121 Threat Detection jobs in Malaysia
Security Engineer, Vulnerability Management
Posted 4 days ago
Job Viewed
Job Description
About Grab and Our Workplace
Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility.
Get to Know the Team
The Vulnerability Management Automation team is dedicated to enhancing the efficiency and accuracy of the Vulnerability Management Program through automation. Our mission is to integrate and streamline various data sources and processes to provide comprehensive vulnerability management.
Get to Know the Role
You will report to the Engineer Manager and be based onsite in Petaling Jaya, Malaysia.
As a backend engineer you will: design and manage automation tools for vulnerability management. Embrace cutting-edge technologies and a culture of knowledge-sharing. Learn scalable software engineering practices and create tools for secure platform operations. Be part of an on-call rotation for infrastructure support and incident management. Grow with us!
The Critical Tasks You Will Perform
- You will design and write with the cutting edge GO language to improve the availability, scalability, latency, and efficiency of the Security platform.
- You will partner with other engineering teams to explore and create new design/architectures geared towards scale and performance.
- You will be involved in code and design reviews to maintain our high development standards.
- You will collaborate closely with the infrastructure team in building and scaling backend services and performing root cause analysis investigations.
- You are responsible for building, and fixing large-scale systems and debugging and modifying production software.
- Write unit, functional, and end-to-end tests.
What Essential Skills You Will Need
- You have a degree in Computer Science, Software Engineering, Information Technology, or related fields.
- You have solid Computer Science fundamentals in algorithms and data structures.
- You have a sound understanding of system performance and security.
- Comfortable to code in at least one high-level programming language - Java, Python, or Golang for scripting and automation.
Life at Grab
We care about your well-being at Grab, here are some of the global benefits we offer:
- We have your back with Term Life Insurance and comprehensive Medical Insurance.
- With GrabFlex, create a benefits package that suits your needs and aspirations.
- Celebrate moments that matter in life with loved ones through Parental and Birthday leave , and give back to your communities through Love-all-Serve-all (LASA) volunteering leave
- We have a confidential Grabber Assistance Programme to guide and uplift you and your loved ones through life's challenges.
- Balancing personal commitments and life's demands are made easier with our FlexWork arrangements such as differentiated hours
What We Stand For At Grab
We are committed to building an inclusive and equitable workplace that provides equal opportunity for Grabbers to grow and perform at their best. We consider all candidates fairly and equally regardless of nationality, ethnicity, race, religion, age, gender, family commitments, physical and mental impairments or disabilities, and other attributes that make them unique.
#J-18808-LjbffrSecurity Engineer, Vulnerability Management
Posted 11 days ago
Job Viewed
Job Description
About Grab and Our Workplace
Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility.
Company Description
About Grab and Our Workplace
Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility.
Job Description
Get to Know the Team
The Vulnerability Management Automation team is dedicated to enhancing the efficiency and accuracy of the Vulnerability Management Program through automation. Our mission is to integrate and streamline various data sources and processes to provide comprehensive vulnerability management.
Get to Know the Role
You will report to the Engineer Manager and be based onsite in Petaling Jaya, Malaysia.
As a backend engineer you will: design and manage automation tools for vulnerability management. Embrace cutting-edge technologies and a culture of knowledge-sharing. Learn scalable software engineering practices and create tools for secure platform operations. Be part of an on-call rotation for infrastructure support and incident management. Grow with us!
The Critical Tasks You Will Perform
- You will design and write with the cutting edge GO language to improve the availability, scalability, latency, and efficiency of the Security platform.
- You will partner with other engineering teams to explore and create new design/architectures geared towards scale and performance.
- You will be involved in code and design reviews to maintain our high development standards.
- You will collaborate closely with the infrastructure team in building and scaling backend services and performing root cause analysis investigations.
- You are responsible for building, and fixing large-scale systems and debugging and modifying production software.
- Write unit, functional, and end-to-end tests.
What Essential Skills You Will Need
- You have a degree in Computer Science, Software Engineering, Information Technology, or related fields.
- You have solid Computer Science fundamentals in algorithms and data structures.
- You have a sound understanding of system performance and security.
- Comfortable to code in at least one high-level programming language - Java, Python, or Golang for scripting and automation.
Life at Grab
We care about your well-being at Grab, here are some of the global benefits we offer:
- We have your back with Term Life Insurance and comprehensive Medical Insurance.
- With GrabFlex, create a benefits package that suits your needs and aspirations.
