123 Vulnerability Management jobs in Malaysia

Threat and Vulnerability Management Engineer

Petaling Jaya, Selangor DXC Technology

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Threat and Vulnerability Management Engineer

Join to apply for the Threat and Vulnerability Management Engineer role at DXC Technology

Threat and Vulnerability Management Engineer

1 day ago Be among the first 25 applicants

Join to apply for the Threat and Vulnerability Management Engineer role at DXC Technology

Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.

Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.

Job Summary

We are looking for a Security Engineer with a strong background in leading and delivering enterprise-scale security projects, aligned with DXC Security’s core service offerings . The role demands architectural depth and hands-on implementation knowledge across various security technologies.

As a member of the Malaysia Threat and Vulnerability Management team, you will provide high-impact Infrastructure Security Advisory Services to DXC clients and internal stakeholders, delivering secure and scalable solutions that meet enterprise risk, compliance, and business objectives.

Key Responsibilities

  • Deliver technical consulting services to both external customers and internal project teams
  • Lead or support the design, implementation, and optimization of security technologies aligned with DXC’s portfolio
  • Serve as a trusted advisor to clients, maintaining strong, consultative relationships focused on long-term outcomes
  • Stay current with emerging security trends, technologies, and threat landscapes to provide forward-thinking guidance
  • Contribute to the evolution of DXC Security’s solution portfolio with technical insights and reusable methodologies
  • Influence architectural direction and technical strategies for client environments and DXC solutions
  • Support business development activities through opportunity identification and proposal input
  • Ensure high-quality service delivery that supports revenue growth and customer satisfaction metrics

Role Expectations

Security Consultant (Senior Individual Contributor)

  • Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity
  • Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence
  • Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations
  • Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value
  • Provides mentorship and technical leadership within project teams, though not in a formal people management role
  • Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance
  • Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance
  • Represents DXC Security in customer engagements as a subject matter expert and technical authority

Essential Requirements

Technical Skills and Experience Required:

  • 3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio
  • Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments

Experience in at least 2 of the following technologies is required:

Tenable VM (via Vulcan Platform)

  • Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle management
  • Risk-based prioritization and remediation orchestration
  • Integration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA tracking
  • Custom dashboards and compliance reporting

Armis

  • Deployment for agentless visibility into unmanaged, IoT, and OT assets
  • Integration with SIEM and ITSM platforms
  • Risk scoring, threat detection, and segmentation recommendations
  • Real-time alerting and policy enforcement

ITSM Integration

  • Workflow automation for vulnerability triage and remediation
  • Closed-loop feedback between detection and resolution
  • Experience with ServiceNow and similar platforms

Check Point

Palo Alto

Blue Coat

Fortinet

FireEye

AV Solutions (e.g., Symantec, McAfee)

DLP

Advantageous

  • Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis)
  • Experience in regulated industries or environments with stringent compliance requirements

Additional Information

  • Travel: Required for client site visits, project implementations, or stakeholder engagements

Learn more about DXC's Security team - Security

Instagram: DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.

Seniority level
  • Seniority level Mid-Senior level
Employment type
  • Employment type Full-time
Job function
  • Job function Engineering and Information Technology
  • Industries IT Services and IT Consulting

Referrals increase your chances of interviewing at DXC Technology by 2x

Sign in to set job alerts for “Management Engineer” roles.

Bukit Raja, Selangor, Malaysia 3 days ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Project Engineer (Project Management and Development)

Petaling Jaya, Selangor, Malaysia 2 months ago

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Bukit Raja, Selangor, Malaysia 1 week ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 6 days ago

Petaling Jaya, Selangor, Malaysia 4 days ago

Federal Territory of Kuala Lumpur, Malaysia 5 days ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Bandar Baru Bangi, Selangor, Malaysia 3 weeks ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

ENGINEER - ENGINEERING, CONTROL AND INSTRUMENTATION

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Petaling Jaya, Selangor, Malaysia 1 month ago

Petaling Jaya, Selangor, Malaysia 6 months ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Threat and Vulnerability Management Engineer

Petaling Jaya, Selangor DXC Technology

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Threat and Vulnerability Management Engineer

Join to apply for the

Threat and Vulnerability Management Engineer

role at

DXC Technology Threat and Vulnerability Management Engineer

1 day ago Be among the first 25 applicants Join to apply for the

Threat and Vulnerability Management Engineer

role at

DXC Technology Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates. Job Description

DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.

