420 Vulnerability Assessments jobs in Malaysia
Security Analyst
Posted 3 days ago
Job Viewed
Job Description
Turnkey provides consulting and managed services in the areas of Identity and Access Management, Risk and Controls Management and Application/Cyber Security for corporations predominantly running SAP software. We deliver consulting and application support services within this specialised niche to customers regardless of their size or industry, helping them to minimise their business risks with appropriate controls throughout their day to day and critical business transactions.
We are an established and fast-growing company with a culture of personal responsibility, knowledge sharing and a commitment to putting our clients at the centre of everything that we do. Founded in the UK in 2004, we have gone on to establish ourselves as a truly global organisation with offices in Australia, Germany, the US, Malaysia, Singapore and France.
Our aim is to ensure that all our clients can achieve the fine balance between business enablement and security.We do this through having the strongest team in the business, providing a unique insight into security and risk management best practice.
Our daily tasks vary significantly throughout the team; however, the focus remains on delivering often highly technical solutions that help our clients improve their security and controls posture. This might include analysing granular details such as user access within a set of systems, providing new data protection measures, or drawing solutions from data sets.
In joining our team, you can expect to be working on challenging projects across a wide range of global clients (e.g. FTSE 100) and industries. The nature of projects will be diverse and will vary across the categories of advisory, assurance, managed services and system implementation. Whilst being actively engaged on solving business problems, our core practice remains specialised in technical solutions for our clients.
About You
We are looking for independent, proactive and ambitious individuals who are committed to making a meaningful contribution to Turnkey. While an Information Security background would be advantageous, intellectual curiosity and a can-do attitude is more important than the subject of your degree. If you appreciate attention to detail, utilising data to inform decisions, and working on projects alongside a range of clients, then this is an excellent opportunity for you.
Our training programme is designed to equip you with a broad set of skills that will help you to excel in your consultancy career with us. Although the role has a technical bias, we expect to build your technical skills throughout the scheme, so no existing technical knowledge is required to apply.
What to expect in your first twelve months:
An initial immersive training schedule to introduce you to our strategic practice pillars and provide an understanding of the technical aspects fundamental to this role
We will then aim to place you on projects across the strategic service lines as soon as possible after completing initial training, where the more senior delivery team will provide continued support
Throughout your first year, you will be encouraged to complete soft skills training and be mentored to develop these skills further, with the expectation of gaining certification within twelve months of joining
After twelve months, you can expect to be aligned to one of our strategic practices, giving you the opportunity to work towards a more technically focussed and specialised certification in your second year.
Key attributes we are looking for are:
Excellent communication skills (written and verbal)
Ability to build enduring relationships
Analytical skills to investigate and solve complex problems in a structured manner
Ability to explain technical concepts clearly and concisely
Flexibility to work on multiple different types of projects
Confidence to ask questions and contribute
Initiative - always looking for better ways of doing things
An Honours Degree in any discipline
Ideally an understanding of basic networking and operating systems (e.g. windows or linux) would be desirable but not necessary
An inquisitive mind capable of considering the unintended opportunities for disruption and consequences of security gaps
Your responsibilities will include:
Working with a range of clients on multidisciplinary projects
Working on our managed service engagements to deliver improvements and enhancements to our customers’ ongoing business operations
Supporting application/solution implementation including definition of relevant master data requirements
Critical analysis of information to validate solution adherence to requirements, including various application testing techniques
Coordination of activities with clients and team members to deliver project tasks to the required quality standards
Analysing data to drive decision-making and help in providing the best solutions to our clients
Internally you will be involved in operational and practice-development activities which may include marketing, HR, events or managing team social calendars
Security Analyst
Posted 7 days ago
Job Viewed
Job Description
About
The Security Analyst II is responsible for day-to-day cybersecurity operations, including monitoring alerts, investigating incidents, validating endpoint hygiene, and ensuring timely execution of remediation plans. The role serves as a tactical executor under the direction of the Senior Manager, Cybersecurity and in coordination with the SOC and Infrastructure teams. Ideal candidates are those with solid hands-on experience in endpoint security, log triage, DLP monitoring, and vulnerability management.
