8 Forensics jobs in Malaysia
Experienced Associate - Forensics Services
Posted 6 days ago
Job Viewed
Job Description
PwC Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Join or sign in to find your next jobJoin to apply for the Experienced Associate - Forensics Services role at PwC
Experienced Associate - Forensics ServicesPwC Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Join to apply for the Experienced Associate - Forensics Services role at PwC
Job Description & Summary
PwC Forensics Services combine financial, accounting and regulatory knowledge with deep technical and industry experience to assist our clients in confronting commercial challenges as a result of unplanned events. We are dedicated to the prevention, detection and investigation of financial crime, including fraud and corruption. We apply technology-based solutions to help clients identify their fraud and corruption risks. We advise clients on ways of mitigating those risks, improving corporate compliance and key business processes. We also help clients respond to alleged wrongdoing. We can serve as expert witnesses addressing critical business issues in litigation and regulatory, commercial or employment related proceedings.
As an Experienced Associate in Forensic Services, you’ll work as part of a team of problem solvers with extensive consulting and industry experience, helping our clients strategically prepare for, respond to, and emerge stronger from unplanned events triggered by fraud, economic crime, and other crises. Specific responsibilities include, but are not limited to:
- Assist the team in conducting fraud and other forensic investigations, as well as providing litigation support in employment, commercial and other disputes.
- Assist with documentation reviews, investigative interviews and data analyses in support of forensic investigations, litigation or regulatory compliance-related enquiries.
- Assist with the identification and integration of information and data from a variety of sources, assess data quality and completeness, and impact on analyses.
- Create and apply investigative and analytical techniques to detect irregular or anomalous transactions or patterns.
- Draft client deliverable reports and presentations to explain the forensic analysis performed and findings.
- Research new products, tools and techniques to assist with streamlining internal processes, address project related issues or improve methods of presenting results.
Line of Service
Advisory
Industry/Sector
Not Applicable
Specialism
Forensic Technology
Management Level
Associate
Job Description & Summary
PwC Forensics Services combine financial, accounting and regulatory knowledge with deep technical and industry experience to assist our clients in confronting commercial challenges as a result of unplanned events. We are dedicated to the prevention, detection and investigation of financial crime, including fraud and corruption. We apply technology-based solutions to help clients identify their fraud and corruption risks. We advise clients on ways of mitigating those risks, improving corporate compliance and key business processes. We also help clients respond to alleged wrongdoing. We can serve as expert witnesses addressing critical business issues in litigation and regulatory, commercial or employment related proceedings.
As an Experienced Associate in Forensic Services, you’ll work as part of a team of problem solvers with extensive consulting and industry experience, helping our clients strategically prepare for, respond to, and emerge stronger from unplanned events triggered by fraud, economic crime, and other crises. Specific responsibilities include, but are not limited to:
- Assist the team in conducting fraud and other forensic investigations, as well as providing litigation support in employment, commercial and other disputes.
- Assist with documentation reviews, investigative interviews and data analyses in support of forensic investigations, litigation or regulatory compliance-related enquiries.
- Assist with the identification and integration of information and data from a variety of sources, assess data quality and completeness, and impact on analyses.
- Create and apply investigative and analytical techniques to detect irregular or anomalous transactions or patterns.
- Draft client deliverable reports and presentations to explain the forensic analysis performed and findings.
- Research new products, tools and techniques to assist with streamlining internal processes, address project related issues or improve methods of presenting results.
- Bachelor or Master’s Degree.
- Fields of Study: Audit, Accounting, Finance, Engineering, Law, Computer and Information Science, or Management Information Systems.
- Whilst strictly not necessary, any of the following would be desirable:
- Approximately 1 year of experience in the areas of fraud investigations, forensic accounting, law enforcement or data analytics.
- Experience with NLP, Predictive Modelling or Name Matching.
- Holding or intent to pursue Certified Fraud Examiner, Certified Public Accountant, MCSA SQL or Oracle Database SQL Expert, or similar certifications.
- Understanding and appreciation of evidence and evidential/forensic procedures, with a base level of commercial, business, operational and financial acumen.
- A natural curiosity to identify, investigate and explain irregularities/discrepancies and trends/patterns, and to solve complex problems.
- Familiarity and experience with the following data analytics and visualisation capabilities:
- Programming in the following languages: Python, Shell scripting, Java, JavaScript, PHP
- Data Visualisation tools: Tableau, Qlikview or PowerBI
- Relational or graph databases: SQL, NoSQL, Neo4J, etc.
- Creative problem-solving abilities.
- A self-driven learner with the ability to quickly learn and apply new tools and techniques.
- Strong attention to detail.
- High personal integrity.
- A natural curiosity to identify, investigate and explain irregularities/discrepancies and trends/patterns, and to solve complex problems.
- Strong English language skills for use in preparing and presenting complex written and verbal materials. Additional languages considered favourably.
- Flexibility/ability and desire to travel, as it can be a required element of the position.
- Many forensic engagements may occur with little advance notice and are of indeterminate duration, requiring significant flexibility on behalf of our consultants.
Optional Skills
Desired Languages (If blank, desired languages not specified)
Travel Requirements
Up to 40%
Available for Work Visa Sponsorship?
No
Government Clearance Required?
No
Job Posting End Date
- Seniority level Associate
- Employment type Full-time
- Job function Other
- Industries Professional Services
Referrals increase your chances of interviewing at PwC by 2x
Sign in to set job alerts for “Guest Services Associate” roles.Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Customer Service Associate - Roadside Assistance (Shift) - ContractKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Guest Services Center Agent - Reservations-1Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kota Damansara, Selangor, Malaysia 15 hours ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 weeks ago
Customer Service Assistant - Admin (Petaling Jaya)Petaling Jaya, Selangor, Malaysia 1 day ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
MYR2,800.00
-
MYR4,000.00
1 month ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 months ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 day ago
Petaling Jaya, Selangor, Malaysia 3 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Bukit Persekutuan, Federal Territory of Kuala Lumpur, Malaysia 4 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Petaling Jaya, Selangor, Malaysia 3 months ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Sepang, Selangor, Malaysia MYR2,000 - MYR2,800 5 days ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrAssociate (Forensics Lead), Incident Response
Posted 12 days ago
Job Viewed
Job Description
Overview
Associate (Forensics Lead), Incident Response — S-RM Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
The role focuses on forensic investigations within our Incident Response team, delivering delivery-focused support across incident response services and complex cyber incidents.
Responsibilities- Supporting technical incident response from first contact through to closure: act as a technical resource on response cases, deploying expertise, creating tailored strategies for response workstreams, and guiding project colleagues as needed.
- Overseeing host- and network-based incident response investigations: triage, system recovery, technical evidence collection, and forensics, log, malware and root cause analyses.
- Developing and sharing domain expertise: grow cyber expertise and share it with the wider team through internal initiatives and programs.
- Participating in an on-call rotation to provide 24x7x365 client incident coverage.
- Engaging in a variety of casework across public and corporate clients, with opportunities to broaden security awareness into testing and advisory projects, in addition to deepening incident response expertise.
- Flexible working practices to support wellbeing, with options to balance on-site and remote work.
- Direct experience working in an Incident Response or Digital Forensics team is strongly preferred; candidates with exposure to IR teams or roles with IR aspects will be considered.
- Fundamental understanding of computer systems and networks, including:
- Windows systems (e.g., domain services, standard build templates, SCCM, PowerShell)
- Networking (firewall rules, network segmentation, DNS)
- Virtualization technologies (ESXi, Hyper-V)
- Endpoint Detection & Response solutions
- Experience conducting forensic investigations, particularly on Windows systems; Linux and MacOS investigation experience is preferred.
- Understanding of core incident response workstreams, including containment and restoration/recovery, is a benefit.
- Critical and investigative mindset with the ability to solve problems with limited information and guidance.
- Knowledge of cyber threat actors and their TTPs.
- Strong communication skills, comfortable speaking to individuals at all levels of an organization.
- Certifications (or equivalent) such as GCFE, GCFA, GCIH, GNFA are preferred; beneficial certifications include EnCE, CFSR, CISSP, GREM, CCNA, MCFE, OSCP, Network+ and Security+.
- Working proficiency in another language (e.g., Malay, Tamil, Mandarin, Cantonese, Vietnamese) is beneficial but not required.
- Must have permission to work in Malaysia by the start of employment.
- 20 days paid holiday each year, plus public holidays and additional leave accrual up to 5 days.
- Flexible working: minimum two days in the office per week; remote work option; flexible hours between 7am and 7pm.
- Pension scheme: EPF contributions in accordance with legislative requirements.
- Life insurance; company-paid private medical and dental insurance.
- Company-paid maternity, paternity and fertility treatment leave.
- Employee Assistance Programme: 24/7 access to specialist support services and resources.
The role will be based in our office in Kuala Lumpur with flexible working arrangements available.
#J-18808-LjbffrAssociate (Forensics Lead), Incident Response
Posted 12 days ago
Job Viewed
Job Description
Associate (Forensics Lead), Incident Response — S-RM Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia The role focuses on forensic investigations within our Incident Response team, delivering delivery-focused support across incident response services and complex cyber incidents. Responsibilities
Supporting technical incident response from first contact through to closure: act as a technical resource on response cases, deploying expertise, creating tailored strategies for response workstreams, and guiding project colleagues as needed. Overseeing host- and network-based incident response investigations: triage, system recovery, technical evidence collection, and forensics, log, malware and root cause analyses. Developing and sharing domain expertise: grow cyber expertise and share it with the wider team through internal initiatives and programs. Participating in an on-call rotation to provide 24x7x365 client incident coverage. Engaging in a variety of casework across public and corporate clients, with opportunities to broaden security awareness into testing and advisory projects, in addition to deepening incident response expertise. Flexible working practices to support wellbeing, with options to balance on-site and remote work. Qualifications
Direct experience working in an Incident Response or Digital Forensics team is strongly preferred; candidates with exposure to IR teams or roles with IR aspects will be considered. Fundamental understanding of computer systems and networks, including:
Windows systems (e.g., domain services, standard build templates, SCCM, PowerShell) Networking (firewall rules, network segmentation, DNS) Virtualization technologies (ESXi, Hyper-V) Endpoint Detection & Response solutions
Experience conducting forensic investigations, particularly on Windows systems; Linux and MacOS investigation experience is preferred. Understanding of core incident response workstreams, including containment and restoration/recovery, is a benefit. Critical and investigative mindset with the ability to solve problems with limited information and guidance. Knowledge of cyber threat actors and their TTPs. Strong communication skills, comfortable speaking to individuals at all levels of an organization. Certifications (or equivalent) such as GCFE, GCFA, GCIH, GNFA are preferred; beneficial certifications include EnCE, CFSR, CISSP, GREM, CCNA, MCFE, OSCP, Network+ and Security+. Working proficiency in another language (e.g., Malay, Tamil, Mandarin, Cantonese, Vietnamese) is beneficial but not required. Must have permission to work in Malaysia by the start of employment. Benefits
20 days paid holiday each year, plus public holidays and additional leave accrual up to 5 days. Flexible working: minimum two days in the office per week; remote work option; flexible hours between 7am and 7pm. Pension scheme: EPF contributions in accordance with legislative requirements. Life insurance; company-paid private medical and dental insurance. Company-paid maternity, paternity and fertility treatment leave. Employee Assistance Programme: 24/7 access to specialist support services and resources. The role will be based in our office in Kuala Lumpur with flexible working arrangements available.
#J-18808-Ljbffr
Senior Cyber Forensics and Incident Response
Posted 6 days ago
Job Viewed
Job Description
about the company
You will be working for a major organisation within the finance industry
about the job
- Lead and manage all phases of cybersecurity incident response (containment, eradication, recovery).
- Develop and refine incident response plans, playbooks, and procedures.
- Oversee and conduct advanced digital forensic investigations (endpoints, servers, networks, cloud).
- Lead, mentor, and develop the CFIR team.
- Stay updated on cyber threats and vulnerabilities relevant to the financial sector.
- Communicate technical findings and reports to stakeholders (technical/non-technical, management, regulatory bodies).
- Evaluate, recommend, and implement CFIR tools and technologies.
- Ensure CFIR activities comply with internal policies, industry best practices, and BNM regulations.
- Lead post-incident reviews for continuous improvement.
- Collaborate with SOC, IT, legal, risk, and other departments.
about the package
- Salary up to RM15,000
- Must have working rights in Malaysia
- Performance bonus
- Allowances
- Medical and life insurance
skills
Cyber forensics, digital forensics, incident response, cybersecurity, IT security
qualifications
- 3-5 years hands on experience within Cyber Forensics and Incident Response
education
Associate Degree/Diploma
#J-18808-LjbffrT&T Manager - Cyber Forensics & Incident Response - SG
Posted 1 day ago
Job Viewed
Job Description
Press Tab to Move to Skip to Content Link
Select how often (in days) to receive an alert:
Date: 6 Sept 2025
Location: Singapore, Singapore, SG
Are you ready to unleash your potential?
At Deloitte, our purpose is to make an impact that matters for our clients, our people, and the communities we serve.
We believe we have a responsibility to be a force for good, and WorldImpact is our portfolio of initiatives focused on making a tangible impact on society’s biggest challenges and creating a better future. We strive to advise clients on how to deliver purpose-led growth and embed more equitable, inclusive as well as sustainable business practices.
Hence, we seek talented individuals driven to excel and innovate, working together to achieve our shared goals.
We are committed to creating positive work experiences that foster a culture of respect and inclusion, where diverse perspectives are celebrated, and everyone is recognized for their contributions.
Ready to unleash your potential with us? Join the winning team now!
What you will doAs a Manager in Cyber Forensics & Incident Response at Deloitte, you will lead the investigation and resolution of complex cybersecurity incidents. You will develop and implement robust incident response strategies that align with client needs and regulatory requirements. Your role will involve managing cross-functional teams to conduct thorough forensic analyses, identify root causes, and mitigate future risks. You will also engage with stakeholders to communicate the impact and value of incident response efforts, ensuring Deloitte remains a trusted advisor in cybersecurity resilience and threat management.
- Develop Cyber Incident Strategies: Assist clients in creating comprehensive cyber incident strategies, assessing vulnerabilities, and conducting preparedness exercises to enhance their response and recovery capabilities.
- Conduct Advanced Investigations: Lead investigations into complex cyber incidents involving malware, data breaches, denial of service attacks, and other security threats.
- Provide Expert Guidance: Offer clients expert advice on handling cyber incidents, forensic analysis, and incident response best practices.
- Lead Triage and Investigations: Oversee and support detailed triage and investigations of critical cyber incidents across cloud, traditional, and hybrid environments.
- Perform Incident Response Functions: Execute host-based analytical functions, including digital forensics, metadata analysis, and malware analysis, on various systems (Windows, Unix, Mac OS X) to identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
- Create and Track Metrics: Develop and monitor metrics based on the MITRE ATT&CK Framework and other security models to measure the effectiveness of incident response efforts.
- Collaborate with Stakeholders: Work with application and infrastructure teams to identify key components and information sources, including servers, workstations, middleware, applications, databases, and logs.
- Participate in Incident Response Efforts: Engage in incident response activities using forensic tools and custom methodologies to detect and mitigate sources of compromise and malicious activities.
At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We connect our purpose and shared values to identify issues as well as to make an impact that matters to our clients, people and the communities. Additionally, Managers across our Firm are expected to
- Develop diverse, high-performing people and teams through new and meaningful development opportunities.
- Collaborate effectively to build productive relationships and networks.
- Understand and lead the execution of key objectives and priorities for internal as well as external stakeholders.
- Influence stakeholders, teams, and individuals positively – leading by example and providing equal opportunities for our people to grow, develop and succeed.
- Deliver superior value and high-quality results to stakeholders while driving high performance from people across Deloitte.
- Apply their understanding of disruptive trends and competitor activity to recommend changes, in line with leading practices.
- Bachelor’s degree in the relevant field and approximately 5 years or more of related work experience.
- One or more GIAC (e.g., GCFE, GCFA, GREM, GCIH, GASF, GNFA, etc.), CREST or other digital forensic and/or incident response certifications.
- 8+ years of professional experience in cybersecurity and/or information security or demonstrated equivalent capability.
- 3+ years hands-on working in cyber incident response and investigations in medium to large organizations with cloud and forensics components.
- Experience with response and analysis tools such as EnCase Forensic, EnCase Enterprise, AccessData FTK, Volatility, SANS SIFT, Carbon Black, Internet Evidence Finder, Magnet Axiom, Splunk, ElasticSearch or CrowdStrike
- Experience with malware analysis and understanding attack techniques.
- Experience interpreting, searching, and manipulating data within enterprise logging solutions.
- Familiarity with threat intelligence and applications within incident response investigations.
- Hands-on Dev/Sec/Ops experience with cloud environments and underlying storage, compute and monitoring services.
- Prior experience with cloud common services
- Hands-on experience with forensic investigations or large-scale incident response in cloud environments.
- Hands-on experience with containerization methods and tools (e.g., Docker, Kubernetes) including incident response and digital forensics.
Due to volume of applications, we regret that only shortlisted candidates will be notified.
Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website.
#LI-AA1
Requisition ID:
In Singapore, the services are provided by Deloitte and other related entities in Singapore("Deloitte in Singapore"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Singapore, which is within the Deloitte Network, is the entity that is providing this Website.
#J-18808-LjbffrT&T Manager - Cyber Forensics & Incident Response - SG
Posted 1 day ago
Job Viewed
Job Description
Singapore, Singapore, SG Are you ready to unleash your potential? At Deloitte, our purpose is to make an impact that matters for our clients, our people, and the communities we serve. We believe we have a responsibility to be a force for good, and WorldImpact is our portfolio of initiatives focused on making a tangible impact on society’s biggest challenges and creating a better future. We strive to advise clients on how to deliver purpose-led growth and embed more equitable, inclusive as well as sustainable business practices. Hence, we seek talented individuals driven to excel and innovate, working together to achieve our shared goals. We are committed to creating positive work experiences that foster a culture of respect and inclusion, where diverse perspectives are celebrated, and everyone is recognized for their contributions. Ready to unleash your potential with us? Join the winning team now!
What you will do As a Manager in Cyber Forensics & Incident Response at Deloitte, you will lead the investigation and resolution of complex cybersecurity incidents. You will develop and implement robust incident response strategies that align with client needs and regulatory requirements. Your role will involve managing cross-functional teams to conduct thorough forensic analyses, identify root causes, and mitigate future risks. You will also engage with stakeholders to communicate the impact and value of incident response efforts, ensuring Deloitte remains a trusted advisor in cybersecurity resilience and threat management.
Develop Cyber Incident Strategies: Assist clients in creating comprehensive cyber incident strategies, assessing vulnerabilities, and conducting preparedness exercises to enhance their response and recovery capabilities.
Conduct Advanced Investigations: Lead investigations into complex cyber incidents involving malware, data breaches, denial of service attacks, and other security threats.
Provide Expert Guidance: Offer clients expert advice on handling cyber incidents, forensic analysis, and incident response best practices.
Lead Triage and Investigations: Oversee and support detailed triage and investigations of critical cyber incidents across cloud, traditional, and hybrid environments.
Perform Incident Response Functions: Execute host-based analytical functions, including digital forensics, metadata analysis, and malware analysis, on various systems (Windows, Unix, Mac OS X) to identify Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs).
Create and Track Metrics: Develop and monitor metrics based on the MITRE ATT&CK Framework and other security models to measure the effectiveness of incident response efforts.
Collaborate with Stakeholders: Work with application and infrastructure teams to identify key components and information sources, including servers, workstations, middleware, applications, databases, and logs.
Participate in Incident Response Efforts: Engage in incident response activities using forensic tools and custom methodologies to detect and mitigate sources of compromise and malicious activities.
Your role as a leader At Deloitte, we believe in the importance of empowering our people to be leaders at all levels. We connect our purpose and shared values to identify issues as well as to make an impact that matters to our clients, people and the communities. Additionally, Managers across our Firm are expected to
Develop diverse, high-performing people and teams through new and meaningful development opportunities.
Collaborate effectively to build productive relationships and networks.
Understand and lead the execution of key objectives and priorities for internal as well as external stakeholders.
Influence stakeholders, teams, and individuals positively – leading by example and providing equal opportunities for our people to grow, develop and succeed.
Deliver superior value and high-quality results to stakeholders while driving high performance from people across Deloitte.
Apply their understanding of disruptive trends and competitor activity to recommend changes, in line with leading practices.
Enough about us, let's talk about you.
Bachelor’s degree in the relevant field and approximately 5 years or more of related work experience.
One or more GIAC (e.g., GCFE, GCFA, GREM, GCIH, GASF, GNFA, etc.), CREST or other digital forensic and/or incident response certifications.
8+ years of professional experience in cybersecurity and/or information security or demonstrated equivalent capability.
3+ years hands-on working in cyber incident response and investigations in medium to large organizations with cloud and forensics components.
Experience with response and analysis tools such as EnCase Forensic, EnCase Enterprise, AccessData FTK, Volatility, SANS SIFT, Carbon Black, Internet Evidence Finder, Magnet Axiom, Splunk, ElasticSearch or CrowdStrike
Experience with malware analysis and understanding attack techniques.
Experience interpreting, searching, and manipulating data within enterprise logging solutions.
Familiarity with threat intelligence and applications within incident response investigations.
Hands-on Dev/Sec/Ops experience with cloud environments and underlying storage, compute and monitoring services.
Prior experience with cloud common services
Hands-on experience with forensic investigations or large-scale incident response in cloud environments.
Hands-on experience with containerization methods and tools (e.g., Docker, Kubernetes) including incident response and digital forensics.
Due to volume of applications, we regret that only shortlisted candidates will be notified. Please note that Deloitte will never reach out to you directly via messaging platforms to offer you employment opportunities or request for money or your personal information. Kindly apply for roles that you are interested in via this official Deloitte website. #LI-AA1 Requisition ID: In Singapore, the services are provided by Deloitte and other related entities in Singapore("Deloitte in Singapore"), which are affiliates of Deloitte Southeast Asia Ltd. Deloitte Southeast Asia Ltd is a member firm of Deloitte Touche Tohmatsu Limited. Deloitte in Singapore, which is within the Deloitte Network, is the entity that is providing this Website.
#J-18808-Ljbffr
Associate (Forensics Lead), Incident Response APAC Cyber security Kuala Lumpur
Posted 6 days ago
Job Viewed
Job Description
S-RM is seeking an Associate to work within the Cyber Security Team in Kuala Lumpur.
S-RM is a global intelligence and cyber security consultancy. Since 2005, we’ve helped some of the most demanding clients in the world solve some of their toughest information security challenges.
We’ve been able to do this because of our outstanding people. We’re committed to developing sharp, curious, driven individuals who want to think critically, solve complex problems, and achieve success.
But we also know that work isn’t everything. It’s about the lives and careers it helps us build. We’re immensely proud of this culture and we invest in our people’s wellbeing, learning, and ideas every day.
We’re excited you’re thinking about joining us.
The roleOur Incident Response Associates are a critical part of our Cyber Security division's success.
As a Forensics Lead on our Incident Response team, you will deploy your expertise in a delivery role across our various incident response services, with a particular focus on forensic investigations into complex cyber incidents.
You will work across the full lifecycle of security incidents to help our clients respond and recover, including:
- Supporting technical incident response from first contact through to closure: you will be a technical resource on response cases, deploying your own expertise, creating tailored strategies for response workstreams, and offering guidance to colleagues on your project team. You may also be supported by more senior technical team members where appropriate.
Overseeing host- and network-based incident response investigations: including triage, system recovery, technical evidence collection, and forensics, log, malware and root cause analyses.
- Developing and sharing domain expertise: we will support you in growing your cyber expertise, including sharing it with the wider team through internal initiatives and programs.
- Participating in an on-call rotation to provide 24x7x365 client incident coverage.
Other features of the role include:
- Variety of casework: no day will be the same. Our team responds to a huge variety of incidents for both public and corporate clients.
- Range of opportunities: you will have opportunities to broaden your security awareness into testing and advisory projects, in addition to deepening your incident response expertise.
- Flexible working practices: responding to incidents can be intense, high-pressure work. We are mindful of our team's work/life balance and offer flexible working options to support your wellbeing.
- Direct experience working in an Incident Response or Digital Forensics team is strongly preferred; however, candidates with exposure to working with Incident Response teams, or those in roles reflecting aspects of Incident Response will be considered.
- A fundamental understanding of computer systems and networks, including:
- Windows systems (e.g. Managing domains services, creating standard build templates, using SCCM, moderate PowerShell capabilities, etc.)
- Networking (e.g. managing firewall rules, providing guidance around network segmentation, DNS, etc.)
- Virtualisation technologies (e.g. ESXi, Hyper-V, etc.)
- Endpoint Detection & Response solutions.
- The candidate must be able to demonstrate experience conducting forensic investigations, in particular relating to Windows systems. Additional experience conducting investigations into Linux and MacOS systems is preferred.
- Demonstrable understanding of core incident response workstreams, including containment and restoration/recovery is a benefit.
- A critical and investigative mindset. You should be comfortable solving problems with limited information and guidance, developing proportionate strategies to achieve timely outcomes.
- Clear demonstrable knowledge of cyber threat actors, and their tactics, techniques, and procedures.
- Strong communication skills. You should be comfortable speaking to people at all levels of an organization, from the board of directors to the technical teams.
- It is preferred, but not required, that candidates hold one of the following certifications (or equivalent) GCFE, GCFA, GCIH, GNFA. However, holding any of the following is beneficial: EnCE, CFSR, CISSP, GREM, CCNA, MCFE, OSCP, Network+ and Security+
- A working proficiency in another language (such as Malay, Tamil, Mandarin, Cantonese, Vietnamese) is also beneficial, although not required.
The successful candidate must have permission to work in Malaysia by the start of their employment.
BenefitsWe offer thoughtful, balanced rewards and support to help our people do their best work and live their lives outside it, including:
- 20 days paid holiday each year: in addition to public holidays, as well as 1 additional day of leave for every year you work at S-RM up to a maximum of 5 days.
- Flexible working: work a minimum of two days a week in the office and the remainder remotely, choose your hours between 7am and 7pm.
- Pension scheme: S-RM contributes to Employees Provident Fund (EPF) in accordance with legislative requirements.
- Life Insurance: help someone you love should something happen to you. (Further details coming soon.)
- Company-paid private medical and dental insurance. (Further details coming soon.)
- Company-paid maternity, paternity and fertility treatment leave.
- Employee Assistance Programme: free access to specialist support services, including counselling, as well as an online portal of useful articles, tips and tools. Available 24/7, 365 days a year.
The role will be based in our office in Kuala Lumpur. However, we have flexible working arrangements available.
Application ProcessThe application process includes:
- A preliminary call which will be a chance for you to find out more about S-RM and the role.
- First Interview – a remotely run skills focused interview.
- Second interview - a remotely run skills focused interview.
- An assessment – an incident response skill evaluation test.
- Final interview - a remotely run skills focused interview.
S-RM nurtures a culture of equality, diversity and inclusion and we are dedicated to developing a workforce that displays a variety of talents, experiences and perspectives.
#J-18808-LjbffrBe The First To Know
About the latest Forensics Jobs in Malaysia !
Associate (Forensics Lead), Incident Response APAC Cyber security Kuala Lumpur
Posted 23 days ago
Job Viewed
Job Description
S-RM is seeking an Associate to work within the Cyber Security Team in Kuala Lumpur. S-RM is a global intelligence and cyber security consultancy. Since 2005, we’ve helped some of the most demanding clients in the world solve some of their toughest information security challenges. We’ve been able to do this because of our outstanding people. We’re committed to developing sharp, curious, driven individuals who want to think critically, solve complex problems, and achieve success. But we also know that work isn’t everything. It’s about the lives and careers it helps us build. We’re immensely proud of this culture and we invest in our people’s wellbeing, learning, and ideas every day. We’re excited you’re thinking about joining us. The role
Our Incident Response Associates are a critical part of our Cyber Security division's success. As a Forensics Lead on our Incident Response team, you will deploy your expertise in a delivery role across our various incident response services, with a particular focus on forensic investigations into complex cyber incidents. You will work across the full lifecycle of security incidents to help our clients respond and recover, including: Supporting technical incident response from first contact through to closure: you will be a technical resource on response cases, deploying your own expertise, creating tailored strategies for response workstreams, and offering guidance to colleagues on your project team. You may also be supported by more senior technical team members where appropriate. Overseeing host- and network-based incident response investigations: including triage, system recovery, technical evidence collection, and forensics, log, malware and root cause analyses. Developing and sharing domain expertise: we will support you in growing your cyber expertise, including sharing it with the wider team through internal initiatives and programs. Participating in an on-call rotation to provide 24x7x365 client incident coverage. Other features of the role include: Variety of casework: no day will be the same. Our team responds to a huge variety of incidents for both public and corporate clients. Range of opportunities: you will have opportunities to broaden your security awareness into testing and advisory projects, in addition to deepening your incident response expertise. Flexible working practices: responding to incidents can be intense, high-pressure work. We are mindful of our team's work/life balance and offer flexible working options to support your wellbeing. What we're looking for
Direct experience working in an Incident Response or Digital Forensics team is strongly preferred; however, candidates with exposure to working with Incident Response teams, or those in roles reflecting aspects of Incident Response will be considered. A fundamental understanding of computer systems and networks, including:
Windows systems (e.g. Managing domains services, creating standard build templates, using SCCM, moderate PowerShell capabilities, etc.) Networking (e.g. managing firewall rules, providing guidance around network segmentation, DNS, etc.) Virtualisation technologies (e.g. ESXi, Hyper-V, etc.) Endpoint Detection & Response solutions.
The candidate must be able to demonstrate experience conducting forensic investigations, in particular relating to Windows systems. Additional experience conducting investigations into Linux and MacOS systems is preferred. Demonstrable understanding of core incident response workstreams, including containment and restoration/recovery is a benefit. A critical and investigative mindset. You should be comfortable solving problems with limited information and guidance, developing proportionate strategies to achieve timely outcomes. Clear demonstrable knowledge of cyber threat actors, and their tactics, techniques, and procedures. Strong communication skills. You should be comfortable speaking to people at all levels of an organization, from the board of directors to the technical teams. It is preferred, but not required, that candidates hold one of the following certifications (or equivalent) GCFE, GCFA, GCIH, GNFA. However, holding any of the following is beneficial: EnCE, CFSR, CISSP, GREM, CCNA, MCFE, OSCP, Network+ and Security+ A working proficiency in another language (such as Malay, Tamil, Mandarin, Cantonese, Vietnamese) is also beneficial, although not required. The successful candidate must have permission to work in Malaysia by the start of their employment. Benefits
We offer thoughtful, balanced rewards and support to help our people do their best work and live their lives outside it, including: 20 days paid holiday each year: in addition to public holidays, as well as 1 additional day of leave for every year you work at S-RM up to a maximum of 5 days. Flexible working: work a minimum of two days a week in the office and the remainder remotely, choose your hours between 7am and 7pm. Pension scheme: S-RM contributes to Employees Provident Fund (EPF) in accordance with legislative requirements. Life Insurance: help someone you love should something happen to you. (Further details coming soon.) Company-paid private medical and dental insurance. (Further details coming soon.) Company-paid maternity, paternity and fertility treatment leave. Employee Assistance Programme: free access to specialist support services, including counselling, as well as an online portal of useful articles, tips and tools. Available 24/7, 365 days a year. The role will be based in our office in Kuala Lumpur. However, we have flexible working arrangements available. Application Process
The application process includes: A preliminary call which will be a chance for you to find out more about S-RM and the role. First Interview – a remotely run skills focused interview. Second interview - a remotely run skills focused interview. An assessment – an incident response skill evaluation test. Final interview - a remotely run skills focused interview. S-RM nurtures a culture of equality, diversity and inclusion and we are dedicated to developing a workforce that displays a variety of talents, experiences and perspectives.
#J-18808-Ljbffr