- Celebrate moments that matter in life with loved ones through Parental and Birthday leave, and give back to your communities through Love-all-Serve-all (LASA) volunteering leave
- We have a confidential Grabber Assistance Programme to guide and uplift you and your loved ones through life's challenges.
- Balancing personal commitments and life's demands are made easier with our FlexWork arrangements such as differentiated hours
We are committed to building an inclusive and equitable workplace that provides equal opportunity for Grabbers to grow and perform at their best. We consider all candidates fairly and equally regardless of nationality, ethnicity, race, religion, age, gender, family commitments, physical and mental impairments or disabilities, and other attributes that make them unique. Seniority level
- Seniority level Associate
- Employment type Full-time
- Industries Technology, Information and Internet
Referrals increase your chances of interviewing at Grab by 2x
Petaling Jaya, Selangor, Malaysia 4 months ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago
Petaling Jaya, Selangor, Malaysia 6 days ago
Petaling Jaya, Selangor, Malaysia 13 hours ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago
Specialist, Cloud Security | TNG DigitalFederal Territory of Kuala Lumpur, Malaysia 2 weeks ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 9 months ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Petaling Jaya, Selangor, Malaysia 20 hours ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrSecurity Engineer, Vulnerability Management
Posted today
Job Viewed
Job Description
Term Life Insurance
and comprehensive
Medical Insurance. With
GrabFlex,
create a benefits package that suits your needs and aspirations. Celebrate moments that matter in life with loved ones through
Parental
and
Birthday leave , and give back to your communities through
Love-all-Serve-all (LASA)
volunteering leave We have a confidential
Grabber Assistance Programme
to guide and uplift you and your loved ones through life's challenges. Balancing personal commitments and life's demands are made easier with our FlexWork arrangements such as differentiated hours What We Stand For At Grab We are committed to building an inclusive and equitable workplace that provides equal opportunity for Grabbers to grow and perform at their best. We consider all candidates fairly and equally regardless of nationality, ethnicity, race, religion, age, gender, family commitments, physical and mental impairments or disabilities, and other attributes that make them unique.
#J-18808-Ljbffr
Security Engineer, Vulnerability Management
Posted today
Job Viewed
Job Description
About Grab and Our Workplace
Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility. Company Description
About Grab and Our Workplace
Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility.
Job Description
Get to Know the Team
The Vulnerability Management Automation team is dedicated to enhancing the efficiency and accuracy of the Vulnerability Management Program through automation. Our mission is to integrate and streamline various data sources and processes to provide comprehensive vulnerability management.
Get to Know the Role
You will report to the Engineer Manager and be based onsite in Petaling Jaya, Malaysia.
As a backend engineer you will: design and manage automation tools for vulnerability management. Embrace cutting-edge technologies and a culture of knowledge-sharing. Learn scalable software engineering practices and create tools for secure platform operations. Be part of an on-call rotation for infrastructure support and incident management. Grow with us!
The Critical Tasks You Will Perform
You will design and write with the cutting edge GO language to improve the availability, scalability, latency, and efficiency of the Security platform. You will partner with other engineering teams to explore and create new design/architectures geared towards scale and performance. You will be involved in code and design reviews to maintain our high development standards. You will collaborate closely with the infrastructure team in building and scaling backend services and performing root cause analysis investigations. You are responsible for building, and fixing large-scale systems and debugging and modifying production software. Write unit, functional, and end-to-end tests.
Qualifications
What Essential Skills You Will Need
You have a degree in Computer Science, Software Engineering, Information Technology, or related fields. You have solid Computer Science fundamentals in algorithms and data structures. You have a sound understanding of system performance and security. Comfortable to code in at least one high-level programming language - Java, Python, or Golang for scripting and automation.
Additional Information
Life at Grab
We care about your well-being at Grab, here are some of the global benefits we offer:
We have your back with Term Life Insurance and comprehensive Medical Insurance. With GrabFlex, create a benefits package that suits your needs and aspirations. Celebrate moments that matter in life with loved ones through Parental and Birthday leave, and give back to your communities through Love-all-Serve-all (LASA) volunteering leave We have a confidential Grabber Assistance Programme to guide and uplift you and your loved ones through life's challenges. Balancing personal commitments and life's demands are made easier with our FlexWork arrangements such as differentiated hours
What We Stand For At Grab
We are committed to building an inclusive and equitable workplace that provides equal opportunity for Grabbers to grow and perform at their best. We consider all candidates fairly and equally regardless of nationality, ethnicity, race, religion, age, gender, family commitments, physical and mental impairments or disabilities, and other attributes that make them unique. Seniority level
Seniority level Associate Employment type
Employment type Full-time Job function
Industries Technology, Information and Internet Referrals increase your chances of interviewing at Grab by 2x Petaling Jaya, Selangor, Malaysia 4 months ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago Petaling Jaya, Selangor, Malaysia 6 days ago Petaling Jaya, Selangor, Malaysia 13 hours ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago Specialist, Cloud Security | TNG Digital
Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 9 months ago Federal Territory of Kuala Lumpur, Malaysia 4 days ago Federal Territory of Kuala Lumpur, Malaysia 3 days ago Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 3 days ago Petaling Jaya, Selangor, Malaysia 20 hours ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
Threat and Vulnerability Management Engineer
Posted today
Job Viewed
Job Description
Join to apply for the Threat and Vulnerability Management Engineer role at DXC Technology
Threat and Vulnerability Management Engineer1 day ago Be among the first 25 applicants
Join to apply for the Threat and Vulnerability Management Engineer role at DXC Technology
Job Description
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.
Job Description
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.
Job Summary
We are looking for a Security Engineer with a strong background in leading and delivering enterprise-scale security projects, aligned with DXC Security’s core service offerings . The role demands architectural depth and hands-on implementation knowledge across various security technologies.
As a member of the Malaysia Threat and Vulnerability Management team, you will provide high-impact Infrastructure Security Advisory Services to DXC clients and internal stakeholders, delivering secure and scalable solutions that meet enterprise risk, compliance, and business objectives.
Key Responsibilities
- Deliver technical consulting services to both external customers and internal project teams
- Lead or support the design, implementation, and optimization of security technologies aligned with DXC’s portfolio
- Serve as a trusted advisor to clients, maintaining strong, consultative relationships focused on long-term outcomes
- Stay current with emerging security trends, technologies, and threat landscapes to provide forward-thinking guidance
- Contribute to the evolution of DXC Security’s solution portfolio with technical insights and reusable methodologies
- Influence architectural direction and technical strategies for client environments and DXC solutions
- Support business development activities through opportunity identification and proposal input
- Ensure high-quality service delivery that supports revenue growth and customer satisfaction metrics
Security Consultant (Senior Individual Contributor)
- Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity
- Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence
- Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations
- Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value
- Provides mentorship and technical leadership within project teams, though not in a formal people management role
- Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance
- Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance
- Represents DXC Security in customer engagements as a subject matter expert and technical authority
Technical Skills and Experience Required:
- 3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio
- Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments
Tenable VM (via Vulcan Platform)
- Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle management
- Risk-based prioritization and remediation orchestration
- Integration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA tracking
- Custom dashboards and compliance reporting
- Deployment for agentless visibility into unmanaged, IoT, and OT assets
- Integration with SIEM and ITSM platforms
- Risk scoring, threat detection, and segmentation recommendations
- Real-time alerting and policy enforcement
- Workflow automation for vulnerability triage and remediation
- Closed-loop feedback between detection and resolution
- Experience with ServiceNow and similar platforms
Palo Alto
Blue Coat
Fortinet
FireEye
AV Solutions (e.g., Symantec, McAfee)
DLP
Advantageous
- Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis)
- Experience in regulated industries or environments with stringent compliance requirements
- Travel: Required for client site visits, project implementations, or stakeholder engagements
Instagram: DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here. Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Engineering and Information Technology
- Industries IT Services and IT Consulting
Referrals increase your chances of interviewing at DXC Technology by 2x
Sign in to set job alerts for “Management Engineer” roles.Bukit Raja, Selangor, Malaysia 3 days ago
Petaling Jaya, Selangor, Malaysia 1 month ago
Petaling Jaya, Selangor, Malaysia 1 month ago
Project Engineer (Project Management and Development)Petaling Jaya, Selangor, Malaysia 2 months ago
Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 1 month ago
Bukit Raja, Selangor, Malaysia 1 week ago
Petaling Jaya, Selangor, Malaysia 1 month ago
Petaling Jaya, Selangor, Malaysia 6 days ago
Petaling Jaya, Selangor, Malaysia 4 days ago
Federal Territory of Kuala Lumpur, Malaysia 5 days ago
Petaling Jaya, Selangor, Malaysia 1 month ago
Bandar Baru Bangi, Selangor, Malaysia 3 weeks ago
Petaling Jaya, Selangor, Malaysia 1 month ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
ENGINEER - ENGINEERING, CONTROL AND INSTRUMENTATIONKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 1 month ago
Petaling Jaya, Selangor, Malaysia 6 months ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrThreat and Vulnerability Management Engineer
Posted today
Job Viewed
Job Description
Join to apply for the
Threat and Vulnerability Management Engineer
role at
DXC Technology Threat and Vulnerability Management Engineer
1 day ago Be among the first 25 applicants Join to apply for the
Threat and Vulnerability Management Engineer
role at
DXC Technology Job Description
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates. Job Description
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.