Job Summary

We are looking for a

Security Engineer

with a strong background in leading and delivering enterprise-scale security projects, aligned with

DXC Security’s core service offerings . The role demands architectural depth and hands-on implementation knowledge across various security technologies.

As a member of the Malaysia

Threat and Vulnerability Management

team, you will provide high-impact

Infrastructure Security Advisory Services

to DXC clients and internal stakeholders, delivering secure and scalable solutions that meet enterprise risk, compliance, and business objectives.

Key Responsibilities

Deliver technical consulting services to both external customers and internal project teams Lead or support the design, implementation, and optimization of security technologies aligned with DXC’s portfolio Serve as a trusted advisor to clients, maintaining strong, consultative relationships focused on long-term outcomes Stay current with emerging security trends, technologies, and threat landscapes to provide forward-thinking guidance Contribute to the evolution of DXC Security’s solution portfolio with technical insights and reusable methodologies Influence architectural direction and technical strategies for client environments and DXC solutions Support business development activities through opportunity identification and proposal input Ensure high-quality service delivery that supports revenue growth and customer satisfaction metrics

Role Expectations

Security Consultant (Senior Individual Contributor)

Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value Provides mentorship and technical leadership within project teams, though not in a formal people management role Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance Represents DXC Security in customer engagements as a subject matter expert and technical authority

Essential Requirements

Technical Skills and Experience Required:

3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments

Experience in at least 2 of the following technologies is required:

Tenable VM (via Vulcan Platform)

Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle management Risk-based prioritization and remediation orchestration Integration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA tracking Custom dashboards and compliance reporting

Armis

Deployment for agentless visibility into unmanaged, IoT, and OT assets Integration with SIEM and ITSM platforms Risk scoring, threat detection, and segmentation recommendations Real-time alerting and policy enforcement

ITSM Integration

Workflow automation for vulnerability triage and remediation Closed-loop feedback between detection and resolution Experience with ServiceNow and similar platforms

Check Point

Palo Alto

Blue Coat

Fortinet

FireEye

AV Solutions (e.g., Symantec, McAfee)

DLP

Advantageous

Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis) Experience in regulated industries or environments with stringent compliance requirements

Additional Information

Travel: Required for client site visits, project implementations, or stakeholder engagements

Learn more about DXC's Security team - Security

Instagram: DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.

Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here . Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Engineering and Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at DXC Technology by 2x Sign in to set job alerts for “Management Engineer” roles.

Bukit Raja, Selangor, Malaysia 3 days ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 1 month ago Project Engineer (Project Management and Development)

Petaling Jaya, Selangor, Malaysia 2 months ago Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Bukit Raja, Selangor, Malaysia 1 week ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 6 days ago Petaling Jaya, Selangor, Malaysia 4 days ago Federal Territory of Kuala Lumpur, Malaysia 5 days ago Petaling Jaya, Selangor, Malaysia 1 month ago Bandar Baru Bangi, Selangor, Malaysia 3 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago ENGINEER - ENGINEERING, CONTROL AND INSTRUMENTATION

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Petaling Jaya, Selangor, Malaysia 1 month ago Petaling Jaya, Selangor, Malaysia 6 months ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Engineer, Vulnerability Management

Petaling Jaya, Selangor Grab

Posted 23 days ago

Job Viewed

Tap Again To Close

Job Description

Security Engineer, Vulnerability Management

About Grab and Our Workplace

Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility.

Company Description

About Grab and Our Workplace

Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility.

Job Description

Get to Know the Team

The Vulnerability Management Automation team is dedicated to enhancing the efficiency and accuracy of the Vulnerability Management Program through automation. Our mission is to integrate and streamline various data sources and processes to provide comprehensive vulnerability management.

Get to Know the Role

You will report to the Engineer Manager and be based onsite in Petaling Jaya, Malaysia.

