86 Security Incidents jobs in Malaysia

Threat and Vulnerability Management Engineer

Petaling Jaya, Selangor DXC Technology

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Threat and Vulnerability Management Engineer

Join to apply for the Threat and Vulnerability Management Engineer role at DXC Technology

Threat and Vulnerability Management Engineer

1 day ago Be among the first 25 applicants

Join to apply for the Threat and Vulnerability Management Engineer role at DXC Technology

Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.

Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.

Job Summary

We are looking for a Security Engineer with a strong background in leading and delivering enterprise-scale security projects, aligned with DXC Security’s core service offerings . The role demands architectural depth and hands-on implementation knowledge across various security technologies.

As a member of the Malaysia Threat and Vulnerability Management team, you will provide high-impact Infrastructure Security Advisory Services to DXC clients and internal stakeholders, delivering secure and scalable solutions that meet enterprise risk, compliance, and business objectives.

Key Responsibilities

  • Deliver technical consulting services to both external customers and internal project teams
  • Lead or support the design, implementation, and optimization of security technologies aligned with DXC’s portfolio
  • Serve as a trusted advisor to clients, maintaining strong, consultative relationships focused on long-term outcomes
  • Stay current with emerging security trends, technologies, and threat landscapes to provide forward-thinking guidance
  • Contribute to the evolution of DXC Security’s solution portfolio with technical insights and reusable methodologies
  • Influence architectural direction and technical strategies for client environments and DXC solutions
  • Support business development activities through opportunity identification and proposal input
  • Ensure high-quality service delivery that supports revenue growth and customer satisfaction metrics

Role Expectations

Security Consultant (Senior Individual Contributor)

  • Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity
  • Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence
  • Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations
  • Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value
  • Provides mentorship and technical leadership within project teams, though not in a formal people management role
  • Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance
  • Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance
  • Represents DXC Security in customer engagements as a subject matter expert and technical authority

Essential Requirements

Technical Skills and Experience Required:

  • 3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio
  • Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments

Experience in at least 2 of the following technologies is required:

Tenable VM (via Vulcan Platform)

  • Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle management
  • Risk-based prioritization and remediation orchestration
  • Integration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA tracking
  • Custom dashboards and compliance reporting

Armis

  • Deployment for agentless visibility into unmanaged, IoT, and OT assets
  • Integration with SIEM and ITSM platforms
  • Risk scoring, threat detection, and segmentation recommendations
  • Real-time alerting and policy enforcement

ITSM Integration

  • Workflow automation for vulnerability triage and remediation
  • Closed-loop feedback between detection and resolution
  • Experience with ServiceNow and similar platforms

Check Point

Palo Alto

Blue Coat

Fortinet

FireEye

AV Solutions (e.g., Symantec, McAfee)

DLP

Advantageous

  • Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis)
  • Experience in regulated industries or environments with stringent compliance requirements

Additional Information

  • Travel: Required for client site visits, project implementations, or stakeholder engagements

Learn more about DXC's Security team - Security

Instagram: DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Engineering and Information Technology
  • Industries IT Services and IT Consulting

Referrals increase your chances of interviewing at DXC Technology by 2x

Sign in to set job alerts for “Management Engineer” roles.

Bukit Raja, Selangor, Malaysia 3 days ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Project Engineer (Project Management and Development)

Petaling Jaya, Selangor, Malaysia 2 months ago

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Bukit Raja, Selangor, Malaysia 1 week ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 6 days ago

Petaling Jaya, Selangor, Malaysia 4 days ago

Federal Territory of Kuala Lumpur, Malaysia 5 days ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Bandar Baru Bangi, Selangor, Malaysia 3 weeks ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

ENGINEER - ENGINEERING, CONTROL AND INSTRUMENTATION

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 6 months ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Threat and Vulnerability Management Engineer

Petaling Jaya, Selangor DXC Technology

Posted today

Job Viewed

Tap Again To Close

Job Description

Threat and Vulnerability Management Engineer

Join to apply for the

Threat and Vulnerability Management Engineer

role at

DXC Technology Threat and Vulnerability Management Engineer

1 day ago Be among the first 25 applicants Join to apply for the

Threat and Vulnerability Management Engineer

role at

DXC Technology Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates. Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.

Job Summary

We are looking for a

Security Engineer

with a strong background in leading and delivering enterprise-scale security projects, aligned with

DXC Security’s core service offerings . The role demands architectural depth and hands-on implementation knowledge across various security technologies.

As a member of the Malaysia

Threat and Vulnerability Management

team, you will provide high-impact

Infrastructure Security Advisory Services

to DXC clients and internal stakeholders, delivering secure and scalable solutions that meet enterprise risk, compliance, and business objectives.

Key Responsibilities

Deliver technical consulting services to both external customers and internal project teams Lead or support the design, implementation, and optimization of security technologies aligned with DXC’s portfolio Serve as a trusted advisor to clients, maintaining strong, consultative relationships focused on long-term outcomes Stay current with emerging security trends, technologies, and threat landscapes to provide forward-thinking guidance Contribute to the evolution of DXC Security’s solution portfolio with technical insights and reusable methodologies Influence architectural direction and technical strategies for client environments and DXC solutions Support business development activities through opportunity identification and proposal input Ensure high-quality service delivery that supports revenue growth and customer satisfaction metrics

Role Expectations

Security Consultant (Senior Individual Contributor)

Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value Provides mentorship and technical leadership within project teams, though not in a formal people management role Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance Represents DXC Security in customer engagements as a subject matter expert and technical authority

Essential Requirements

Technical Skills and Experience Required:

3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments

Experience in at least 2 of the following technologies is required:

Tenable VM (via Vulcan Platform)

Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle management Risk-based prioritization and remediation orchestration Integration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA tracking Custom dashboards and compliance reporting

Armis

Deployment for agentless visibility into unmanaged, IoT, and OT assets Integration with SIEM and ITSM platforms Risk scoring, threat detection, and segmentation recommendations Real-time alerting and policy enforcement

ITSM Integration

Workflow automation for vulnerability triage and remediation Closed-loop feedback between detection and resolution Experience with ServiceNow and similar platforms

Check Point

Palo Alto

Blue Coat

Fortinet

FireEye

AV Solutions (e.g., Symantec, McAfee)

DLP

Advantageous

Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis) Experience in regulated industries or environments with stringent compliance requirements

Additional Information

Travel: Required for client site visits, project implementations, or stakeholder engagements

Learn more about DXC's Security team - Security

Instagram: DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here . Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Engineering and Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at DXC Technology by 2x Sign in to set job alerts for “Management Engineer” roles.

Bukit Raja, Selangor, Malaysia 3 days ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 1 month ago Project Engineer (Project Management and Development)

Petaling Jaya, Selangor, Malaysia 2 months ago Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Bukit Raja, Selangor, Malaysia 1 week ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 6 days ago Petaling Jaya, Selangor, Malaysia 4 days ago Federal Territory of Kuala Lumpur, Malaysia 5 days ago Petaling Jaya, Selangor, Malaysia 1 month ago Bandar Baru Bangi, Selangor, Malaysia 3 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago ENGINEER - ENGINEERING, CONTROL AND INSTRUMENTATION

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 6 months ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst L2

Kuala Lumpur, Kuala Lumpur Logicalis Group (DE)

Posted today

Job Viewed

Tap Again To Close

Job Description

Security Analyst L2 in Kuala Lumpur at Logicalis

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.

Accountabilities:

  • Work in 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
  • Provide detailed remediation recommendation to customers for the incidents within agreed SLAs, and if required assist them during remediation implementation.
  • Execute SOC playbooks, knowledge base to minimize the security incident impact and perform detailed investigation on the infected assets.
  • Escalate critical incidents to 3rd level support team, for further analysis & investigations, and demonstrate excellent collaboration skills for timely resolution to minimize impact to customers.
  • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
  • Prepare SOC monthly reports, which includes customization based on business requirements and present them to customers during monthly meetings, highlighting risks and mitigation plans.
  • Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks, relevant and sufficient knowledge base.

The Individual and their Experience:

  • Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor’s degree in Computer Science/IT/Information security.
  • Excellent hands-on experience on incident analysis using SIEM platforms such as Microsoft Sentinel, IBM QRadar.
  • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if Microsoft Defender, CrowdStrike.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with a proven Unix (Solaris, Linux, BSD) experience.
  • Knowledge on any shell scripting language, and to apply them to automate mundane operations tasks.
  • Candidate should have at least one cybersecurity industry certification such as CEH, CHFI.
  • Good understanding of basic network concepts and advantage if exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards

If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Kuala Lumpur, Kuala Lumpur Dentsu Aegis Network

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

This is an exciting time to join Dentsu Aegis Network (DAN) as we focus on becoming a 100% digital economy business by 2020 through content, media and commerce. We are well placed to build capability, scale and sustainable growth as a high performance business. Our strategy is driven by our unique culture with one vision (to innovate the way brands are built), one set of values and a unique operating model which drives collaboration, client focus and attention. The Global Technology operating model is based around a set of principles and a clear alignment to the Business strategy. Those core themes are formed around scalability, compliant and agile solutions and propagating a significant move to cloud.

Job Description:

Role purpose

The purpose of this role is to work as part of the cyber security team to implement an organised approach to addressing and managing security breaches or cyberattacks. Performing investigations and providing reports with root cause analysis, which will be used as strategic programs of work to improve the overall security assurance of DAN. With a goal to limit damage and reduce recovery time and costs.

Key accountabilities

• Perform daily, weekly, monthly maintenance and management tasks.

• Perform response analytics during and after an incident, determine root cause and proper mitigation of cyber security events.

• Engage with other teams to mitigate cyber security threats, improve processes, and improve security posture, analysing threat intelligence for relevancy, impact, and exposure.

• Conduct log analysis utilising SIEM, IPS, Firewall, Proxy, AV and other to determine the extent of a compromise. • Monitor and manage security tool consoles, ensuring all alerts are responded to, escalating incidents quickly

• Perform risk and vulnerability assessments

• Track cyber threat actors/campaigns based from technical analysis and open source intelligence.

• Maintain current knowledge of tools, techniques, and procedures of attackers

• Keep up to date on current Advanced Persistent Threats and mitigation techniques.

• Conduct research pertaining into cyber threats, campaigns, vulnerabilities, and technological advances in combating unauthorised access.

• Investigate alerts, anomalies, errors, intrusions, and malware for evidence of compromise.

• Take ownership of cyber security call queues ensuring tickets are closed based on defined SLAs.

Professional skills

• Must possess excellent analytical, troubleshooting, and problem-solving skills. • Possess a high level of capabilities in research and data collation • Excellent organization and time management skills. • Able to handle multiple deadlines, and to effectively perform during high pressure or stressful situations. • Good presentation skills both verbal and written on both technical and non-technical information. With a strong eye for detail • Very good organisational and communication skills, with the ability to build relationships with peers. • Experience producing security documentation and other technical analysis reports • Experience working in a team-oriented, collaborative environment.

Key Experiences

• Demonstrates a good knowledge and understanding of cyber security attack techniques and threats, with a strong technical background. • Ability to quickly identify indication of compromise and take appropriate action to mitigate or eradicate.

Location:

Kuala Lumpur

Brand:

Bcoe

Time Type:

Full time

Contract Type:

Permanent #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Senior Security Analyst

Negeri Sembilan, Negeri Sembilan LOGICALIS SINGAPORE PTE. LTD.

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Why choose Logicalis?

As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.

Job Responsibilities:

Detection Engineering

  • Design, develop, and deploy high-fidelity detection rules in SIEM (Splunk, Microsoft Sentinel, Devo, QRadar, EDR, etc.).
  • Create custom use cases to detect MITRE TTPs aligned with real-world threats and red team activities.
  • Conduct detection gap analysis, tune alerting mechanisms, and eliminate false positives at the MSS customer environment
  • Perform regular fine-tuning and optimization of detection rules, correlation logic, and alert thresholds across SIEM, EDR, and other security platforms to enhance detection accuracy and reduce false positives.
  • Continuously assess detection efficacy based on incident feedback and threat landscape evolution, implementing improvements accordingly.
  • Collaborate with red/purple teams to validate detection logic and build threat-informed defenses.
  • Regularly review, update, and enhance detection logic to ensure alignment with the latest threat intelligence, adversary TTPs, and evolving attack techniques.
  • Maintain relevancy and effectiveness of security detections by incorporating insights from threat hunts, incident response cases, red team exercises, and industry best practices.

Threat Hunting and Threat Intel:

  • Proactively hunt for advanced threats across on-prem and cloud environments using telemetry from SIEM, EDR, NDR, and threat intelligence.
  • Develop hypotheses based on TTPs, threat intelligence feeds, and incident trends.
  • Use frameworks like MITRE ATT&CK and Diamond Model to structure hunting campaigns.
  • Document hunt procedures and outcomes to support knowledge sharing and continuous improvement.
  • Map threat actor TTPs to frameworks such as MITRE ATT&CK to support proactive defense strategies and inform detection engineering efforts.
  • Provide actionable threat intelligence to SOC, detection engineering, and IR teams to inform custom detection rule development, prioritization of hunts, and incident scoping
  • Contribute to the threat intelligence lifecycle, including direction, collection, processing, analysis, dissemination, and feedback.
  • Ingest, analyze, and operationalize threat intelligence from internal sources, commercial feeds, and open-source intelligence (OSINT) to enrich detection logic, threat hunting hypotheses, and incident investigations
  • Collaborate with internal and commercial threat intelligence teams to contextualize IOCs and TTPs for targeted and industry-specific threats.
  • Maintain up-to-date threat intelligence repositories and contribute to the continuous improvement of threat intel processes and playbooks

Incident Response:

  • Lead incident response lifecycle (detection, triage, containment, eradication, recovery).
  • Handle security incidents tickets escalated by Level II team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans
  • Conduct/support forensic analysis of endpoints, logs, and network traffic to determine root cause and impact.
  • Coordinate with internal stakeholders and external partners during critical incidents.
  • Develop and maintain playbooks, runbooks, and incident reports.
  • Digital Forensics and Incident Response (DFIR) experience is a strong added advantage, enabling deeper investigations and root cause analysis.

Collaboration & Mentorship :

  • Mentor and support L1/L2 SOC analysts in investigations, tool usage, and processes.
  • Participate in tabletop exercises and red/purple team assessments.
  • Lead and conduct regular customer meetings to review SOC activities, including security posture, key metrics, and ongoing initiatives.
  • Prepare and deliver detailed briefings on priority incidents, RCA, ensuring timely communication of root cause, impact analysis, mitigation steps, and next actions.
  • Act as a primary point of contact for Incident escalations and maintain consistent, professional engagement with client stakeholders.
  • Coordinate with cross-functional teams including Engineering, Development, Red Team, and Risk/Compliance.
  • Identify gaps in existing SOC process and work with team members or other departments to create, modify standard operating procedures, to automate any mundane daily operational activities, ensuring Ops are run efficiently.

Requirements:

  • Candidate should have at least 8-10 years of working experience in SOC and MSS environments,
  • Bachelor's degree in computer engineering, Computer Science, Cyber Security, Information Security, or other equivalents.
  • Excellent hands-on experience in implementations, incident analysis of Splunk, IBM QRadar, Azure Sentinel SIEM (Security Information and Event Management) & Devo technologies.
  • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if CrowdStrike, Microsoft Defender.
  • Hands on experience on SOAR (Security Orchestration, Automation, and Response) technologies.
  • Experience in malware analysis for Windows and Linux/Mac.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with proven Unix (Solaris, Linux, BSD (Bumi Serpong Damai)) experience.
  • Knowledge of any shell scripting language and applying it to automate mundane operations tasks
  • Knowledge of current cyber threats, attack vectors, vulnerabilities, and threat intelligence feeds.
  • Ability to work effectively in a team environment, collaborate cross-functionally, and mentor junior analysts
  • Candidate should have at least one SANS certification. Preferred if that is GCIH
  • Good understanding of basic network concepts and advantages of exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL (Information Technology Infrastructure Library) standards
  • Lead team of security analysts, develop SOC standard operating procedures and develop Threat Intel feeds such as MISP.

Interested applicants please submit your application with your expected salary and notice period to be considered for the role.

We regret that only shortlisted candidates will be notified.

As part of any recruitment process, we collect and processes personal data relating to job applicants. We are committed to being transparent about how we collect and use that data and to meeting our data protection obligations. By applying to this post and sending us your resume, you agree to the collection, use and/or disclosure of your personal data in the manner as set out in our Data Protection Notice for Job Applicants which can be found

Logicalis is committed to protecting your privacy.

Click below to view the data protection notice.

.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Kuala Lumpur, Kuala Lumpur Dentsu Aegis Network Ltd.

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

This is an exciting time to join Dentsu Aegis Network (DAN) as we focus on becoming a 100% digital economy business by 2020 through content, media and commerce. We are well placed to build capability, scale and sustainable growth as a high performance business. Our strategy is driven by our unique culture with one vision (to innovate the way brands are built), one set of values and a unique operating model which drives collaboration, client focus and attention. The Global Technology operating model is based around a set of principles and a clear alignment to the Business strategy. Those core themes are formed around scalability, compliant and agile solutions and propagating a significant move to cloud.

Job Description:

Role purpose

The purpose of this role is to work as part of the cyber security team to implement an organised approach to addressing and managing security breaches or cyberattacks. Performing investigations and providing reports with root cause analysis, which will be used as strategic programs of work to improve the overall security assurance of DAN. With a goal to limit damage and reduce recovery time and costs.

Key accountabilities

• Perform daily, weekly, monthly maintenance and management tasks.

• Perform response analytics during and after an incident, determine root cause and proper mitigation of cyber security events.

• Engage with other teams to mitigate cyber security threats, improve processes, and improve security posture, analysing threat intelligence for relevancy, impact, and exposure.

• Conduct log analysis utilising SIEM, IPS, Firewall, Proxy, AV and other to determine the extent of a compromise. • Monitor and manage security tool consoles, ensuring all alerts are responded to, escalating incidents quickly

• Perform risk and vulnerability assessments

• Track cyber threat actors/campaigns based from technical analysis and open source intelligence.

• Maintain current knowledge of tools, techniques, and procedures of attackers

• Keep up to date on current Advanced Persistent Threats and mitigation techniques.

• Conduct research pertaining into cyber threats, campaigns, vulnerabilities, and technological advances in combating unauthorised access.

• Investigate alerts, anomalies, errors, intrusions, and malware for evidence of compromise.

• Take ownership of cyber security call queues ensuring tickets are closed based on defined SLAs.

Professional skills

• Must possess excellent analytical, troubleshooting, and problem-solving skills. • Possess a high level of capabilities in research and data collation • Excellent organization and time management skills. • Able to handle multiple deadlines, and to effectively perform during high pressure or stressful situations. • Good presentation skills both verbal and written on both technical and non-technical information. With a strong eye for detail • Very good organisational and communication skills, with the ability to build relationships with peers. • Experience producing security documentation and other technical analysis reports • Experience working in a team-oriented, collaborative environment.

Key Experiences

• Demonstrates a good knowledge and understanding of cyber security attack techniques and threats, with a strong technical background. • Ability to quickly identify indication of compromise and take appropriate action to mitigate or eradicate.

Location:

Kuala Lumpur

Brand:

Bcoe

Time Type:

Full time

Contract Type:

Permanent

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst L2

Kuala Lumpur, Kuala Lumpur Logicalis GmbH

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

As Architects of Change , Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.

We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.

Accountabilities:

  • Work in 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
  • Provide detailed remediation recommendation to customers for the incidents within agreed SLAs, and if required assist them during remediation implementation.
  • Execute SOC playbooks, knowledge base to minimize the security incident impact and perform detailed investigation on the infected assets.
  • Escalate critical incidents to 3rd level support team, for further analysis & investigations, and demonstrate excellent collaboration skills for timely resolution to minimize impact to customers.
  • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
  • Prepare SOC monthly reports, which includes customization based on business requirements and present them to customers during monthly meetings, highlighting risks and mitigation plans.
  • Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks, relevant and sufficient knowledge base.

The Individual and their Experience:

  • Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor’s degree in Computer Science/IT/Information security.
  • Excellent hands-on experience on incident analysis using SIEM platforms such as Microsoft Sentinel, IBM QRadar.
  • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if Microsoft Defender, CrowdStrike.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with a proven Unix (Solaris, Linux, BSD) experience.
  • Knowledge on any shell scripting language, and to apply them to automate mundane operations tasks.
  • Candidate should have at least one cybersecurity industry certification such as CEH, CHFI.
  • Good understanding of basic network concepts and advantage if exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards
About Us

Logicalis is an international solutions provider of digital services currently accelerating the digital transformation of its 10,000 customers around the world.

Through a globally connected network of specialist hubs, sector-leading experts (in education, financial services, government, healthcare, manufacturing, professional services, retail and telecommunications) and strategic partnerships (including Cisco, Microsoft, HPE, IBM, NetApp, Oracle, ServiceNow, and VMware), Logicalis has more than 6,500 employees focused on understanding customer priorities and enhancing their experience.

AsArchitects of ChangeTM, Logicalis’ focus is to design, support, and execute customers’ digital transformation by bringing together their vision with its technological expertise and industry insights. The company, through its deep knowledge in key IT industry drivers such as Security, Cloud, Data Management and IoT, can address customer priorities such as revenue and business growth, operational efficiency, innovation, risk and compliance, data governance and sustainability.

Logicalis Group, with annual revenues of $ 1.5 billion annually, maintains operations in Europe, North America, Latin America, Asia Pacific and Africa and is part of Datatec Group, which is listed on the Johannesburg Stock Exchange (JSE:DTC), with revenues of more than $ 4.1 Billion.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security incidents Jobs in Malaysia !

Security Analyst IV

Kuala Lumpur, Kuala Lumpur TNS Inc.

Posted 7 days ago

Job Viewed

Tap Again To Close

Job Description

An extraordinarily talented group of individuals work together every day to drive TNS' success, from both professional and personal perspectives. Come join the excellence!

Overview

The Network Security Engineer is responsible for the configuration, monitoring, management, and troubleshooting of firewalls. They will act as liaison with local region network engineering and technical support groups to assist in the reviewing, design, and deployment of new services, review existing services, and migration of services/systems. Day-to-day duties will be assigned by monitoring the Remedy ticket queue. All work must be completed following TNS Security policies and payment industry standards, as well as the promotion of security best practices, to enable TNS business operations in a secure environment.

Responsibilities
  • Function as an internal consulting resource on network security issues, specifically firewall technologies such as Next Generation Firewall (NGFW), Unified Threat Management (UTM): Cisco ASA, Fortinet, and Juniper SRX.
  • Implement and manage firewall security policies.
  • Perform daily activities including change control, troubleshooting, configuration, monitoring, and management of firewalls in collaboration with TNS Security/Network engineers and support vendors.
  • Monitor the ticket queue for Firewall Operations trouble tickets, incidents, and change requests.
  • Conduct recurring maintenance activities like device upgrades and patches, focusing on firewalls and perimeter devices.
  • Lead technical projects involving firewall support, including hardware replacements, customer migrations, and new PoP buildouts.
  • Participate in the Network Security on-call rota to ensure timely incident response outside regular hours.
  • Create technical process documentation for departmental use.
  • Provide training and share knowledge with team members and other technical groups.
  • Serve as a key engineer for project delivery in Payments, Financial, and Communications markets.
  • Manage relationships with security partners and internal departments.
  • Ensure compliance with all security requirements and standards.
  • Stay updated on the latest security issues and advancements.
  • Ensure production systems are secure, up-to-date, and vulnerabilities are managed promptly.
  • Maintain operational and technical knowledge of cybersecurity concepts, including SIEM tools.
  • Collaborate with the Security Engineering team on various projects and escalate issues as necessary.
  • Manage IPS/IDS technologies, VPN technologies, and maintain documentation, including architecture diagrams.
  • Some travel may be required for client sites, conferences, and events.
Qualifications
  • Experience with Cisco Identity Services Engine (ISE) policy management.
  • Hands-on experience with routing, networking, and firewall technologies.
  • Experience with multi-context firewalls such as Cisco, Fortigate, and Juniper.
  • Knowledge of TCP/IP routing protocols.
  • Experience troubleshooting ACLs and VPN tunnels.
  • Desired experience with remote access VPNs and problem resolution.
  • Certifications from Cisco, Fortigate, Juniper, or similar organizations.
  • Experience managing complex technical projects, including hardware refreshes and migrations.

If you are passionate about technology and personal growth, discover what TNS has to offer!

TNS is an equal opportunity employer. We evaluate qualified applicants without regard to race, color, religion, gender, national origin, age, sexual orientation, gender identity or expression, veteran status, disability, or any other protected characteristic.

With employees in 21 countries, TNS is a leading global provider of data communication and interoperability services to various industries, including retail, banking, payment processing, telecommunications, and financial markets.

Our services extend to over 60 countries, delivering mission-critical solutions to many Fortune 500 companies. TNS employees are our most valuable asset, and we offer competitive salaries, benefits, and opportunities for relocation across our global operations.

Please review our job openings and submit your application. You may apply for multiple roles, and our system will keep you informed of your application status.

What’s the next step in your career? Find out today! #J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Shah Alam, Selangor Razer

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric #LifeAtRazer experience that will put you in an accelerated growth, both personally and professionally.

Job Responsibilities : We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.

This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.

Essential Duties and Responsibilities

  • Conduct vulnerability assessments and provide actionable remediation plans
  • Perform penetration testing on networks, applications, and infrastructure.
  • Review and optimize firewall rules and configurations.
  • Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
  • Investigate and respond to security incidents in a timely manner.
  • Review and validate bug bounty submissions, coordinating with researchers and internal teams.
  • Collaborate with IT, DevOps, and compliance teams to implement security best practices.
  • Collaborate closely with business units to provide expert support and guidance on information security matters.
  • Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
  • Perform ad hoc tasks that are assigned by team leader or team manager.

Requirements

  • Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
  • At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
  • Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
  • For lead roles, experience in people management, ability to lead and influence people is expected.
  • Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
  • Strong understanding of network protocols, web application security, and threat detection.
  • Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
  • Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
  • Applicants must be willing to work in ICITY SHAH ALAM.

Are you game?

Pre-Requisites :

Are you game?

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Shah Alam, Selangor Razer Inc.

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Join to apply for the Information Security Analyst role at Razer Inc.

Join to apply for the Information Security Analyst role at Razer Inc.

Get AI-powered advice on this job and more exclusive features.

Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric experience that will put you in an accelerated growth, both personally and professionally.

Job Responsibilities

We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.

This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.

Essential Duties And Responsibilities

  • Conduct vulnerability assessments and provide actionable remediation plans
  • Perform penetration testing on networks, applications, and infrastructure.
  • Review and optimize firewall rules and configurations.
  • Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
  • Investigate and respond to security incidents in a timely manner.
  • Review and validate bug bounty submissions, coordinating with researchers and internal teams.
  • Collaborate with IT, DevOps, and compliance teams to implement security best practices.
  • Collaborate closely with business units to provide expert support and guidance on information security matters.
  • Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
  • Perform ad hoc tasks that are assigned by team leader or team manager.


Requirements

  • Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
  • At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
  • Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
  • For lead roles, experience in people management, ability to lead and influence people is expected.
  • Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
  • Strong understanding of network protocols, web application security, and threat detection.
  • Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
  • Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
  • Applicants must be willing to work in ICITY SHAH ALAM.


Are you game?

Pre-Requisites

Are you game?

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Information Technology
  • Industries Computers and Electronics Manufacturing

Referrals increase your chances of interviewing at Razer Inc. by 2x

Get notified about new Information Security Analyst jobs in Shah Alam, Selangor, Malaysia .

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago

Petaling Jaya, Selangor, Malaysia 6 days ago

Petaling Jaya, Selangor, Malaysia 21 hours ago

(Senior) Cyber Security Consultant & Penetration Tester

WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago

(TRC) Manager - Cyber Response (Petaling Jaya)

Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Federal Territory of Kuala Lumpur, Malaysia 3 days ago

Federal Territory of Kuala Lumpur, Malaysia 4 days ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago

Federal Territory of Kuala Lumpur, Malaysia 2 days ago

WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago

Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago

WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Internship - Network & Information Security Engineer

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago

Federal Territory of Kuala Lumpur, Malaysia 4 days ago

Security Operations & Governance Analyst (1 year Contract)

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago

Cyber Security Analyst (Governance, Risk & Compliance)

Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago

Associate Manager - Security Compliance Analyst

Petaling Jaya, Selangor, Malaysia 1 month ago

Cyber Security (Digital Forensic Analyst) AVP, Data Security Engineer, Group Information Security

Federal Territory of Kuala Lumpur, Malaysia 4 days ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Senior Information Security Engineer (ISE)

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago

Operational Technology (OT) Security Analyst Security Operations Analyst- APAC Blue Team Leader

Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Associate Manager - Security Compliance Analyst

Petaling Jaya, Selangor, Malaysia 2 days ago

Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 year ago

(Senior) Security Engineer, Security Engineering & Threat Intelligence

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Cyber Security Metrics and Behavioural Analyst

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Federal Territory of Kuala Lumpur, Malaysia 4 days ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Petaling Jaya, Selangor, Malaysia 7 months ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Incidents Jobs