Your-Day-To-Day- Security Event Monitoring & Response :
- Monitor alerts from EDR (Crowdstrike), DLP (Google Workspace), and other SIEM sources; investigate and escalate validated events.
- Coordinate with Managed SOC for Level 1/2 triage, assist in root cause validation, and track incidents to closure.
- Participate in incident response processes, including evidence collection, analysis, and response documentation.
- Endpoint & Device Visibility:
- Continuously monitor CS and MEDC installation status, highlighting assets lacking endpoint visibility.
- Conduct hygiene validation exercises against endpoint baseline (e.g. Crowdstrike health, GWS login telemetry, etc).
- Work with IT Service Operations to address untagged, unmonitored, or misconfigured devices.
- Vulnerability & Patch Coordination:
- Review scan results (e.g., Tenable.io) for high/critical findings and follow up with Infra and IT Ops for remediation status.
- Support prioritization of vulnerabilities based on asset classification and exposure.
- Participate in monthly patch and remediation governance tracking.
- DLP Operations & Enforcement:
- Investigate DLP rule violations, verify false positives, and escalate breaches aligned to Data Classification policy.
- Maintain documentation on DLP cases and support tuning of policies with the Cloud Security Engineering team.
- Support Falcon Data Protection rollout testing (PoC) and feedback loop.
- Reporting, Compliance & Audit Support:
- Maintain operational metrics related to endpoint coverage, DLP alerts, and vulnerability remediation.
- Support audit activities requiring endpoint agent matching, asset traceability, and license reconciliation.
- Assist with monthly/quarterly reporting to Cybersecurity GRC and CTO functions for ongoing governance reviews.
- Education : Bachelor’s degree in Cybersecurity, Information Technology, or a related discipline.
- Experience : 2–4 years’ experience in a SOC, IT security operations, or security analyst capacity. Proven experience handling EDR, SIEM, DLP, or VA tools in a mid-size or enterprise organization.
- Technical Skills :
- Familiarity with endpoint protection platforms (e.g., Crowdstrike, Carbon Black, SentinelOne).
- Exposure to vulnerability management tools (e.g., Tenable, Qualys) and patching workflows.
- Working knowledge of DLP controls in Google Workspace or Microsoft 365 environments.
- Ability to interpret alerts, analyze logs, and investigate user or system behavior anomalies.
- Certifications (Preferred):
- CompTIA Security+, Crowdstrike Certified Falcon Administrator (CCFA), Google Workspace Security Admin, or equivalent.
- Soft Skills :
- Effective communication and collaboration skills for working with diverse teams and third-party vendors.
- Adaptable to changing priorities and able to manage workload independently.
- Operational Rigor – Structured and process-driven approach to handling incidents and tasks.
- Analytical Thinking – Strong diagnostic skills and an investigative mindset for incident triage.
- Communication – Able to write clear incident summaries and collaborate across teams effectively.
- Accountability – Owns assigned alerts, tasks, and follow-ups until closure.
- Continuous Learning – Seeks to stay updated with new threats, tools, and defensive techniques.
Security Analyst
Posted 2 days ago
Job Viewed
Job Description
We will then aim to place you on projects across the strategic service lines as soon as possible after completing initial training, where the more senior delivery team will provide continued support
Throughout your first year, you will be encouraged to complete soft skills training and be mentored to develop these skills further, with the expectation of gaining certification within twelve months of joining
After twelve months, you can expect to be aligned to one of our strategic practices, giving you the opportunity to work towards a more technically focussed and specialised certification in your second year.
Key attributes we are looking for are: Excellent communication skills (written and verbal)
Ability to build enduring relationships
Analytical skills to investigate and solve complex problems in a structured manner
Ability to explain technical concepts clearly and concisely
Flexibility to work on multiple different types of projects
Confidence to ask questions and contribute
Initiative - always looking for better ways of doing things
An Honours Degree in any discipline
Ideally an understanding of basic networking and operating systems (e.g. windows or linux) would be desirable but not necessary
An inquisitive mind capable of considering the unintended opportunities for disruption and consequences of security gaps
Your responsibilities will include: Working with a range of clients on multidisciplinary projects
Working on our managed service engagements to deliver improvements and enhancements to our customers’ ongoing business operations
Supporting application/solution implementation including definition of relevant master data requirements
Critical analysis of information to validate solution adherence to requirements, including various application testing techniques
Coordination of activities with clients and team members to deliver project tasks to the required quality standards
Analysing data to drive decision-making and help in providing the best solutions to our clients
Internally you will be involved in operational and practice-development activities which may include marketing, HR, events or managing team social calendars
#J-18808-Ljbffr
Security Analyst
Posted 7 days ago
Job Viewed
Job Description
The Security Analyst II is responsible for day-to-day cybersecurity operations, including monitoring alerts, investigating incidents, validating endpoint hygiene, and ensuring timely execution of remediation plans. The role serves as a tactical executor under the direction of the Senior Manager, Cybersecurity and in coordination with the SOC and Infrastructure teams. Ideal candidates are those with solid hands-on experience in endpoint security, log triage, DLP monitoring, and vulnerability management. Your-Day-To-Day
Security Event Monitoring & Response :
Monitor alerts from EDR (Crowdstrike), DLP (Google Workspace), and other SIEM sources; investigate and escalate validated events. Coordinate with Managed SOC for Level 1/2 triage, assist in root cause validation, and track incidents to closure. Participate in incident response processes, including evidence collection, analysis, and response documentation.
Endpoint & Device Visibility:
Continuously monitor CS and MEDC installation status, highlighting assets lacking endpoint visibility. Conduct hygiene validation exercises against endpoint baseline (e.g. Crowdstrike health, GWS login telemetry, etc). Work with IT Service Operations to address untagged, unmonitored, or misconfigured devices.
Vulnerability & Patch Coordination:
Review scan results (e.g., Tenable.io) for high/critical findings and follow up with Infra and IT Ops for remediation status. Support prioritization of vulnerabilities based on asset classification and exposure. Participate in monthly patch and remediation governance tracking.
DLP Operations & Enforcement:
Investigate DLP rule violations, verify false positives, and escalate breaches aligned to Data Classification policy. Maintain documentation on DLP cases and support tuning of policies with the Cloud Security Engineering team. Support Falcon Data Protection rollout testing (PoC) and feedback loop.
Reporting, Compliance & Audit Support:
Maintain operational metrics related to endpoint coverage, DLP alerts, and vulnerability remediation. Support audit activities requiring endpoint agent matching, asset traceability, and license reconciliation. Assist with monthly/quarterly reporting to Cybersecurity GRC and CTO functions for ongoing governance reviews.
Qualifications & Experience
Education : Bachelor’s degree in Cybersecurity, Information Technology, or a related discipline. Experience : 2–4 years’ experience in a SOC, IT security operations, or security analyst capacity. Proven experience handling EDR, SIEM, DLP, or VA tools in a mid-size or enterprise organization. Technical Skills :
Familiarity with endpoint protection platforms (e.g., Crowdstrike, Carbon Black, SentinelOne). Exposure to vulnerability management tools (e.g., Tenable, Qualys) and patching workflows. Working knowledge of DLP controls in Google Workspace or Microsoft 365 environments. Ability to interpret alerts, analyze logs, and investigate user or system behavior anomalies.
Certifications
(Preferred):
CompTIA Security+, Crowdstrike Certified Falcon Administrator (CCFA), Google Workspace Security Admin, or equivalent.
Soft Skills :
Effective communication and collaboration skills for working with diverse teams and third-party vendors. Adaptable to changing priorities and able to manage workload independently.
Core Competencies
Operational Rigor –
Structured and process-driven approach to handling incidents and tasks. Analytical Thinking –
Strong diagnostic skills and an investigative mindset for incident triage. Communication –
Able to write clear incident summaries and collaborate across teams effectively. Accountability –
Owns assigned alerts, tasks, and follow-ups until closure. Continuous Learning –
Seeks to stay updated with new threats, tools, and defensive techniques.
#J-18808-Ljbffr
Cyber Security Analyst
Posted today
Job Viewed
Job Description
Overview
We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 2 years of hands-on experience to support cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures.
Must have- Firewalls (e.g., Fortinet, Palo Alto)
- Mobile Device Management (e.g., Microsoft Intune)
- Endpoint Detection & Response platforms (e.g., CrowdStrike, Microsoft Defender)
- Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.)
- Investigate and respond to security incidents and vulnerabilities.
- Assist in the development and enforcement of security policies and procedures.
- Support vulnerability assessments and penetration testing activities.
- Maintain and update documentation related to security operations and incident response.
- Collaborate with IT and business teams to ensure secure system configurations and practices.
- Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks.
- Stay updated on emerging threats and recommend mitigation strategies.
- Bachelor’s degree in Computer Science, Information Security, or related field.
- Around 2 years of experience in cybersecurity or IT security operations.
- Familiarity with SIEM tools, firewalls, antivirus, and endpoint protection platforms.
- Understanding of network protocols, system vulnerabilities, and threat vectors.
- Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR).
- Strong analytical and problem-solving skills.
- Good communication and documentation abilities.
- CompTIA Security+
- Certified Ethical Hacker (CEH)
- GIAC Security Essentials (GSEC)
- Cisco CCNA Security
Security Analyst L2
Posted 1 day ago
Job Viewed
Job Description
As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability.
We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.
Accountabilities:
- Work in 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
- Provide detailed remediation recommendation to customers for the incidents within agreed SLAs, and if required assist them during remediation implementation.
- Execute SOC playbooks, knowledge base to minimize the security incident impact and perform detailed investigation on the infected assets.
- Escalate critical incidents to 3rd level support team, for further analysis & investigations, and demonstrate excellent collaboration skills for timely resolution to minimize impact to customers.
- Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
- Prepare SOC monthly reports, which includes customization based on business requirements and present them to customers during monthly meetings, highlighting risks and mitigation plans.
- Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks, relevant and sufficient knowledge base.
The Individual and their Experience:
- Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor’s degree in Computer Science/IT/Information security.
- Excellent hands-on experience on incident analysis using SIEM platforms such as Microsoft Sentinel, IBM QRadar.
- Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if Microsoft Defender, CrowdStrike.
- Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
- Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with a proven Unix (Solaris, Linux, BSD) experience.
- Knowledge on any shell scripting language, and to apply them to automate mundane operations tasks.
- Candidate should have at least one cybersecurity industry certification such as CEH, CHFI.
- Good understanding of basic network concepts and advantage if exposure to cloud technologies.
- Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards
If you’re interested in career opportunities, but not ready to apply, join our Talent Network to stay connected to us and receive updates on the latest job opportunities and company news.
#J-18808-LjbffrNETWORK & SECURITY ANALYST
Posted 2 days ago
Job Viewed
Job Description
We are looking for a Network Security Analyst to join our team in Cyberjaya.
As a Network Security Analyst, you will follow work instructions to provide first-level support for network-related requests and issues. Your responsibilities include ensuring compliance with customer service level agreements and serving as the primary contact for escalated requests and issues.
Your main goal is to restore service promptly and, when escalation is necessary, to serve as the single point of contact and ownership.
Responsibilities
- Ensure all policies, procedures, and work instructions are followed to maintain customer satisfaction and meet contractual obligations in a 24x7 environment.
- Provide consultancy to business clients regarding service availability and functionality.
- Review and enforce MS processes, ensure documentation is current, and escalate issues to management as needed.
- Acknowledge and qualify NMS alerts and causes with appropriate priority levels.
- Diagnose problems and provide solutions for service restoration.
- Offer first and second level technical support for customer escalations.
- Escalate cases internally, to management, or third-party vendors as required.
- Perform remote diagnostic troubleshooting for customer incidents.
Requirements
- Minimum 1 year of experience in a NOC or Data Centre support environment.
- Bachelor's degree in IT or a related field.
- Industry certifications such as NSE, CCNA, or Aruba are preferred.
- Strong knowledge of MS Office packages.
- Basic understanding of LAN/WAN/Voice/Security/Server technologies.
- Ability to work on 12-hour rotational shifts, including weekends.
As a valued member of Logicalis Asia Pacific MSC , you will enjoy benefits such as a supportive team environment, opportunities for growth and learning, diverse experiences, and flexible working arrangements.
Application note : You do not need to meet all requirements to apply. We value confidence, capability, and curiosity, and are willing to teach the specifics of the job.
About us
Logicalis is a global technology services provider helping organizations succeed in a digital-first world through cloud, connectivity, collaboration, and security solutions. We have over 7,000 employees across 27 countries, serving more than 10,000 clients worldwide.
We are committed to inclusivity and will provide accommodations for applicants with disabilities or neurodiversity upon request.
Interested but not ready to apply? Join our Talent Network to stay connected and receive updates.
#J-18808-LjbffrBe The First To Know
About the latest Vulnerability assessments Jobs in Malaysia !
Cyber Security Analyst
Posted 2 days ago
Job Viewed
Job Description
Quantuma Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia
OverviewRole: Cyber Security Analyst. Detect, investigate, and respond to threats across cloud, endpoint, identity, network, and SaaS estates before they impact client deliverables or regulated data.
Responsibilities- Monitor and triage alerts from Microsoft Sentinel/Defender
- XDR lead incident response, containment, and post-incident reviews
- Develop detection rules mapped to MITRE ATT&CK framework
- Run purple-team drills on document-heavy processes
- Create and maintain playbooks and SOC automation
- Collaborate with security teams to uphold threat detection and response capabilities
- 3-5 years in SOC/Incident Response environments
- Strong experience with Microsoft security stack (Sentinel, Defender)
- Log analysis, investigation, and threat-hunting skills
- Scripting for automation (KQL, PowerShell, Python)
- Security+, CySA+, AZ-500 or SC-200 certifications a plus
- Detect-to-respond time <60 minutes for high-fidelity alerts
- 100% coverage across endpoints, identities, SaaS and cloud
RM 91,000 - 172,000 per year + on-call allowance and competitive benefits package included
LocationKuala Lumpur, Malaysia (Hybrid with on-call rotation)
Seniority level- Mid-Senior level
- Full-time
- Information Technology
Note: Referrals increase your chances of interviewing at Quantuma.
#J-18808-LjbffrIT Security Analyst
Posted 3 days ago
Job Viewed
Job Description
Key Responsibilities
- Information Security
- Monitor and respond to alerts related to network, endpoint, and system security.
- Conduct periodic vulnerability assessments and participate in remediation efforts.
- Assist in implementing and maintaining security policies, procedures, and standards.
- Support audit and compliance initiatives (e.g., SOC 2, ISO 27001, client security reviews, Data Privacy Act).
- Investigate and document security incidents, including root cause analysis and follow-up.
- Manage and support endpoint encryption, secure configurations, and identity access controls.
- Participate in system hardening initiatives using frameworks such as CIS, NIST, or ISO 27001.
- Contribute to disaster recovery and business continuity planning and testing.
IT Support
- Provide day-to-day support for users in both Malaysia and the Philippines, including remote troubleshooting.
- Set up, configure, and maintain laptops, desktops, printers, and other IT assets.
- Manage user accounts, credentials, and access to systems and business applications.
- Support onboarding and offboarding activities, including asset deployment and access provisioning.
- Troubleshoot issues related to hardware, software, operating systems, and networking.
- Maintain IT asset inventory and ensure accurate records of device allocation and support history.
- Coordinate with vendors or external partners as needed for issue resolution or escalations.
- Document IT procedures and contribute to the internal knowledge base.
Qualifications
- Bachelor's degree in Information Technology, Computer Science, Cybersecurity, or a related field.
- At least 2 years of combined experience in IT support and cybersecurity roles.
- Strong working knowledge of Microsoft 365, Windows OS, Active Directory, Google Workspace, and endpoint protection tools.
- Familiarity with IT security practices, controls, and frameworks (e.g., SOC 2, ISO 27001, NIST, CIS).
- Experience using ticketing systems and basic scripting or automation is a plus.
- Certifications such as CompTIA Security+, Microsoft 365 Certified, or ITIL are a strong advantage.
- Effective communication skills and ability to support users across different time zones and roles.
Preferred
- Experience working with multinational or distributed teams.
- Knowledge of Philippine and Malaysian data privacy regulations (e.g., Data Privacy Act, PDPA).
- Prior experience in BPO, professional services, or regulated industries is an advantage.
Information Security Analyst
Posted 4 days ago
Job Viewed
Job Description
Join to apply for the Information Security Analyst role at Razer Inc.
Join to apply for the Information Security Analyst role at Razer Inc.
Get AI-powered advice on this job and more exclusive features.
Joining Razer will place you on a global mission to revolutionize the way the world games. Razer is a place to do great work , offering you the opportunity to make an impact globally while working across a global team located across 5 continents. Razer is also a great place to work, providing you the unique, gamer-centric experience that will put you in an accelerated growth, both personally and professionally.
Job Responsibilities
We are looking for a skilled and analytical Information Security Analyst to join our team. In this role, you’ll be at the forefront of protecting our systems by identifying vulnerabilities, responding to threats, and continuously improving our security posture.
This position offers valuable hands-on experience in cybersecurity. If you're eager to learn and build a career in this field, we encourage you to apply.
Essential Duties And Responsibilities
- Conduct vulnerability assessments and provide actionable remediation plans
- Perform penetration testing on networks, applications, and infrastructure.
- Review and optimize firewall rules and configurations.
- Monitor, analyze, and respond to security events and incidents, ensuring timely resolution and root cause analysis
- Investigate and respond to security incidents in a timely manner.
- Review and validate bug bounty submissions, coordinating with researchers and internal teams.
- Collaborate with IT, DevOps, and compliance teams to implement security best practices.
- Collaborate closely with business units to provide expert support and guidance on information security matters.
- Champion security awareness initiatives within the business, promoting a culture of security consciousness and best practices.
- Perform ad hoc tasks that are assigned by team leader or team manager.
- Candidate must possess at least a Bachelor's Degree, Post Graduate Diploma, Professional Degree, Computer Science/Information Technology/Security or equivalent. (candidates with relative levels of related experience will be considered).
- At least 3-5 years of hands-on working experience in cybersecurity, ethical hacking or information/IT security is required for this position.
- Possession of industry-relevant certifications such as CompTIA Security+, CEH, OSCP, or similar will be advantageous.
- For lead roles, experience in people management, ability to lead and influence people is expected.
- Hands-on experience with tools such as Burp Suite, Metasploit, Nessus, Qualys, Splunk, and SIEM platforms.
- Strong understanding of network protocols, web application security, and threat detection.
- Knowledge of AWS Cloud Computing services and experience with Linux servers is essential.
- Independent with excellent analytical skills, a problem-solving attitude, and the ability to work well in a team environment.
- Applicants must be willing to work in ICITY SHAH ALAM.
Pre-Requisites
Are you game? Seniority level
- Seniority level Mid-Senior level
- Employment type Full-time
- Job function Information Technology
- Industries Computers and Electronics Manufacturing
Referrals increase your chances of interviewing at Razer Inc. by 2x
Get notified about new Information Security Analyst jobs in Shah Alam, Selangor, Malaysia .
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 months ago
Petaling Jaya, Selangor, Malaysia 6 days ago
Petaling Jaya, Selangor, Malaysia 21 hours ago
(Senior) Cyber Security Consultant & Penetration TesterWP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
(TRC) Manager - Cyber Response (Petaling Jaya)Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 3 days ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 2 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago
Wilayah Persekutuan Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 days ago
WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Internship - Network & Information Security EngineerKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Security Operations & Governance Analyst (1 year Contract)Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 4 months ago
Cyber Security Analyst (Governance, Risk & Compliance)Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 1 month ago
Cyber Security (Digital Forensic Analyst) AVP, Data Security Engineer, Group Information SecurityFederal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Senior Information Security Engineer (ISE)Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 month ago
Operational Technology (OT) Security Analyst Security Operations Analyst- APAC Blue Team LeaderKuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Associate Manager - Security Compliance AnalystPetaling Jaya, Selangor, Malaysia 2 days ago
Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 1 year ago
(Senior) Security Engineer, Security Engineering & Threat IntelligenceKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Cyber Security Metrics and Behavioural AnalystKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago
Federal Territory of Kuala Lumpur, Malaysia 4 days ago
Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago
Petaling Jaya, Selangor, Malaysia 7 months ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr