877 Security Analyst jobs in Malaysia
Security Analyst
Posted 9 days ago
Job Viewed
Job Description
Overview
Turnkey provides consulting and managed services in the areas of Identity and Access Management, Risk and Controls Management and Application/Cyber Security for corporations predominantly running SAP software. We deliver consulting and application support services within this specialised niche to customers regardless of their size or industry, helping them to minimise their business risks with appropriate controls throughout their day to day and critical business transactions.
We are an established and fast-growing company with a culture of personal responsibility, knowledge sharing and a commitment to putting our clients at the centre of everything that we do. Founded in the UK in 2004, we have gone on to establish ourselves as a truly global organisation with offices in Australia, Germany, the US, Malaysia, Singapore and France.
Our aim is to ensure that all our clients can achieve the fine balance between business enablement and security. We do this through having the strongest team in the business, providing a unique insight into security and risk management best practice.
Our daily tasks vary significantly throughout the team; however, the focus remains on delivering often highly technical solutions that help our clients improve their security and controls posture. This might include analysing granular details such as user access within a set of systems, providing new data protection measures, or drawing solutions from data sets.
In joining our team, you can expect to be working on challenging projects across a wide range of global clients (e.g. FTSE 100) and industries. The nature of projects will be diverse and will vary across the categories of advisory, assurance, managed services and system implementation. Whilst being actively engaged on solving business problems, our core practice remains specialised in technical solutions for our clients.
About YouWe are looking for independent, proactive and ambitious individuals who are committed to making a meaningful contribution to Turnkey. While an Information Security background would be advantageous, intellectual curiosity and a can-do attitude is more important than the subject of your degree. If you appreciate attention to detail, utilising data to inform decisions, and working on projects alongside a range of clients, then this is an excellent opportunity for you.
Our training programme is designed to equip you with a broad set of skills that will help you to excel in your consultancy career with us. Although the role has a technical bias, we expect to build your technical skills throughout the scheme, so no existing technical knowledge is required to apply.
What to expect in your first twelve months:
- An initial immersive training schedule to introduce you to our strategic practice pillars and provide an understanding of the technical aspects fundamental to this role
- We will then aim to place you on projects across the strategic service lines as soon as possible after completing initial training, where the more senior delivery team will provide continued support
- Throughout your first year, you will be encouraged to complete soft skills training and be mentored to develop these skills further, with the expectation of gaining certification within twelve months of joining
- After twelve months, you can expect to be aligned to one of our strategic practices, giving you the opportunity to work towards a more technically focussed and specialised certification in your second year.
- Excellent communication skills (written and verbal)
- Ability to build enduring relationships
- Analytical skills to investigate and solve complex problems in a structured manner
- Ability to explain technical concepts clearly and concisely
- Flexibility to work on multiple different types of projects
- Confidence to ask questions and contribute
- Initiative - always looking for better ways of doing things
- An Honours Degree in any discipline
- Ideally an understanding of basic networking and operating systems (e.g. windows or linux) would be desirable but not necessary
- An inquisitive mind capable of considering the unintended opportunities for disruption and consequences of security gaps
- Working with a range of clients on multidisciplinary projects
- Working on our managed service engagements to deliver improvements and enhancements to our customers’ ongoing business operations
- Supporting application/solution implementation including definition of relevant master data requirements
- Critical analysis of information to validate solution adherence to requirements, including various application testing techniques
- Coordination of activities with clients and team members to deliver project tasks to the required quality standards
- Analysing data to drive decision-making and help in providing the best solutions to our clients
- Internally you will be involved in operational and practice-development activities which may include marketing, HR, events or managing team social calendars
Security Analyst
Posted 11 days ago
Job Viewed
Job Description
About
The Security Analyst II is responsible for day-to-day cybersecurity operations, including monitoring alerts, investigating incidents, validating endpoint hygiene, and ensuring timely execution of remediation plans. The role serves as a tactical executor under the direction of the Senior Manager, Cybersecurity and in coordination with the SOC and Infrastructure teams. Ideal candidates are those with solid hands-on experience in endpoint security, log triage, DLP monitoring, and vulnerability management.
Your-Day-To-Day- Security Event Monitoring & Response :
- Monitor alerts from EDR (Crowdstrike), DLP (Google Workspace), and other SIEM sources; investigate and escalate validated events.
- Coordinate with Managed SOC for Level 1/2 triage, assist in root cause validation, and track incidents to closure.
- Participate in incident response processes, including evidence collection, analysis, and response documentation.
- Endpoint & Device Visibility:
- Continuously monitor CS and MEDC installation status, highlighting assets lacking endpoint visibility.
- Conduct hygiene validation exercises against endpoint baseline (e.g. Crowdstrike health, GWS login telemetry, etc).
- Work with IT Service Operations to address untagged, unmonitored, or misconfigured devices.
- Vulnerability & Patch Coordination:
- Review scan results (e.g., Tenable.io) for high/critical findings and follow up with Infra and IT Ops for remediation status.
- Support prioritization of vulnerabilities based on asset classification and exposure.
- Participate in monthly patch and remediation governance tracking.
- DLP Operations & Enforcement:
- Investigate DLP rule violations, verify false positives, and escalate breaches aligned to Data Classification policy.
- Maintain documentation on DLP cases and support tuning of policies with the Cloud Security Engineering team.
- Support Falcon Data Protection rollout testing (PoC) and feedback loop.
- Reporting, Compliance & Audit Support:
- Maintain operational metrics related to endpoint coverage, DLP alerts, and vulnerability remediation.
- Support audit activities requiring endpoint agent matching, asset traceability, and license reconciliation.
- Assist with monthly/quarterly reporting to Cybersecurity GRC and CTO functions for ongoing governance reviews.
- Education : Bachelor’s degree in Cybersecurity, Information Technology, or a related discipline.
- Experience : 2–4 years’ experience in a SOC, IT security operations, or security analyst capacity. Proven experience handling EDR, SIEM, DLP, or VA tools in a mid-size or enterprise organization.
- Technical Skills :
- Familiarity with endpoint protection platforms (e.g., Crowdstrike, Carbon Black, SentinelOne).
- Exposure to vulnerability management tools (e.g., Tenable, Qualys) and patching workflows.
- Working knowledge of DLP controls in Google Workspace or Microsoft 365 environments.
- Ability to interpret alerts, analyze logs, and investigate user or system behavior anomalies.
- Certifications (Preferred):
- CompTIA Security+, Crowdstrike Certified Falcon Administrator (CCFA), Google Workspace Security Admin, or equivalent.
- Soft Skills :
- Effective communication and collaboration skills for working with diverse teams and third-party vendors.
- Adaptable to changing priorities and able to manage workload independently.
- Operational Rigor – Structured and process-driven approach to handling incidents and tasks.
- Analytical Thinking – Strong diagnostic skills and an investigative mindset for incident triage.
- Communication – Able to write clear incident summaries and collaborate across teams effectively.
- Accountability – Owns assigned alerts, tasks, and follow-ups until closure.
- Continuous Learning – Seeks to stay updated with new threats, tools, and defensive techniques.
Security Analyst
Posted today
Job Viewed
Job Description
Key Responsibilities
- Conduct technical penetration tests across web applications, mobile apps, APIs, internal/external networks, and cloud environments (AWS, Azure, GCP).
- Perform vulnerability assessments and red teaming exercises for clients in financial services, healthcare, and critical infrastructure.
- Deliver detailed, actionable reports with risk ratings, technical findings, remediation guidance, and executive summaries.
- Support the development of our automated security validation platform by feeding real-world attack patterns into detection logic.
- Participate in incident response engagements and post-breach forensic analysis as needed.
- Collaborate with developers and DevOps teams to embed secure practices (Shift-Left Security).
- Maintain up-to-date knowledge of the latest attack vectors (e.g., OWASP Top 10, MITRE ATT&CK) and defensive countermeasures.
- Assist in achieving and maintaining compliance with standards such as ISO 27001, SOC 2, PDPA, and MAS TRM.
- Mentor junior analysts and contribute to internal security research and tooling.
Required Qualifications & Skills
- Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or related field.
- Minimum 3 years of hands-on experience in penetration testing and vulnerability assessment.
- CREST Certified Penetration Tester (CRT) or CREST Registered Penetration Tester (CPT) – mandatory preferred ; applicants actively pursuing certification will be considered.
Hold one or more of the following certifications:
- OSCP (Offensive Security Certified Professional) – highly valued
- CEH, CISSP, CompTIA PenTest+
Proven experience using tools such as:
- Burp Suite, Metasploit, Nmap, Wireshark, SQLMap, Cobalt Strike, Nessus, Acunetix
- Cloud security tools (e.g., ScoutSuite, Prowler, AWS Inspector)
Strong understanding of:
- Web and mobile application security
- Network protocols and firewall bypass techniques
- Identity & access management (IAM), API security
Common exploits (e.g., XSS, CSRF, SSRF, RCE, IDOR)
Solid scripting skills (Python, Bash, or PowerShell) for automation and custom exploit development.
- Familiarity with Singapore-specific regulatory frameworks: PDPA, MAS TRM, CSA Essential Cyber Hygiene.
Preferred Attributes
- Experience conducting assessments for Financial Institutions -regulated entities or government agencies.
- Participation in bug bounty programs (HackerOne, Bugcrowd) with proven track record.
- Knowledge of cloud-native architectures and containerized environments (Docker, Kubernetes).
- Experience with adversary simulation or purple teaming.
- Active contributor to cybersecurity communities (blogs, CTFs, conferences).
What We Offer
- Competitive salary (RM80,000 – RM130,000, based on experience and certification)
- Full support for certification renewals and advanced training (e.g., OSCE, CRTO, GXPN)
- Flexible working hours and hybrid work model
- Opportunities to lead high-impact client engagements and shape the security offering
- Sponsorship for CREST membership and international accreditations
Application Process
We take quality seriously. Shortlisted candidates will undergo:
- Technical screening (skills verification)
- Practical penetration testing challenge (scoped lab environment)
- Interview Head of Security
Note: All candidates must pass a background check. Prior consultancy or MSSP experience is advantageous.
Security Analyst
Posted today
Job Viewed
Job Description
Main Responsibilities
- Security Monitoring and Incident Management o Working with external SOC providers in managing SIEM logs, cyber alerts, endpoint protections, email security and threat intelligence feeds. Investigate, triage and take necessary proactive measures including timely escalate to management.
- Threat and Vulnerability Management
- Conduct periodic vulnerability assessment of the IT application systems, system management, network and communication infrastructure, and security infrastructure.
- Analyse the logs of the various systems including firewalls, IDS/IPS, etc for initiating preventive and/or corrective measures.
- Continuously monitor, measure, and report security posture to management.
- Identity and Access Management (IAM)
- Ensure that processes exist for the creation, modification, access privileges and deletion of user id.
- Review access rights regularly to enforce least privilege for both users and system administrators, and segregation of duty within IT.
- Review Privileged access activities.
- User access management
- Security Technology Administration
- Work with external consultants or IT security service providers as appropriate for security audit and solution.
- Maintain and operate security tools such as firewalls, EDR, WAF, Proxy, email security, DLP, IPS, VPN, NAC, etc.
- Perform health checks, updates and configuration reviews of security systems.
- Recommend and implement security solutions to enhance resilience and compliance.
- Security Baseline and Hardening
- Enforce security configuration baselines for servers, network & security devices, databases, endpoints, and cloud resources.
- Review and update baseline configurations periodically.
- Security Compliance and Audit Support
- Support security-related audits and regulatory activities.
- Prepare documentation and evidence to demonstrate compliance with RMiT and internal policies.
- Assist in drafting and updating security SOPs and guidelines.
- Manage the development and implementation of IT security SOP, standards, guidelines, and procedures to ensure on-going maintenance of security.
- Security Awareness
- Supporting initiatives in promoting security best practices.
- To perform other duties assigned by management.
Job Requirement
At least 5 years' experience in IT security infrastructure (support and operations).
Additional Notes
- Qualification Minimum a Bachelor's Degree in IT, Computer Science, Cybersecurity or equivalent. Certification
- Must possess relevant certification in Security domain, with preference on CompTIA Security+, CEH, CISM and CISSP.
- ITIL foundation will be added advantage.
Job Type: Full-time
Pay: RM8, RM12,000.00 per month
Benefits:
- Health insurance
- Opportunities for promotion
- Professional development
Security Analyst
Posted today
Job Viewed
Job Description
Responsibilities
- Should have experience of 5+ years in SOC.
- Ensure the Customer's operational and production environment remains secure at all the times and any threats are raised and addressed in a timely manner.
- Critical incident handling & closure.
- Escalation management and handling escalations from L1 Analysts.
- Proactive discovery of threats based on MITRE ATT&CK framework.
- Deep investigation and analysis of critical security incidents.
- Post breach incident analysis reporting.
- Review the weekly and monthly reports.
- New use case creation and implement in cloud-native SIEM (Security Information and Event Management).
- Assist with customer onboarding (such as use case development, identifying data sources, configuring data connectors etc)
Requirement
• Experience of working in large scale, public cloud environments and with using cloud native security monitoring tools such as: -
o Microsoft Sentinel
o Microsoft 365 Defender
o Microsoft Defender for Cloud
o Endpoint Detection & Response (EDR) tools such as Crowdstrike, Microsoft Defender for Endpoint.
o Firewalls and network security tools such as Palo Alto, Fortinet, Juniper, and Cisco.
o Web Application Firewall (WAF) tools such as Cloudflare, Akamai and Azure WAF.
o Email Security tools such as Proofpoint, Mimecast and Microsoft Defender for Office
o Data Loss Prevention (DLP) tools such as Microsoft Purview, McAfee and Symantec
• Nice to have skills/experience includes:
o Google Cloud Platform (GCP) security tools such as Chronicle and Security Command Centre
o Amazon Web Services (AWS) security tools such as Security Hub, AWS Guard Duty, AWS Macie, AWS Config and AWS CloudTrail
o Experience of analysing malware and email headers, and has skills in network security, intrusion detection and prevention systems; operating systems; risk identification and analysis; threat identification and analysis and log analysis.
o Experience of security controls, such as network access controls; identity, authentication, and access management controls (IAAM); and intrusion detection and prevention controls.
Security Analyst
Posted today
Job Viewed
Job Description
Security Analyst | Insurance Industry | Contract
We are seeking a
Security Analyst
to support our insurance client in strengthening their cybersecurity posture. This role involves monitoring and responding to security events, performing risk and vulnerability assessments, and ensuring compliance with industry standards.
Job Responsibilities:
- Strategic Oversight: Develop and implement security operations strategies to protect the organization's IT infrastructure and data.
- Threat Detection and Response: Lead efforts to monitor, detect, and respond to security incidents and threats, conducting thorough investigations and root cause analyses.
- Vulnerability Management: Conduct regular vulnerability assessments/penetration test activities, ensuring timely reporting for remediation of identified security weaknesses.
- Security Tools Management: Manage and optimize security tools and technologies, such as SIEM, intrusion detection/prevention systems, and endpoint protection solutions.
- Policy Development: Contribute to the development and enforcement of security policies, procedures, and standards, ensuring alignment with industry regulations and best practices.
- Mentorship and Leadership: Mentor and provide guidance to junior security staff, fostering a culture of continuous learning and improvement.
- Collaboration: Work closely with IT, network, and application teams to integrate security into all aspects of the organization's technology environment.
- Continuous Improvement: Stay informed about emerging security threats and trends, recommending enhancements to improve the organization's security posture.
- Cloud Management: Deploy, manage, and monitor cloud-based infrastructure. Implement and manage cloud security measures to protect data and systems.
- Automation: Develop and implement automation scripts and tools to improve system efficiency and reduce manual intervention.
- Global Collaboration: Work with global teams to manage and deliver globally managed services. Coordinate with global teams to ensure alignment and consistency in service delivery.
- Any other duties when deemed necessary. Completing projects on various issues when needed
Requirements:
- Bachelor's degree in computer science, information technology, cybersecurity, or a related field.
- 3-6 years of experience in information security, network security, or a related role in senior-level experience.
- Extensive knowledge of security principles, practices, and technologies.
- Experience with advanced security monitoring and incident response tools and technologies.
- Proficiency in scripting or programming languages (e.g., Python, PowerShell) for automation tasks.
- Knowledge and experience working within cloud enviroment/platform e.g. AWS, Azure, etc.
- Experience with cloud platforms and cloud-based services.
- Proficiency in automation scripting & toolings
- Familiarity with cloud security and security frameworks (e.g., NIST, ISO
- Strong analytical and problem-solving skills.
- Excellent communication and interpersonal skills, with the ability to lead and collaborate effectively with cross-functional teams.
- Ability to work independently and manage multiple projects simultaneously.
- Certifications in security or related areas (e.g., Certified Information Systems Security Professional - CISSP, Certified Information Security Manager - CISM) are a plus.
- This role may require on-call availability and working outside regular hours to respond to security incidents or perform scheduled maintenance.
- The position may involve collaboration with remote teams and vendors to ensure effective security operations and support.
Security Analyst
Posted today
Job Viewed
Job Description
Strategic Oversight: Develop and implement security operations strategies to protect the organization's IT infrastructure and data.
Threat Detection and Response: Lead efforts to monitor, detect, and respond to security incidents and threats, conducting thorough investigations and root cause analyses.
Vulnerability Management: Conduct regular vulnerability assessments/penetration test activities, ensuring timely reporting for remediation of identified security weaknesses.
Security Tools Management: Manage and optimize security tools and technologies, such as SIEM, intrusion detection/prevention systems, and endpoint protection solutions.
Policy Development: Contribute to the development and enforcement of security policies, procedures, and standards, ensuring alignment with industry regulations and best practices.
Mentorship and Leadership: Mentor and provide guidance to junior security staff, fostering a culture of continuous learning and improvement.
Collaboration: Work closely with IT, network, and application teams to integrate security into all aspects of the organization's technology environment.
Continuous Improvement: Stay informed about emerging security threats and trends, recommending enhancements to improve the organization's security posture.
Cloud Management: Deploy, manage, and monitor cloud-based infrastructure. Implement and manage cloud security measures to protect data and systems.
Automation: Develop and implement automation scripts and tools to improve
system efficiency and reduce manual intervention.
- Global Collaboration: Work with global teams to manage and deliver globally
managed services. Coordinate with global teams to ensure alignment and
consistency in service delivery.
Any other duties when deemed necessary. Completing projects on various issues when needed
Bachelor's degree in computer science, information technology, cybersecurity, or a related field.
5+ years of experience in information security, network security, or a related role in senior-level experience.
Extensive knowledge of security principles, practices, and technologies.
Experience with advanced security monitoring and incident response tools and technologies.
Proficiency in scripting or programming languages (e.g., Python, PowerShell) for automation tasks.
Knowledge and experience working within cloud enviroment/platform e.g. AWS, Azure, etc.
Experience with cloud platforms and cloud-based services.
Proficiency in automation scripting & toolings
Familiarity with cloud security and security frameworks (e.g., NIST, ISO
Strong analytical and problem-solving skills.
Excellent communication and interpersonal skills, with the ability to lead and
collaborate effectively with cross-functional teams.
Ability to work independently and manage multiple projects simultaneously.
Certifications in security or related areas (e.g., Certified Information Systems
Security Professional - CISSP, Certified Information Security Manager - CISM) are a plus.
- This role may require on-call availability and working outside regular hours to
respond to security incidents or perform scheduled maintenance.
- The position may involve collaboration with remote teams and vendors to ensure effective security operations and support.
Job Types: Full-time, Contract
Contract length: 12 months
Pay: RM1.00 - RM2.00 per month
Work Location: In person
Be The First To Know
About the latest Security analyst Jobs in Malaysia !
Security Analyst
Posted today
Job Viewed
Job Description
The IT Security Analyst is responsible for administering, operating and enforcing identity and access management (IAM) controls across IT infrastructure, applications and cloud environments.
This role ensures that user access is provisioned, modified/updated and deprovisioned in a secure, compliance and timely manner aligning with BNM RMiT, internal policies and best practices.
The position requires strong technical skills in IAM systems, directory services, privileged access management, multi-factor authentication (MFA), and access review process. This role will also required to perform basic security infrastructure support and administration including vulnerability management and security incident management.
MAIN RESPONSIBILITIES
- Identity and Access Management (IAM)
- Ensure and enforce processes for the creation, modification, access privileges and deletion of user id and system IDs.
- Timely review access rights regularly to enforce least privilege for both users and system administrators, and segregation of duty within IT.
- Maintain least privilege and segregation of duties principles for access requests.
- Timely review Privileged access activities.
- Timely perform User access management (UAM) review for all applications and systems to recertify access with system owners according to SOP.
- Privileged Access Management (PAM)
- Administer and monitor privileged accounts using PAM tools.
- Conduct periodic reviews of privileged account activities and enforce strong authentication controls.
- Authentication and Authorisation Controls o Support deployment and operation of MFA, SSO and ID management solutions.
- Conduct periodic reviews of user access for directory services – e.g. Active Directory (AD), Azure AD.
- Security Monitoring and Incident Management Working with external SOC providers in managing SIEM logs, cyber alerts, endpoint protections, email security and threat intelligence feeds. Security Technology Administration
- Work with external consultants or IT security service providers as appropriate for security audit and solution.
- Provide basic support on security tools such as firewalls, EDR, Proxy, email security, DLP, VPN, NAC, etc.
- Perform health checks, updates, and configuration reviews of security systems.
- Security Compliance and Audit Support
- Ensure full compliance of identity and access management with RMiT, audit and internal policies.
- Support security-related audits and regulatory activities.
- Assist in drafting and updating security SOPs and guidelines.
- Manage the development and implementation of IT security SOP, standards, guidelines, and procedures to ensure on-going maintenance of security, particularly in identity lifecycle management.
- Security Awareness
- Supporting initiatives in promoting security best practices.
- To perform other duties assigned by management.
Job Requirement
- At least 5 years' experience in Security IAM with some knowledge in supporting Security operations.
- Working experience in Information Security or IAM governance is preferred
Additional Notes
- Qualification Minimum a bachelor's degree in IT, Computer Science, Cybersecurity or equivalent.
Certification
- Must possess relevant certification in Security domain, with preference on CompTIA Security+, CISM, CISSP, or in Identity Management.
- ITIL foundation will be added advantage.
- Cloud security – such as key management, IAM, access control
Job Type: Contract
Contract length: 12 months
Pay: RM10, RM12,000.00 per month
Benefits:
- Health insurance
- Opportunities for promotion
- Professional development
Work Location: In person
Security Analyst
Posted today
Job Viewed
Job Description
Job Description:
Security Analyst (Japanese Speaker)
About DXC Technology:
We are a Fortune 500 global IT services leader. Our more than 130,000 people in 70-plus countries are entrusted by our customers to deliver what matters most. We use the power of technology to deliver mission critical IT services across the Enterprise Technology Stack to drive business impact. DXC is an employer of choice with strong values, and fosters a culture of inclusion, belonging and corporate citizenship. We are DXC.
Responsibilities:
- Monitor and report on all security related alerts, incidents and breaches and provide assistance in the investigation and resolution of security incidents, when required
- Investigate phishing/spam emails reported by users.
- Produce monthly security reports for the clients.
- Manage APT systems and ensure security signatures are up to date.
- Coordinate with relevant IT personnel to ensure that all security incidents are resolved in timely manner.
- Manage all customer interactions in a professional manner with a strong emphasis on customer satisfaction
- Utilize internal guidelines to properly fulfill client requests and resolve incidents received via e-mail or internal ticketing systems in a timely and detail-oriented manner.
- Analyze and assess security incidents and escalate to appropriate internal teams for additional assistance.
- Assist customers to effectively implement corporate security policies on existing information system.
- Any other related work as requested by the Lead / Head to support achievement of the department's strategies and objectives.
Requirements:
- Bachelor's degree in a computer science or equivalent.
- Fresh graduate with Cyber Security major is encourage to apply.
- Basic understanding of IT Security field.
- Excellent communication skills in English and Japanese to support Japanese speaking clients.
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We're committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.
Security Analyst
Posted today
Job Viewed
Job Description
Qualifications
- Bachelor or Master's Degree in Computer Science, Information Systems, or equivalent experience.
- Minimum 3 years of experience in the Cyber Security & Infrastructure fields
- Security tool implementation and operational experience/application security technology experience
- CISSP - Certified Information Systems Security Professional Certifications or other relevant professional certifications.
Work Conditions
- Work on daytime shift. However, when security incidents occur, he/she might be required to work on holidays or at night.
- Communicate via email, MS Teams, web meetings, etc.
- Required oversea business trips if necessary (KL / Ipoh / SG)
Job Description
- Senior Specialist, Information Security Incident Response Lead, responsible for CSIRT operations in cyber security.
- This position is engaged and responsible for SecOps (security operations), security incident handling, SOC response, etc.
- Be responsible for handling overall SecOps in cooperation with partner IT vendors and related internal departments as a member of the incident handling team within CSIRT.
- Work with partner IT vendors that maintain information security infrastructure tools implemented in our company.
- Monitor and continuously assess the IT security aspects and impact.
- Knowledge and strong understanding on CIS CSC to continuously improve IT security
- Reporting to Regional IT GM, Mgrs and the head of Global Security Team.
Job Type: Full-time
Pay: RM8, RM12,000.00 per month
Benefits:
- Opportunities for promotion
Work Location: In person