Job Summary
We are looking for a
Security Engineer
with a strong background in leading and delivering enterprise-scale security projects, aligned with
DXC Security’s core service offerings . The role demands architectural depth and hands-on implementation knowledge across various security technologies.
As a member of the Malaysia
Threat and Vulnerability Management
team, you will provide high-impact
Infrastructure Security Advisory Services
to DXC clients and internal stakeholders, delivering secure and scalable solutions that meet enterprise risk, compliance, and business objectives.
Key Responsibilities
Deliver technical consulting services to both external customers and internal project teams Lead or support the design, implementation, and optimization of security technologies aligned with DXC’s portfolio Serve as a trusted advisor to clients, maintaining strong, consultative relationships focused on long-term outcomes Stay current with emerging security trends, technologies, and threat landscapes to provide forward-thinking guidance Contribute to the evolution of DXC Security’s solution portfolio with technical insights and reusable methodologies Influence architectural direction and technical strategies for client environments and DXC solutions Support business development activities through opportunity identification and proposal input Ensure high-quality service delivery that supports revenue growth and customer satisfaction metrics
Role Expectations
Security Consultant (Senior Individual Contributor)
Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value Provides mentorship and technical leadership within project teams, though not in a formal people management role Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance Represents DXC Security in customer engagements as a subject matter expert and technical authority
Essential Requirements
Technical Skills and Experience Required:
3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments
Experience in at least 2 of the following technologies is required:
Tenable VM (via Vulcan Platform)
Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle management Risk-based prioritization and remediation orchestration Integration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA tracking Custom dashboards and compliance reporting
Armis
Deployment for agentless visibility into unmanaged, IoT, and OT assets Integration with SIEM and ITSM platforms Risk scoring, threat detection, and segmentation recommendations Real-time alerting and policy enforcement
ITSM Integration
Workflow automation for vulnerability triage and remediation Closed-loop feedback between detection and resolution Experience with ServiceNow and similar platforms
Check Point
Palo Alto
Blue Coat
Fortinet
FireEye
AV Solutions (e.g., Symantec, McAfee)
DLP
Advantageous
Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis) Experience in regulated industries or environments with stringent compliance requirements
Additional Information
Travel: Required for client site visits, project implementations, or stakeholder engagements
Learn more about DXC's Security team - Security
Instagram: DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here . Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Engineering and Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at DXC Technology by 2x Sign in to set job alerts for “Management Engineer” roles.
Bukit Raja, Selangor, Malaysia 3 days ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 1 month ago Project Engineer (Project Management and Development)
Petaling Jaya, Selangor, Malaysia 2 months ago Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Bukit Raja, Selangor, Malaysia 1 week ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 6 days ago Petaling Jaya, Selangor, Malaysia 4 days ago Federal Territory of Kuala Lumpur, Malaysia 5 days ago Petaling Jaya, Selangor, Malaysia 1 month ago Bandar Baru Bangi, Selangor, Malaysia 3 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago ENGINEER - ENGINEERING, CONTROL AND INSTRUMENTATION
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 6 months ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr
(B) Sr. Security Consultant, Threat & Vulnerability Management
Posted 16 days ago
Job Viewed
Job Description
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
Job Openings (B) Sr. Security Consultant, Threat & Vulnerability Management
About the job (B) Sr. Security Consultant, Threat & Vulnerability ManagementJob Title : Sr. Security Consultant, Threat & Vulnerability Management
Job Description:
This role is an excellent opportunity in IT Security, ideally someone with strong technical IT security skills as a core competency. The secondary, non-technical skills would be a plus. An ideal person would be someone who is passionate about IT security and can act as a subject matter expert in all aspects of IT security. This person will carry a consultant mindset, ready to accept new challenges, and support IT security functions at a group level to serve global markets. This person is also required to have the ability to manage and implement IT security projects, bring forward fresh ideas to improve overall IT security maturity in the organization.
Job Responsibilities:
- Provide technical expertise required to carry out internal and external security assessment exercises.
- Perform vulnerability assessment, penetration testing, web and mobile application testing, source code review and wireless network assessments.
- Manage and participate in all stages of a Vulnerability Management including planning, scanning, tracking and remediation.
- Champion security research activities and planning required to carry out successful vulnerability assessment operations.
- Create and provide executive reports and presentations to non-technical audience, highlighting outcomes of security assessment exercises, recommendations and remediation timelines.
- Work with external parties to coordinate and / or conduct security assessments.
- Support compliance objectives; to meet BNM and PCI-DSS standards.
- Define and develop agenda for training and educating security professionals on Application Pentesting.
- Improve, update and maintain SOP and Security Assessment Guidelines.
- Support VA related Operational Readiness activities required for new assets.
- Assist in on-going audit exercises and act as a pivotal person to handle audit inquiries coming from external auditors and business units
- Bachelor's degree in Computing/Information Technology or equivalent
- The incumbent should preferably have 3-5 years of experience in a Banking industry or similar environment, e.g. a demanding service industry where employees are able to work under pressure.
- 3-5 years' experience in at least three of the following:
- Network penetration testing and manipulation of network infrastructure
- Mobile and/or web application assessments Vulnerability Assessment
- Shell scripting or automation of simple tasks using Perl, Python, or Ruby
- Developing, extending, or modifying exploits, shellcode or exploit tools
- Developing applications in C#, ASP, .NET, ObjectiveC, Go, or Java (J2EE)
- Reverse engineering malware, data obfuscators, or ciphers
- Source code review for control flow and security flaws
- Be fluent with common security vulnerabilities, design and configuration flaws, and security best practices.
- Strong knowledge of tools used for wireless, web application, and network security testing.
- Experience with one or more security tools and products (Nessus, Qualys, Acunetix, Kali, Metasploit, Nmap, Burpsuite, etc.)
- Demonstrate proficiency in performing application security testing using both automated and manual approaches;
- Thorough understanding of network protocols, data on the wire, and covert channels.
- Mastery of Unix/Mac/Windows operating systems, including bash, and Powershell.
- Highly self-motivated and driven.
- Ability to act calmly and competently in high-pressure, high-stress situations and Standby.
- Ability to document and explain technical details in a concise, understandable manner.
- Strong presentation skills with proven ability to successfully interface with and influence at all levels (management, executive, technical staff and end user).
- Possess Any of the following security certifications: OSCP, OSCE, CISSP, CISM, GIAC (GXPN, GWAPT, GPEN, GMOB), CREST Certified Simulated Attack Specialist (CCSAS), CREST Registered Penetration Tester (CRPT)
- Strong oral and written communication skills in English are required.
- Ability to translate technical vulnerabilities into business risk terminology for business units and recommend corrective actions to customers and project stake-holders.
Be The First To Know
About the latest Threat detection Jobs in Malaysia !
Information Security Analyst
Posted 11 days ago
Job Viewed
Job Description
Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric #LifeAtRazer experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities : We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties and Responsibilities
- Conduct vulnerability assessments and provide actionable remediation plans
- Perform penetration testing on networks, applications, and infrastructure.
- Review and optimize firewall rules and configurations.
- Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
- Investigate and respond to security incidents in a timely manner.
- Review and validate bug bounty submissions, coordinating with researchers and internal teams.
- Collaborate with IT, DevOps, and compliance teams to implement security best practices.
- Collaborate closely with business units to provide expert support and guidance on information security matters.
- Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
- Perform ad hoc tasks that are assigned by team leader or team manager.
Requirements
- Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
- At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
- Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
- For lead roles, experience in people management, ability to lead and influence people is expected.
- Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
- Strong understanding of network protocols, web application security, and threat detection.
- Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
- Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
- Applicants must be willing to work in ICITY SHAH ALAM.
Are you game?
Pre-Requisites :Are you game?
#J-18808-LjbffrInformation Security Analyst
Posted 11 days ago
Job Viewed
Job Description
Join to apply for the Information Security Analyst role at Razer Inc.
Join to apply for the Information Security Analyst role at Razer Inc.
Get AI-powered advice on this job and more exclusive features.
Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities
We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.
This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties And Responsibilities
- Conduct vulnerability assessments and provide actionable remediation plans
- Perform penetration testing on networks, applications, and infrastructure.
- Review and optimize firewall rules and configurations.
- Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
- Investigate and respond to security incidents in a timely manner.
- Review and validate bug bounty submissions, coordinating with researchers and internal teams.
- Collaborate with IT, DevOps, and compliance teams to implement security best practices.
- Collaborate closely with business units to provide expert support and guidance on information security matters.
- Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
- Perform ad hoc tasks that are assigned by team leader or team manager.
- Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
- At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
- Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
- For lead roles, experience in people management, ability to lead and influence people is expected.
- Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
- Strong understanding of network protocols, web application security, and threat detection.
- Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
- Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
- Applicants must be willing to work in ICITY SHAH ALAM.
Pre-Requisites
Are you game? Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computers and Electronics Manufacturing
Referrals increase your chances of interviewing at Razer Inc. by 2x
Get notified about new Information Security Analyst jobs in Shah Alam, Selangor, Malaysia .
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago
Petaling Jaya, Selangor, Malaysia 6 days ago
Petaling Jaya, Selangor, Malaysia 21 hours ago
(Senior) Cyber Security Consultant & Penetration TesterWP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
(TRC) Manager - Cyber Response (Petaling Jaya)Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 2 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Internship - Network & Information Security EngineerKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Security Operations & Governance Analyst (1 year Contract)Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Cyber Security Analyst (Governance, Risk & Compliance)Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 1 month ago
Cyber Security (Digital Forensic Analyst) AVP, Data Security Engineer, Group Information SecurityFederal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Senior Information Security Engineer (ISE)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Operational Technology (OT) Security Analyst Security Operations Analyst- APAC Blue Team LeaderKuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 2 days ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 year ago
(Senior) Security Engineer, Security Engineering & Threat IntelligenceKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Cyber Security Metrics and Behavioural AnalystKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 7 months ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-LjbffrInformation Security Analyst
Posted today
Job Viewed
Job Description
Information Security Analyst
role at
Razer Inc. Join to apply for the
Information Security Analyst
role at
Razer Inc. Get AI-powered advice on this job and more exclusive features. Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is
a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also
a great place to work,
providing you the unique, gamer-centric experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities
We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.
This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties And Responsibilities
Conduct vulnerability assessments and provide actionable remediation plans Perform penetration testing on networks, applications, and infrastructure. Review and optimize firewall rules and configurations. Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis Investigate and respond to security incidents in a timely manner. Review and validate bug bounty submissions, coordinating with researchers and internal teams. Collaborate with IT, DevOps, and compliance teams to implement security best practices. Collaborate closely with business units to provide expert support and guidance on information security matters. Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices. Perform ad hoc tasks that are assigned by team leader or team manager.
Requirements
Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered). At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position. Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous. For lead roles, experience in people management, ability to lead and influence people is expected. Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms. Strong understanding of network protocols, web application security, and threat detection. Knowledge of AWS Cloud Computing services and experience with Linux servers is essential. Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment. Applicants must be willing to work in ICITY SHAH ALAM.
Are you game?
Pre-Requisites
Are you game? Seniority level
Seniority level Mid-Senior level Employment type
Employment type Full-time Job function
Job function Information Technology Industries Computers and Electronics Manufacturing Referrals increase your chances of interviewing at Razer Inc. by 2x Get notified about new Information Security Analyst jobs in
Shah Alam, Selangor, Malaysia . Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago Petaling Jaya, Selangor, Malaysia 6 days ago Petaling Jaya, Selangor, Malaysia 21 hours ago (Senior) Cyber Security Consultant & Penetration Tester
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago (TRC) Manager - Cyber Response (Petaling Jaya)
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 3 days ago Federal Territory of Kuala Lumpur, Malaysia 4 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago Federal Territory of Kuala Lumpur, Malaysia 2 days ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Internship - Network & Information Security Engineer
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago Federal Territory of Kuala Lumpur, Malaysia 4 days ago Security Operations & Governance Analyst (1 year Contract)
Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago Cyber Security Analyst (Governance, Risk & Compliance)
Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago Associate Manager - Security Compliance Analyst
Petaling Jaya, Selangor, Malaysia 1 month ago Cyber Security (Digital Forensic Analyst)
AVP, Data Security Engineer, Group Information Security
Federal Territory of Kuala Lumpur, Malaysia 4 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Senior Information Security Engineer (ISE)
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago Operational Technology (OT) Security Analyst
Security Operations Analyst- APAC Blue Team Leader
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Associate Manager - Security Compliance Analyst
Petaling Jaya, Selangor, Malaysia 2 days ago Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 year ago (Senior) Security Engineer, Security Engineering & Threat Intelligence
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Cyber Security Metrics and Behavioural Analyst
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 4 days ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 7 months ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr