testing on networks, applications, and infrastructure.
- Review and optimize firewall rules and configurations.
- Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
- Investigate and respond to security incidents in a timely manner.
- Review and validate bug bounty submissions, coordinating with researchers and internal teams.
- Collaborate with IT, DevOps, and compliance teams to implement security best practices.
- Collaborate closely with business units to provide expert support and guidance on information security matters.
- Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
- Perform ad hoc tasks that are assigned by team leader or team manager.
- Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
- At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
- Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
- For lead roles, experience in people management, ability to lead and influence people is expected.
- Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
- Strong understanding of network protocols, web application security, and threat detection.
- Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
- Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
- Applicants must be willing to work in ICITY SHAH ALAM.
Pre-Requisites
Are you game? Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computers and Electronics Manufacturing
Referrals increase your chances of interviewing at Razer Inc. by 2x
Get notified about new Information Security Analyst jobs in Shah Alam, Selangor, Malaysia .
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago
Petaling Jaya, Selangor, Malaysia 6 days ago
Petaling Jaya, Selangor, Malaysia 21 hours ago
(Senior) Cyber Security Consultant & Penetration TesterWP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
(TRC) Manager - Cyber Response (Petaling Jaya)Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 2 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Internship - Network & Information Security EngineerKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Security Operations & Governance Analyst (1 year Contract)Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Cyber Security Analyst (Governance, Risk & Compliance)Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 1 month ago
Cyber Security (Digital Forensic Analyst) AVP, Data Security Engineer, Group Information SecurityFederal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Senior Information Security Engineer (ISE)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Operational Technology (OT) Security Analyst Security Operations Analyst- APAC Blue Team LeaderKuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 2 days ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 year ago
(Senior) Security Engineer, Security Engineering & Threat IntelligenceKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Cyber Security Metrics and Behavioural AnalystKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 7 months ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Officer
Posted 11 days ago
Job Viewed
Job Description
List of Responsibilities:
Ongoing leadership and review of IT security
Implementing and designing cyber security policies, procedures and system solutions in line with industry standards and certifications
Operate, conduct, and maintain DUG’s SIEM platform and conduct regular security audits of systems, policies, procedures, network configuration, operating systems, authentication systems, permission structures
Serve as the DUG point person for third-party security audit(s)
Provide pre-sales security briefings / Q&A to DUG HPC Cloud customer security teams
Work with DUG HPC Cloud customers and DUG teams on security integration
Provide strategic-level guidance for DUG’s cyber security program and ensure compliance with cyber security policy, standards, regulations and legislation, working with the senior executives within DUG.
Ensure the alignment of cyber security and business objectives within DUG. To achieve this, you will facilitate communication between cyber security and business stakeholders. This includes translating cyber security concepts and language into business concepts and language as well as ensuring that business teams consult with cyber security teams to determine appropriate security measures when planning new business projects. Additionally, you will be responsible for the development of the strategic-level cyber security program, being best placed to advise projects on the strategic direction of cyber security.
Contribute to the development and maintenance of DUG’s business continuity and disaster recovery plans, with the aim to improve business resilience and ensure the continued operation of critical business processes
Report on the DUG’s security risk profile, the status of key systems and any outstanding security risks, any planned cyber security uplift activities, any recent cyber security incidents, and expected returns on cyber security investments
Oversee DUG’s response to cyber security incidents, including how internal teams respond and communicate with each other during an incident
Ensure that a consistent vendor management process is applied across their organisation, from discovery through to ongoing management
Information Security Officer
Posted 11 days ago
Job Viewed
Job Description
List of Responsibilities:
Ongoing leadership and review of IT security
Implementing and designing cyber security policies, procedures and system solutions in line with industry standards and certifications
Operate, conduct, and maintain DUG’s SIEM platform and conduct regular security audits of systems, policies, procedures, network configuration, operating systems, authentication systems, permission structures
Serve as the DUG point person for third-party security audit(s)
Provide pre-sales security briefings / Q&A to DUG HPC Cloud customer security teams
Work with DUG HPC Cloud customers and DUG teams on security integration
Provide strategic-level guidance for DUG’s cyber security program and ensure compliance with cyber security policy, standards, regulations and legislation, working with the senior executives within DUG.
Ensure the alignment of cyber security and business objectives within DUG. To achieve this, you will facilitate communication between cyber security and business stakeholders. This includes translating cyber security concepts and language into business concepts and language as well as ensuring that business teams consult with cyber security teams to determine appropriate security measures when planning new business projects. Additionally, you will be responsible for the development of the strategic-level cyber security program, being best placed to advise projects on the strategic direction of cyber security.
Contribute to the development and maintenance of DUG’s business continuity and disaster recovery plans, with the aim to improve business resilience and ensure the continued operation of critical business processes
Report on the DUG’s security risk profile, the status of key systems and any outstanding security risks, any planned cyber security uplift activities, any recent cyber security incidents, and expected returns on cyber security investments
Oversee DUG’s response to cyber security incidents, including how internal teams respond and communicate with each other during an incident
Ensure that a consistent vendor management process is applied across their organisation, from discovery through to ongoing management
Information Security Officer
Posted 11 days ago
Job Viewed
Job Description
We are looking for an experienced Information Security Officer to design and enforce policies and procedures that protect our organization's computing infrastructure from all forms of security breaches. To be successful as an information security officer, you should have good analytical skills and knowledge of the best practices to prevent a wide range of security threats. You should also be an excellent communicator, able to train and educate our staff in various information security topics.
If you are passionate about IT security and want to work with a dynamic team of professionals, we encourage you to apply for this exciting opportunity. We offer competitive salaries and benefits packages, as well as opportunities for professional growth and development.
Key Activities :- Developing and implementing IT security policies, procedures, and standards
- Identifying potential security risks and vulnerabilities and taking appropriate action to mitigate them
- Conducting regular security assessments to identify weaknesses in our systems and processes
- Developing and implementing security incident response plans
- Managing and monitoring security systems, including firewalls, intrusion detection/prevention systems, and anti-virus software
- Conducting regular security training for employees to ensure they are aware of the latest security threats and how to respond to them
- Investigating security incidents and breaches and taking appropriate action to prevent them from happening again
- Staying up to date with the latest security technologies and trends
Degree in computer science or a technology-related field.
Specialist Knowledge :Minimum 3 years of experience as an ISO or in a similar information security role.
Detailed Requirements for each career level (each Functional Level separately)- Solid knowledge of global information security standards (e.g. NIST, ISO 27001), best practices and requirements from major regulators in the financial sector (e.g. MAS, BaFin)
- Solid knowledge of data protection standards (e.g. NIST, GDPR)
- Excellent problem-solving and analytical skills.
- Ability to educate a non-technical audience about various security measures.
- Effective verbal and written communication skills
- Candidates with professional certifications such as CISA, CISM, CRISC, CISSP and other Cyber Security certifications are preferred.
Mid-Senior level
Employment typeFull-time
Job functionManagement, Business Development, and Information Technology
IndustriesBanking
#J-18808-LjbffrBe The First To Know
About the latest Data compliance Jobs in Malaysia !
Information Security Officer
Posted 11 days ago
Job Viewed
Job Description
We are looking for an experienced Information Security Officer to design and enforce policies and procedures that protect our organization's computing infrastructure from all forms of security breaches. To be successful as an information security officer, you should have good analytical skills and knowledge of the best practices to prevent a wide range of security threats. You should also be an excellent communicator, able to train and educate our staff in various information security topics.
If you are passionate about IT security and want to work with a dynamic team of professionals, we encourage you to apply for this exciting opportunity. We offer competitive salaries and benefits packages, as well as opportunities for professional growth and development.
Key Activities :- Developing and implementing IT security policies, procedures, and standards
- Identifying potential security risks and vulnerabilities and taking appropriate action to mitigate them
- Conducting regular security assessments to identify weaknesses in our systems and processes
- Developing and implementing security incident response plans
- Managing and monitoring security systems, including firewalls, intrusion detection/prevention systems, and anti-virus software
- Conducting regular security training for employees to ensure they are aware of the latest security threats and how to respond to them
- Investigating security incidents and breaches and taking appropriate action to prevent them from happening again
- Staying up to date with the latest security technologies and trends
Degree in computer science or a technology-related field.
Specialist Knowledge :Minimum 3 years of experience as an ISO or in a similar information security role.
Detailed Requirements for each career level (each Functional Level separately)- Solid knowledge of global information security standards (e.g. NIST, ISO 27001), best practices and requirements from major regulators in the financial sector (e.g. MAS, BaFin)
- Solid knowledge of data protection standards (e.g. NIST, GDPR)
- Excellent problem-solving and analytical skills.
- Ability to educate a non-technical audience about various security measures.
- Effective verbal and written communication skills
- Candidates with professional certifications such as CISA, CISM, CRISC, CISSP and other Cyber Security certifications are preferred.
Mid-Senior level
Employment typeFull-time
Job functionManagement, Business Development, and Information Technology
IndustriesBanking
#J-18808-LjbffrInformation Security Specialist
Posted 17 days ago
Job Viewed
Job Description
Job Responsibilities:
Help and support the head of department with the day-to-day information security tasks, such as risk assessment, monitoring, reporting, and advice.
Responsible for locating and fixing security flaws in the networks and computer systems of an organization.
Strong familiarity with vulnerability assessment and scanning to identify holes and vulnerabilities.
Conduct vulnerability assessments to find gaps in information security guidelines and evaluate risks that have been identified.
Collaborate with the IT team to address security flaws that could lead to improper use of data.
Work closely with the head of the department to establish security guidelines for the organization by defining standards and best practices to guarantee information availability, confidentiality, and integrity.
Inform staff members about security and technological best practices.
Job Requirements:
An IT bachelor’s degree or a professionally equivalent degree.
At least two to three years of professional expertise in system/network administration, compliance cloud services, information security incidents (cybersecurity), or IT governance is advantageous.
Thorough understanding of the principles of application security and cloud infrastructure.
Proficient in identifying and evaluating security risk mitigation measures and solutions.
Customer-focused, possessing a strong sense of accountability, a strong desire to achieve goals, and a keen interest in customer satisfaction.
The capacity and willingness to quickly learn new ideas and technology.
Excellent communication abilities, both written and verbal, for presentations.
Proficient in writing and speaking in English.
The capacity to work independently, multitask, and adhere to deadlines.
Dependable, adaptable, and eager to learn.
Manager, Information Security

Posted 11 days ago
Job Viewed
Job Description
You will perform information security risk assessments, provide direction and guidance to stakeholders concerning the handling of security risks associated with assessment findings, assist with the design of appropriate risk mitigation strategies, and serve as an audit quality assurance gate for internal and external auditors while driving compliance and audit work related to data privacy.
**How You Will Make a Difference**
You will achieve this by:
+ Collaborating with information technology and other business units to identify cybersecurity risks associated with current and planned projects.
+ Performing assessments of external party information security controls to ensure they meet or exceed VF's information security risk management requirements for the services to be provided.
+ Determining information security risk profiles for various vendor and business partner services using questionnaires, relevant industry best practices and standards, and knowledge of VF policies.
+ Recommending solutions to eliminate, reduce, or mitigate cybersecurity risk, and communicate said solutions to external parties and/or internal business stakeholders as appropriate.
+ Providing direction and guidance as needed to internal project stakeholders concerning statutory, regulatory, and VF policy requirements.
+ Reporting status of engagements to Global Cyber Security management, project managers, and other business stakeholders as appropriate.
+ Assisting in enforcing information security policies, standards, and procedures. Review requests for exceptions to security policies and provide recommendations to management.
+ Serving as a focal point for MLPS and provide advisory around MLPS and other APAC data privacy laws related controls and processes.
+ Acting as focal point for Regional PCI-DSS assessments, vulnerability assessments and other security operations.
+ Researching and advocate new technologies, architectures, and products that will support security requirements for the enterprise and its customers, business partners, and vendors.
+ Performing other information security risk management tasks as assigned.
**Skills for Success**
A formal education and subsequent University Bachelor or Master's degree in information systems, computer science, or related field are preferred, but we are most interested in your total experience and professional achievements. That's why:
+ You rely on 5+ years of information security risk management, IT audit, and/or IT controls design and implementation experience.
+ You possess a Certified Information Systems Security Professional (CISSP) certification, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) or similar credentials.
+ You are familiar with industry best practises related to security and data privacy in Cloud environments.
+ You have functional understanding of industry frameworks, regulations, legislation, and audit methodologies, including SOC 1, SOC 2, ISO 27001, SIG, NIST Cybersecurity Framework, Sarbanes-Oxley (SOX), PCI-DSS, MLPS and various other privacy laws.
+ You are apt to broker complex discussions to achieve the proper balance between business needs and cybersecurity best practices.
+ You possess the ability to influence others through persuasion to arrive at desired outcomes.
+ You communicate effectively with a broad range of people and roles, including vendors, information technology professionals, and other business personnel.
+ You desire to seize the initiative, operate proactively, and work in a highly independent manner.
+ You are fluent in English and Mandarin, any other Asian languages are a plus.
R-20250221-0002
VF Diversity Vision Statement
VF is committed to creating an inclusive environment that welcomes and values the differences among all of our associates, customers, suppliers and the communities in which we live and conduct business. The continued success and growth of VF is enhanced through initiatives that promote diversity throughout VF around the world.VF is an equal employment opportunity/ affirmative action employer of minorities, females, protected veterans and the disabled. VF is committed to providing equal opportunities in employment, and treating our VF associates and VF applicants without discrimination on the basis of their race, color, gender, age, national origin, religion, sexual orientation, gender identity or expression, marital status, citizenship, disability, protected veteran status, HIV/AIDS status, or any other legally protected factor.