As a backend engineer you will: design and manage automation tools for vulnerability management. Embrace cutting-edge technologies and a culture of knowledge-sharing. Learn scalable software engineering practices and create tools for secure platform operations. Be part of an on-call rotation for infrastructure support and incident management. Grow with us!

The Critical Tasks You Will Perform

  • You will design and write with the cutting edge GO language to improve the availability, scalability, latency, and efficiency of the Security platform.
  • You will partner with other engineering teams to explore and create new design/architectures geared towards scale and performance.
  • You will be involved in code and design reviews to maintain our high development standards.
  • You will collaborate closely with the infrastructure team in building and scaling backend services and performing root cause analysis investigations.
  • You are responsible for building, and fixing large-scale systems and debugging and modifying production software.
  • Write unit, functional, and end-to-end tests.

Qualifications

What Essential Skills You Will Need

  • You have a degree in Computer Science, Software Engineering, Information Technology, or related fields.
  • You have solid Computer Science fundamentals in algorithms and data structures.
  • You have a sound understanding of system performance and security.
  • Comfortable to code in at least one high-level programming language - Java, Python, or Golang for scripting and automation.

Additional Information

Life at Grab

We care about your well-being at Grab, here are some of the global benefits we offer:

  • We have your back with Term Life Insurance and comprehensive Medical Insurance.
  • With GrabFlex, create a benefits package that suits your needs and aspirations.
  • Celebrate moments that matter in life with loved ones through Parental and Birthday leave, and give back to your communities through Love-all-Serve-all (LASA) volunteering leave
  • We have a confidential Grabber Assistance Programme to guide and uplift you and your loved ones through life's challenges.
  • Balancing personal commitments and life's demands are made easier with our FlexWork arrangements such as differentiated hours

What We Stand For At Grab

We are committed to building an inclusive and equitable workplace that provides equal opportunity for Grabbers to grow and perform at their best. We consider all candidates fairly and equally regardless of nationality, ethnicity, race, religion, age, gender, family commitments, physical and mental impairments or disabilities, and other attributes that make them unique.

Seniority level
  • Seniority level Associate
Employment type
  • Employment type Full-time
Job function
  • Industries Technology, Information and Internet

Referrals increase your chances of interviewing at Grab by 2x

Petaling Jaya, Selangor, Malaysia 4 months ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago

Petaling Jaya, Selangor, Malaysia 6 days ago

Petaling Jaya, Selangor, Malaysia 13 hours ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago

Specialist, Cloud Security | TNG Digital

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago

Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago

Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 9 months ago

Federal Territory of Kuala Lumpur, Malaysia 4 days ago

Federal Territory of Kuala Lumpur, Malaysia 3 days ago

Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 3 days ago

Petaling Jaya, Selangor, Malaysia 20 hours ago

We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Engineer, Vulnerability Management

Petaling Jaya, Selangor Grab

Posted 12 days ago

Job Viewed

Tap Again To Close

Job Description

Security Engineer, Vulnerability Management

About Grab and Our Workplace

Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility. Company Description

About Grab and Our Workplace

Grab is Southeast Asia's leading superapp. From getting your favourite meals delivered to helping you manage your finances and getting around town hassle-free, we've got your back with everything. In Grab, purpose gives us joy and habits build excellence, while harnessing the power of Technology and AI to deliver the mission of driving Southeast Asia forward by economically empowering everyone, with heart, hunger, honour, and humility.

Job Description

Get to Know the Team

The Vulnerability Management Automation team is dedicated to enhancing the efficiency and accuracy of the Vulnerability Management Program through automation. Our mission is to integrate and streamline various data sources and processes to provide comprehensive vulnerability management.

Get to Know the Role

You will report to the Engineer Manager and be based onsite in Petaling Jaya, Malaysia.

As a backend engineer you will: design and manage automation tools for vulnerability management. Embrace cutting-edge technologies and a culture of knowledge-sharing. Learn scalable software engineering practices and create tools for secure platform operations. Be part of an on-call rotation for infrastructure support and incident management. Grow with us!

The Critical Tasks You Will Perform

You will design and write with the cutting edge GO language to improve the availability, scalability, latency, and efficiency of the Security platform. You will partner with other engineering teams to explore and create new design/architectures geared towards scale and performance. You will be involved in code and design reviews to maintain our high development standards. You will collaborate closely with the infrastructure team in building and scaling backend services and performing root cause analysis investigations. You are responsible for building, and fixing large-scale systems and debugging and modifying production software. Write unit, functional, and end-to-end tests.

Qualifications

What Essential Skills You Will Need

You have a degree in Computer Science, Software Engineering, Information Technology, or related fields. You have solid Computer Science fundamentals in algorithms and data structures. You have a sound understanding of system performance and security. Comfortable to code in at least one high-level programming language - Java, Python, or Golang for scripting and automation.

Additional Information

Life at Grab

We care about your well-being at Grab, here are some of the global benefits we offer:

We have your back with Term Life Insurance and comprehensive Medical Insurance. With GrabFlex, create a benefits package that suits your needs and aspirations. Celebrate moments that matter in life with loved ones through Parental and Birthday leave, and give back to your communities through Love-all-Serve-all (LASA) volunteering leave We have a confidential Grabber Assistance Programme to guide and uplift you and your loved ones through life's challenges. Balancing personal commitments and life's demands are made easier with our FlexWork arrangements such as differentiated hours

What We Stand For At Grab

We are committed to building an inclusive and equitable workplace that provides equal opportunity for Grabbers to grow and perform at their best. We consider all candidates fairly and equally regardless of nationality, ethnicity, race, religion, age, gender, family commitments, physical and mental impairments or disabilities, and other attributes that make them unique. Seniority level

Seniority level Associate Employment type

Employment type Full-time Job function

Industries Technology, Information and Internet Referrals increase your chances of interviewing at Grab by 2x Petaling Jaya, Selangor, Malaysia 4 months ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 6 months ago Petaling Jaya, Selangor, Malaysia 6 days ago Petaling Jaya, Selangor, Malaysia 13 hours ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 2 days ago Specialist, Cloud Security | TNG Digital

Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago WP. Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 1 week ago Federal Territory of Kuala Lumpur, Malaysia 3 weeks ago Federal Territory of Kuala Lumpur, Malaysia 2 weeks ago Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia 9 months ago Federal Territory of Kuala Lumpur, Malaysia 4 days ago Federal Territory of Kuala Lumpur, Malaysia 3 days ago Kuala Lumpur City, Federal Territory of Kuala Lumpur, Malaysia 3 days ago Petaling Jaya, Selangor, Malaysia 20 hours ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst IV

Kuala Lumpur, Kuala Lumpur Transaction Network Services (TNS)

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Overview

The Network Security Engineer is responsible for the configuration, monitoring, management, and troubleshooting of firewalls. They will act as liaison with local region network engineering and technical support groups to assist in the reviewing, design and deployment of new services, review existing services and migration of services/systems. Day to day duties will be assigned by monitoring of the Remedy ticket queue. All work must be completed following TNS Security policies and payment industry standards as well as the promotion of security best practices, to allow TNS business to operate and communicate in a secure solution.

Responsibilities
  • Function as an internal consulting resource on network security issues specifically firewall technologies, such as Next Generation Firewall (NGFW) and Unified Threat Management (UTM): Cisco ASA, Fortinet and Juniper SRX.
  • Familiar with implementing firewall security policies.
  • Day to day responsibilities include standard change control, troubleshooting issues, configuration, monitoring, and management of firewalls in conjunction with TNS Security/Network engineers and vendor-provided support.
  • Monitor ticket queue application for Firewall Operations trouble tickets, incidents and change requests.
  • Performs recurring maintenance activities such as device upgrades and patches with primary focus on firewalls and perimeter devices.
  • Be the lead technical resource on projects requiring firewall support including end of life hardware replacement, customer migrations and buildout of new PoPs.
  • Participate in the Network Security on-call rota to ensure that out of hours incidents are responded to in a timely manner.
  • Produce technical process documentation for use within the department.
  • Provide training and knowledge sharing with the rest of the department and other technical teams where required.
  • Be a focal engineer for project delivery across the Payments, Financial and Comms markets as required.
  • Manage key relationships with security partners and other internal departments.
  • Govern certification, adherence and compliance to all security requirements as required by TNS.
  • Understand and keep up to date with the latest security issues.
  • Sponsorship and execution of technology and security advancements.
  • Ensure production systems are secure, up to date and vulnerabilities managed in a timely and effective manner.
  • Maintain in-depth operational and technical knowledge of cybersecurity concepts including, but not limited to, Security Information and Event Monitoring (SIEM) tools.
  • Work closely with the Director, Security Engineering and other team members on various projects in the Global IT Security department and escalate security issues to the relevant senior members.
  • IPS/IDS technologies; Signature and pattern-based intrusion detection and prevention systems: Sourcefire and Fortinet.
  • VPN Technologies; IPSEC client & L2L tunnel, SSL client and clientless connectivity.
  • Follow documented processes, procedures and policies and maintain documentation related to work area and routinely update architecture diagrams using Visio.
  • Some travel to client sites, conferences, and other events may be necessary.
Qualifications
  • Experience in creating policies in and managing Cisco Identity Services Engine (ISE).
  • Hands-on experience in computer routing and networking, especially with firewall technologies.
  • Hands-on experience with multi-context firewall implementation (Cisco, Fortigate and Juniper).
  • Networking TCP/IP routing protocol experience.
  • Experience analyzing and troubleshooting Access Control Lists (ACLs) and VPN tunnels on firewalls.
  • Experience with firewalls, remote access VPN implementation, troubleshooting, and problem resolution is desired.
  • Experience with Cisco ISE.
  • Security and networking certifications from organizations such as Cisco, Fortigate and/or Juniper.
  • Previous experience delivering complex technical projects including hardware refresh and customer migrations.

Note: TNS is an equal opportunity employer. TNS evaluates qualified applicants without regard to race, color, religion, gender, national origin, age, sexual orientation, gender identity or expression, protected veteran status, disability, or any other legally protected characteristic.

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Selangor, Selangor Persistent Systems

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Overview

The Security Consultant / Business Analyst will support the planning, execution, and monitoring of OT (operational technology systems and networks) security projects, ensuring they meet deadlines, budgets, and objectives. This role involves collaboration with various stakeholders, vendor evaluation and end-to-end execution of Proof of Concepts (PoCs) related to IT/OT demarcation, compliance with security standards, and continuous improvement initiatives.



Responsibilities

  • Project Support: Assist in the planning, execution, and monitoring of OT security projects.

  • Vendor Evaluation: Conduct vendor evaluations for Proof of Concepts (PoCs) related to IT/OT demarcation.

  • Risk Management: Identify, assess, and mitigate risks related to OT security.

  • Compliance: Ensure projects adhere to relevant security standards and regulations (e.g., ISO 27001, NIST Cybersecurity Framework), and internal secure architecture design principles and requirements.

  • Documentation: Assist in the creation and maintenance of comprehensive project documentation.

  • Stakeholder Management: Engage, communicate, and collaborate with IT teams, plant managers, and external vendors.

  • Continuous Improvement: Identify areas of opportunity and support the implementation of product enhancements with the corresponding teams.



Requirements

  • Educational Background: A degree in IT, cybersecurity, or a related field.

  • Experience: 3-5 years of relevant experience in IT security, with hands-on experience in OT environments and project management preferred.

  • Certifications: Relevant certifications such as CISSP, CISM, or ISO 27001 are a plus.

  • Skills: Good project management skills, strong communication abilities, and proficiency in risk assessment and incident response.

  • Knowledge: Familiarity with OT security standards and frameworks (e.g., ISA/IEC 62443).

  • Cultural Adaptability: Experience in managing or supporting global projects and understanding the impact of organizational culture on business process changes.

  • Team Collaboration: Ability to work effectively in a team environment and support project goals.

  • Change Management: Basic skills in change management, including the ability to support and implement change initiatives effectively.



Seniority level

  • Mid-Senior level



Employment type

  • Full-time



Job function

  • Engineering and Information Technology



Industries

  • IT Services and IT Consulting

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst L2

Kuala Lumpur, Kuala Lumpur All jobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

All jobs Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Overview

Join to apply for the Security Analyst L2 role at All jobs

All jobs Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

2 weeks ago Be among the first 25 applicants

Join to apply for the Security Analyst L2 role at All jobs

Accountabilities
  • Work in 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
  • Provide detailed remediation recommendations to customers for the incidents within agreed SLAs, and if required assist them during remediation implementation.
  • Execute SOC playbooks, knowledge base to minimize the security incident impact and perform detailed investigation on the infected assets.
  • Escalate critical incidents to 3rd level support team, for further analysis & investigations, and demonstrate excellent collaboration skills for timely resolution to minimize impact to customers.
  • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
  • Prepare SOC monthly reports, which includes customization based on business requirements and present them to customers during monthly meetings, highlighting risks and mitigation plans.
  • Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks, relevant and sufficient knowledge base.
The Individual and their Experience
  • Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor’s degree in Computer Science/IT/Information security.
  • Excellent hands-on experience on incident analysis using SIEM platforms such as Microsoft Sentinel, IBM QRadar.
  • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if Microsoft Defender, CrowdStrike.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of Windows, Linux environments and well versed with basic Linux commands and troubleshooting, with a proven Unix (Solaris, Linux, BSD) experience.
  • Knowledge on any shell scripting language, and to apply them to automate mundane operations tasks.
  • Candidate should have at least one cybersecurity industry certification such as CEH, CHFI.
  • Good understanding of basic network concepts and advantage if exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Human Resources Services

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Vulnerability management Jobs in Malaysia !

Network Security Analyst

Kuala Lumpur, Kuala Lumpur Dexian Asia Pacific

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Overview

The analyst will provide services as an initial entry point for customer’s network security requests and coordinating delivery of requests with the appropriate security controls. The key components of the role are to define and support policies to enforce security requirements and best practices for external connections and for firewalls, stewards and maintain relationships with appropriate owners of connections to ensure controls and risks are understood and mitigated. The candidate will utilize strong communication skills as well as enterprise level understanding of network and security technologies to deliver solutions that are both technically sound and supportable.

Responsibilities
  • Certifying and re-certifying regional network connections in accordance with corporate guidelines.
  • Serving as an initial entry point for customer network security requests and coordinating delivery of requests with the appropriate Network Service Provider.
  • Consulting with the business on network security issues and participating in formal controls assessments.
  • Reviewing projects to ensure that new projects identify any potential network security issues that need to be addressed early in the project life cycle.
  • Participating in the Port Opening Request review committee as a representative from Network Security, and provide final approval to implement endorsed requests.
  • Acting as the Network Security interface for network penetration testing and PCI testing of the business network.
  • Responsible for defining and updating Required and Best Practices.
Qualifications
  • University degree with emphasis in Computer Information Systems, Information Technology, Network or a closely related field with course work in technology-related subjects.
  • Data/Security certification e.g. CCNA, CCNP, CISSP.
  • Network (security) knowledge – Firewall, IPS, VPN technology, Network Security Management Tools.
  • General network knowledge: LAN and WAN network equipment and environments, Network data (routing, switching, WAN/LAN protocols), analysis, routing, and switching; OSI Model, TCP/IP, DNS, DHCP.
Seniority level

Mid-Senior level

Employment type

Contract

Job function
  • Information Technology
  • Industries IT Services and IT Consulting

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Cyber Security Analyst

Kuala Lumpur, Kuala Lumpur Cognizant

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Overview

Cognizant Federal Territory of Kuala Lumpur, Malaysia

Cyber Security Analyst — Cognizant Federal Territory of Kuala Lumpur, Malaysia

We are seeking a motivated and detail-oriented Cybersecurity Analyst with approximately 2 years of hands-on experience to support clients’ cybersecurity initiatives. The analyst will be responsible for monitoring, analyzing, and responding to security incidents, as well as assisting in the implementation of security controls and compliance measures.

