62 Data Compliance jobs in Malaysia
Information Security Manager
Posted 1 day ago
Job Viewed
Job Description
WHAT YOU’LL CHAMPION: SOC Leadership & Strategy
- Lead day-to-day SOC operations, ensuring timely detection, analysis, and response to security threats.
- Mentor and develop SOC analysts, fostering a high-performance detection and response culture.
- Drive continuous improvement of SOC processes, playbooks, and threat detection coverage.
- Own and enhance SIEM use cases, correlation rules, dashboards, and threat detection logic.
- Perform log analysis, threat hunting, and tuning of alerts to reduce false positives.
- Integrate new data sources into SIEM and EDR platforms to improve visibility.
- Lead major incident investigations, coordinating containment, eradication, and recovery efforts.
- Serve as an escalation point for complex security events and provide technical guidance to analysts.
- Collaborate with Legal, Risk, IT, and Communications teams during critical incidents.
- Design and implement SOAR workflows and automation scripts to accelerate incident handling.
- Identify opportunities for automation across detection, triage, and response activities.
- Maintain and optimize integrations between SOC tools, ticketing, and reporting platforms.
- Apply threat intel to improve detection coverage and proactively hunt for adversary activity.
- Stay updated on emerging threats, TTPs, and vulnerabilities to inform SOC defense strategy.
- Presentation to upper management on cybersecurity operations security metrics, trends, and incidents.
- 10 years of experience in Cybersecurity with a deep understanding of cybersecurity technologies, including SIEM, SOAR, EDR, WAF, IAM, and network security.
- Bachelor's degree in computer science, information security, or a related field.
- Proven ability to lead and motivate teams, build strong relationships, and influence decision-making at all levels.
- Hands on experience when it comes to SIEM, Detection Engineering, and Incident Response.
- Strong analytical and problem-solving skills to identify and resolve complex security issues.
- Excellent written and verbal communication skills, including the ability to communicate technical concepts to non-technical audiences.
- Proven ability to handle high-pressure situations and make critical decisions under time constraints.
- (Optional) Relevant security certifications.
Dispatcher to captain, ramp agent to data analyst, brand executive to CEO - these are some Dare To Dream stories of our Allstars.
WHAT YOU’LL ENJOY:- Physical Wellbeing: Key medical and insurance benefits, maternity expenses, flexible work arrangement, and health and fitness amenities.
- Emotional Wellbeing: Paid time off, wellness programmes, and childcare amenities.
- Financial Wellbeing: Resources relating to financial, personal skills and career growth programmes.
- Allstars Specials: Unlimited discounted flights, and exclusive discounts with partners.
- A unique Allstar culture like no other
- Application received
- Candidate screening
- Interview(s) and assessment(s)
- Background check and/or other assessments
- Offer and negotiation
Information Security Specialist
Posted 3 days ago
Job Viewed
Job Description
Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric #LifeAtRazer experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities : We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties and Responsibilities
- Conduct vulnerability assessments and provide actionable remediation plans
- Perform penetration testing on networks, applications, and infrastructure.
- Review and optimize firewall rules and configurations.
- Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
- Investigate and respond to security incidents in a timely manner.
- Review and validate bug bounty submissions, coordinating with researchers and internal teams.
- Collaborate with IT, DevOps, and compliance teams to implement security best practices.
- Collaborate closely with business units to provide expert support and guidance on information security matters.
- Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
- Perform ad hoc tasks that are assigned by team leader or team manager.
Requirements
- Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
- At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
- Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
- For lead roles, experience in people management, ability to lead and influence people is expected.
- Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
- Strong understanding of network protocols, web application security, and threat detection.
- Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
- Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
- Applicants must be willing to work in ICITY SHAH ALAM.
Are you game?
Pre-Requisites :Are you game?
#J-18808-LjbffrInformation Security Analyst
Posted 4 days ago
Job Viewed
Job Description
Join to apply for the Information Security Analyst role at Razer Inc.
Join to apply for the Information Security Analyst role at Razer Inc.
Get AI-powered advice on this job and more exclusive features.
Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities
We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.
This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties And Responsibilities
- Conduct vulnerability assessments and provide actionable remediation plans
- Perform penetration testing on networks, applications, and infrastructure.
- Review and optimize firewall rules and configurations.
- Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
- Investigate and respond to security incidents in a timely manner.
- Review and validate bug bounty submissions, coordinating with researchers and internal teams.
- Collaborate with IT, DevOps, and compliance teams to implement security best practices.
- Collaborate closely with business units to provide expert support and guidance on information security matters.
- Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
- Perform ad hoc tasks that are assigned by team leader or team manager.
- Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
- At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
- Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
- For lead roles, experience in people management, ability to lead and influence people is expected.
- Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
- Strong understanding of network protocols, web application security, and threat detection.
- Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
- Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
- Applicants must be willing to work in ICITY SHAH ALAM.
Pre-Requisites
Are you game? Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computers and Electronics Manufacturing
Referrals increase your chances of interviewing at Razer Inc. by 2x
Get notified about new Information Security Analyst jobs in Shah Alam, Selangor, Malaysia .
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago
Petaling Jaya, Selangor, Malaysia 6 days ago
Petaling Jaya, Selangor, Malaysia 21 hours ago
(Senior) Cyber Security Consultant & Penetration TesterWP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
(TRC) Manager - Cyber Response (Petaling Jaya)Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 2 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Internship - Network & Information Security EngineerKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Security Operations & Governance Analyst (1 year Contract)Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Cyber Security Analyst (Governance, Risk & Compliance)Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 1 month ago
Cyber Security (Digital Forensic Analyst) AVP, Data Security Engineer, Group Information SecurityFederal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Senior Information Security Engineer (ISE)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Operational Technology (OT) Security Analyst Security Operations Analyst- APAC Blue Team LeaderKuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 2 days ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 year ago
(Senior) Security Engineer, Security Engineering & Threat IntelligenceKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Cyber Security Metrics and Behavioural AnalystKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 7 months ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Officer
Posted 4 days ago
Job Viewed
Job Description
List of Responsibilities:
Ongoing leadership and review of IT security
Implementing and designing cyber security policies, procedures and system solutions in line with industry standards and certifications
Operate, conduct, and maintain DUG’s SIEM platform and conduct regular security audits of systems, policies, procedures, network configuration, operating systems, authentication systems, permission structures
Serve as the DUG point person for third-party security audit(s)
Provide pre-sales security briefings / Q&A to DUG HPC Cloud customer security teams
Work with DUG HPC Cloud customers and DUG teams on security integration
Provide strategic-level guidance for DUG’s cyber security program and ensure compliance with cyber security policy, standards, regulations and legislation, working with the senior executives within DUG.
Ensure the alignment of cyber security and business objectives within DUG. To achieve this, you will facilitate communication between cyber security and business stakeholders. This includes translating cyber security concepts and language into business concepts and language as well as ensuring that business teams consult with cyber security teams to determine appropriate security measures when planning new business projects. Additionally, you will be responsible for the development of the strategic-level cyber security program, being best placed to advise projects on the strategic direction of cyber security.
Contribute to the development and maintenance of DUG’s business continuity and disaster recovery plans, with the aim to improve business resilience and ensure the continued operation of critical business processes
Report on the DUG’s security risk profile, the status of key systems and any outstanding security risks, any planned cyber security uplift activities, any recent cyber security incidents, and expected returns on cyber security investments
Oversee DUG’s response to cyber security incidents, including how internal teams respond and communicate with each other during an incident
Ensure that a consistent vendor management process is applied across their organisation, from discovery through to ongoing management
Information Security Specialist
Posted 4 days ago
Job Viewed
Job Description
#J-18808-Ljbffr
Information Security Specialist
Posted 10 days ago
Job Viewed
Job Description
Job Responsibilities:
Help and support the head of department with the day-to-day information security tasks, such as risk assessment, monitoring, reporting, and advice.
Responsible for locating and fixing security flaws in the networks and computer systems of an organization.
Strong familiarity with vulnerability assessment and scanning to identify holes and vulnerabilities.
Conduct vulnerability assessments to find gaps in information security guidelines and evaluate risks that have been identified.
Collaborate with the IT team to address security flaws that could lead to improper use of data.
Work closely with the head of the department to establish security guidelines for the organization by defining standards and best practices to guarantee information availability, confidentiality, and integrity.
Inform staff members about security and technological best practices.
Job Requirements:
An IT bachelor’s degree or a professionally equivalent degree.
At least two to three years of professional expertise in system/network administration, compliance cloud services, information security incidents (cybersecurity), or IT governance is advantageous.
Thorough understanding of the principles of application security and cloud infrastructure.
Proficient in identifying and evaluating security risk mitigation measures and solutions.
Customer-focused, possessing a strong sense of accountability, a strong desire to achieve goals, and a keen interest in customer satisfaction.
The capacity and willingness to quickly learn new ideas and technology.
Excellent communication abilities, both written and verbal, for presentations.
Proficient in writing and speaking in English.
The capacity to work independently, multitask, and adhere to deadlines.
Dependable, adaptable, and eager to learn.
Manager, Information Security

Posted 3 days ago
Job Viewed
Job Description
You will perform information security risk assessments, provide direction and guidance to stakeholders concerning the handling of security risks associated with assessment findings, assist with the design of appropriate risk mitigation strategies, and serve as an audit quality assurance gate for internal and external auditors while driving compliance and audit work related to data privacy.
**How You Will Make a Difference**
You will achieve this by:
+ Collaborating with information technology and other business units to identify cybersecurity risks associated with current and planned projects.
+ Performing assessments of external party information security controls to ensure they meet or exceed VF's information security risk management requirements for the services to be provided.
+ Determining information security risk profiles for various vendor and business partner services using questionnaires, relevant industry best practices and standards, and knowledge of VF policies.
+ Recommending solutions to eliminate, reduce, or mitigate cybersecurity risk, and communicate said solutions to external parties and/or internal business stakeholders as appropriate.
+ Providing direction and guidance as needed to internal project stakeholders concerning statutory, regulatory, and VF policy requirements.
+ Reporting status of engagements to Global Cyber Security management, project managers, and other business stakeholders as appropriate.
+ Assisting in enforcing information security policies, standards, and procedures. Review requests for exceptions to security policies and provide recommendations to management.
+ Serving as a focal point for MLPS and provide advisory around MLPS and other APAC data privacy laws related controls and processes.
+ Acting as focal point for Regional PCI-DSS assessments, vulnerability assessments and other security operations.
+ Researching and advocate new technologies, architectures, and products that will support security requirements for the enterprise and its customers, business partners, and vendors.
+ Performing other information security risk management tasks as assigned.
**Skills for Success**
A formal education and subsequent University Bachelor or Master's degree in information systems, computer science, or related field are preferred, but we are most interested in your total experience and professional achievements. That's why:
+ You rely on 5+ years of information security risk management, IT audit, and/or IT controls design and implementation experience.
+ You possess a Certified Information Systems Security Professional (CISSP) certification, Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC) or similar credentials.
+ You are familiar with industry best practises related to security and data privacy in Cloud environments.
+ You have functional understanding of industry frameworks, regulations, legislation, and audit methodologies, including SOC 1, SOC 2, ISO 27001, SIG, NIST Cybersecurity Framework, Sarbanes-Oxley (SOX), PCI-DSS, MLPS and various other privacy laws.
+ You are apt to broker complex discussions to achieve the proper balance between business needs and cybersecurity best practices.
+ You possess the ability to influence others through persuasion to arrive at desired outcomes.
+ You communicate effectively with a broad range of people and roles, including vendors, information technology professionals, and other business personnel.
+ You desire to seize the initiative, operate proactively, and work in a highly independent manner.
+ You are fluent in English and Mandarin, any other Asian languages are a plus.
R-
VF Diversity Vision Statement
VF is committed to creating an inclusive environment that welcomes and values the differences among all of our associates, customers, suppliers and the communities in which we live and conduct business. The continued success and growth of VF is enhanced through initiatives that promote diversity throughout VF around the world.VF is an equal employment opportunity/ affirmative action employer of minorities, females, protected veterans and the disabled. VF is committed to providing equal opportunities in employment, and treating our VF associates and VF applicants without discrimination on the basis of their race, color, gender, age, national origin, religion, sexual orientation, gender identity or expression, marital status, citizenship, disability, protected veteran status, HIV/AIDS status, or any other legally protected factor.
Be The First To Know
About the latest Data compliance Jobs in Malaysia !
Information Security Manager
Posted today
Job Viewed
Job Description
Lead day-to-day SOC operations, ensuring timely detection, analysis, and response to security threats.
Mentor and develop SOC analysts, fostering a high-performance detection and response culture.
Drive continuous improvement of SOC processes, playbooks, and threat detection coverage.
Detection Engineering & SIEM
Own and enhance SIEM use cases, correlation rules, dashboards, and threat detection logic.
Perform log analysis, threat hunting, and tuning of alerts to reduce false positives.
Integrate new data sources into SIEM and EDR platforms to improve visibility.
Incident Response
Lead major incident investigations, coordinating containment, eradication, and recovery efforts.
Serve as an escalation point for complex security events and provide technical guidance to analysts.
Collaborate with Legal, Risk, IT, and Communications teams during critical incidents.
Automation & Orchestration
Design and implement SOAR workflows and automation scripts to accelerate incident handling.
Identify opportunities for automation across detection, triage, and response activities.
Maintain and optimize integrations between SOC tools, ticketing, and reporting platforms.
Threat Intelligence & Hunting
Apply threat intel to improve detection coverage and proactively hunt for adversary activity.
Stay updated on emerging threats, TTPs, and vulnerabilities to inform SOC defense strategy.
Presentation to upper management on cybersecurity operations security metrics, trends, and incidents.
WHO YOU ARE:
10 years of experience in Cybersecurity with a deep understanding of cybersecurity technologies, including SIEM, SOAR, EDR, WAF, IAM, and network security.
Bachelor's degree in computer science, information security, or a related field.
Proven ability to lead and motivate teams, build strong relationships, and influence decision-making at all levels.
Hands on experience when it comes to SIEM, Detection Engineering, and Incident Response.
Strong analytical and problem-solving skills to identify and resolve complex security issues.
Excellent written and verbal communication skills, including the ability to communicate technical concepts to non-technical audiences.
Proven ability to handle high-pressure situations and make critical decisions under time constraints.
(Optional) Relevant security certifications.
WHERE YOU’LL GO: Dispatcher to captain, ramp agent to data analyst, brand executive to CEO - these are some Dare To Dream stories of our Allstars.
WHAT YOU’LL ENJOY:
Physical Wellbeing: Key medical and insurance benefits, maternity expenses, flexible work arrangement, and health and fitness amenities.
Emotional Wellbeing: Paid time off, wellness programmes, and childcare amenities.
Financial Wellbeing: Resources relating to financial, personal skills and career growth programmes.
Allstars Specials: Unlimited discounted flights, and exclusive discounts with partners.
A unique Allstar culture like no other
OUR HIRING PROCESS:
Application received
Candidate screening
Interview(s) and assessment(s)
Background check and/or other assessments
Offer and negotiation
#J-18808-Ljbffr
Information Security Specialist
Posted 3 days ago
Job Viewed
Job Description
a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also
a great place to work,
providing you the unique, gamer-centric #LifeAtRazer experience that will put you in an accelerated growth, both personally and professionally. Job Responsibilities :
We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.
This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties and Responsibilities Conduct vulnerability assessments and provide actionable remediation plans Perform penetration testing on networks, applications, and infrastructure. Review and optimize firewall rules and configurations. Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis Investigate and respond to security incidents in a timely manner. Review and validate bug bounty submissions, coordinating with researchers and internal teams. Collaborate with IT, DevOps, and compliance teams to implement security best practices. Collaborate closely with business units to provide expert support and guidance on information security matters. Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices. Perform ad hoc tasks that are assigned by team leader or team manager. Requirements Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered). At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position. Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous. For lead roles, experience in people management, ability to lead and influence people is expected. Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms. Strong understanding of network protocols, web application security, and threat detection. Knowledge of AWS Cloud Computing services and experience with Linux servers is essential. Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment. Applicants must be willing to work in ICITY SHAH ALAM. Are you game? Pre-Requisites :
Are you game?
#J-18808-Ljbffr
Information Security Specialist
Posted 4 days ago
Job Viewed
Job Description
Shah Alamtime type:
Full timeposted on:
Posted Todayjob requisition id:
JR Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is **a place to do great work**, offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also **a great place to work,** providing you the unique, gamer-centric #LifeAtRazer experience that will put you in an accelerated growth, both personally and professionally.# **Job Responsibilities :**We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.
This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.**Essential Duties and Responsibilities*** Conduct vulnerability assessments and provide actionable remediation plans* Perform penetration testing on networks, applications, and infrastructure.* Review and optimize firewall rules and configurations.* Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis* Investigate and respond to security incidents in a timely manner.* Review and validate bug bounty submissions, coordinating with researchers and internal teams.* Collaborate with IT, DevOps, and compliance teams to implement security best practices.* Collaborate closely with business units to provide expert support and guidance on information security matters.* Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.* Perform ad hoc tasks that are assigned by team leader or team manager.**Requirements*** Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).* At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.* Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.* For lead roles, experience in people management, ability to lead and influence people is expected.* Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.* Strong understanding of network protocols, web application security, and threat detection.* Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.* Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.* Applicants must be willing to work in ICITY SHAH ALAM.# Pre-Requisites :At Razer, you'll be at the forefront of the most exciting industry in the world — gaming. Evolving forms of gaming require evolving forms of hardware, software and services. That’s where Razer comes in, offering innovative top-of-the-line products and services to allow gamers to fully immerse in the ultimate gaming experience.
Getting onboard Razer will place you on a global mission to bring gamers closer to the games they love. Razer is a place to do great work, offering you the opportunity to be a part of a global team across 11 countries. Whether you are a hardcore evangelist who breathe life to the latest and greatest gaming gear or a behind-the-scene hero who runs our global operations, you are assured of a career-changing quest that transcends time zones and culture with one single spell: For Gamers. By Gamers.
The journey towards phenomenal-ness won’t come easy. However, we will excel because gamers rely on teamwork. We achieve greatness because we are wicked problem-solvers and tenacious in clinching victories in all that we do. It is the team that makes Razer where it is today and will continue to bring Razer to even greater heights.
Razer is proud to be certified as a Great Place to Work in both United States and Singapore. This is a testament to our commitment to make your quest at Razer a rewarding one #J-18808-Ljbffr