Responsibilities
  • Monitor and analyze security alerts from various sources (SIEM, firewalls, endpoint protection, etc.)
  • Investigate and respond to security incidents and vulnerabilities
  • Assist in the development and enforcement of security policies and procedures
  • Support vulnerability assessments and penetration testing activities
  • Maintain and update documentation related to security operations and incident response
  • Collaborate with IT and business teams to ensure secure system configurations and practices
  • Assist in compliance activities related to ISO 27001, NIST, or other relevant frameworks
  • Stay updated on emerging threats and recommend mitigation strategies
Required Skills & Qualifications
  • Bachelor’s degree in Computer Science, Information Security, or related field
  • Around 4 years of experience in cybersecurity or IT security operations
  • Familiarity with SIEM tools, firewalls, antivirus, and endpoint protection platforms
  • Understanding of network protocols, system vulnerabilities, and threat vectors
  • Basic knowledge of regulatory standards and compliance frameworks (e.g., ISO 27001, NIST, GDPR)
  • Strong analytical and problem-solving skills
  • Good communication and documentation abilities
Preferred Certifications (Optional but Advantageous)
  • CompTIA Security+
  • Certified Ethical Hacker (CEH)
  • GIAC Security Essentials (GSEC)

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.

Security Analyst L2

Kuala Lumpur, Kuala Lumpur All jobs

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Overview

Why choose Logicalis? As Architects of Change, Logicalis' focus is to design, support and execute clients' digital transformation by uniting their vision with their technology expertise and industry insights. The company, through its deep understanding of key IT industry drivers such as security, cloud, data management and IoT, can address customer priorities such as revenue growth and business, operational efficiency, innovation, risk and compliance, data governance and sustainability. We strengthen our purpose: to design, support, and execute our customers' digital transformation by converging their vision with our technological expertise and knowledge of the industry. The brand refresh underpins both the evolution of Logicalis’ positioning as well as our strategic vision for growth.

Accountabilities
  • Work in 24x7 shift environment to handle security incidents and provide level two (L2) support during analysis & investigations to identify the root cause.
  • Provide detailed remediation recommendation to customers for the incidents within agreed SLAs, and if required assist them during remediation implementation.
  • Execute SOC playbooks, knowledge base to minimize the security incident impact and perform detailed investigation on the infected assets.
  • Escalate critical incidents to 3rd level support team, for further analysis & investigations, and demonstrate excellent collaboration skills for timely resolution to minimize impact to customers.
  • Review 3rd party threat intel feeds and integrate them into MSS platforms to provide value to our customers.
  • Prepare SOC monthly reports, which includes customization based on business requirements and present them to customers during monthly meetings, highlighting risks and mitigation plans.
  • Enable regional L1 Security Analysts to deliver seamless L1 support by developing SOC playbooks, relevant and sufficient knowledge base.
The Individual and their Experience
  • Candidate should have at least 3 years of experience working in SOC and MSS environments, with a Bachelor’s degree in Computer Science/IT/Information security.
  • Excellent hands-on experience on incident analysis using SIEM platforms such as Microsoft Sentinel, IBM QRadar.
  • Hands on experience on any Endpoint Protection (EPP) or Endpoint Detection Response (EDR) technologies. Preferred if Microsoft Defender, CrowdStrike.
  • Exposure to firewall technologies such as Cisco, Palo Alto, Checkpoint, Fortinet.
  • Good understanding of WIN, LINUX environments and well versed with basic LINUX commands and troubleshooting, with a proven Unix (Solaris, Linux, BSD) experience.
  • Knowledge on any shell scripting language, and to apply them to automate mundane operations tasks.
  • Candidate should have at least one cybersecurity industry certification such as CEH, CHFI.
  • Good understanding of basic network concepts and advantage if exposure to cloud technologies.
  • Lateral thinking combined with excellent troubleshooting skills, preferably with experience following ITIL standards.
Seniority level
  • Mid-Senior level
Employment type
  • Full-time
Job function
  • Information Technology
Industries
  • Human Resources Services

Referrals increase your chances of interviewing at All jobs by 2x

Get notified about new Security Analyst jobs in Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia .

#J-18808-Ljbffr
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Vulnerability Management Jobs