General Information
Req #
WD
Career area:
Information Technology
Country/Region:
Singapore
State:
Central Singapore
City:
SINGAPORE
Date:
Monday, October 6, 2025
Working time:
Full-time
Additional Locations:
Why Work at Lenovo
We are Lenovo.
We do what we say.
We own what we do.
We WOW our customers.
Lenovo is a US$69 billion revenue global technology powerhouse, ranked #196 in the Fortune Global 500, and serving millions of customers every day in 180 markets.
Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world's largest PC company with a full-stack portfolio of AI-enabled, AI-ready, and AI-optimized devices (PCs, workstations, smartphones, tablets), infrastructure (server, storage, edge, high performance computing and software defined infrastructure), software, solutions, and services.
Lenovo's continued investment in world-changing innovation is building a more equitable, trustworthy, and smarter future for everyone, everywhere.
Lenovo is listed on the Hong Kong stock exchange under Lenovo Group Limited (HKSE: 992) (ADR: LNVGY).
This transformation together with Lenovo's world-changing innovation is building a more inclusive, trustworthy, and smarter future for everyone, everywhere.
To find out more visit , and read about the latest news via our StoryHub.
Description and Requirements
Key Responsibilities:
1.
Incident Response & Security Monitoring
- Track, manage, and escalate cybersecurity incidents and critical security threat events as required.
- Conduct information security awareness trainings to cultivate a security-conscious culture among staff.
- Stay current with emerging threats, vulnerabilities, and threat intelligence related to cloud platforms.
- Disseminate security advisories, threat intelligence reports, security directives, and patch recommendations promptly to the relevant stakeholders in the agencies.
- Partake in tabletop exercises, security risk management activities, audits and third-party assessments to enhance incident response readiness.
2.
Security Product Management
- Perform Vulnerability Assessments (Tenable Nessus) on applications (e.g. web client/server, mobile apps), networking and computing devices (e.g. firmware, Operating System).
- Analyse vulnerability scan results, recommend remediation actions, and track resolution status.
- Monitor security events on SIEM (e.g. Splunk, Cortex, Exa beam), perform event triage and analysis.
- Perform onboarding and vulnerability scanning of computing devices before connecting to the corporate network to ensure compliance with cyber hygiene standards.
3.
Security Governance & Compliance
- Conduct periodic security reviews to ensure adherence to IT Security Policies, Standards, Controls and industry best practices.
- Recommend and implement security initiatives and enhancement based on findings from tabletop exercises (TTX) and audits.
- Monitor and ensure compliance with secure configuration standards across network, systems and endpoint (i.e. CIS Hardening) at agencies.
- Analyse Vulnerability Assessment (VA) scan results, track and report remediation status according to the stipulated timeframe.
4.
Network, Systems and Endpoint Security
- Manage, configure, and optimize security tools and platforms to ensure effective integration with network and IT infrastructure.
- Manage network, system, endpoint and runtime security of on-premises and cloud environments.
- Perform regular reviews of accounts for both on-premises and on cloud systems/applications.
5.
Documentation and Reporting
- Implement and update security policies, technical baselines, Standard Operating Procedures (SOPs).
- Maintain documentation of security incidents, vulnerability assessments, security checklist, security controls and policies.
- Prepare and deliver regular reports to update security performance metrics, incident trends, compliance status and risk mitigation efforts.
- Ensure timely escalation and reporting of cybersecurity incidents to management and stakeholders.
6.
Collaboration and Stakeholder Management
- Collaborate with various IT teams (e.g. Infrastructure, Applications, Project) and external vendors to implement and maintain security controls and measures.
- Provide security advisory and recommendations to support projects and system implementations.
- Act as the key liaison with stakeholders (e.g. SIRO/SIRM, IT, Application Teams) and cloud service providers to align security-by-design principles, cybersecurity strategies and compliance requirements.
Qualifications:
Education & Experience
- Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related discipline.
- Minimum 3 years of experience in Security Operations.
Technical Skills
- Hands-on experience with security tools (e.g. SIEM, WAF, AV, EDR, PAM, DAM).
- Deep understanding of vulnerability management, threat analysis, and incident response (IR) processes.
- Good understanding of secure network design, endpoint security, and system hardening techniques.
- Familiarity with ICT security compliance frameworks, cybersecurity standards, and risk management practices.
- Familiar with IaC security (e.g. Terraform, CloudFormation) and CI/CD security.
Certifications
- Professional certifications such as CISSP or CISM are preferred.
- Cloud certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate or equivalent would be advantageous.
Other Skills
- Strong analytical and problem-solving skills with attention to detail.
- Effective communication skills, both written and verbal, with the ability to clearly articulate security risks and recommendations.
- Ability to work independently with minimal supervision and collaboratively within a team in a dynamic and fast-paced environment.
- Proactive mindset with a continuous improvement attitude towards cybersecurity operations.
LPS
Additional Locations:
Singapore - Central Singapore - Singapore
Singapore - Central Singapore - SINGAPORE
Singapore
Singapore - Central Singapore
* Singapore - Central Singapore - Singapore , * Singapore - Central Singapore - SINGAPORE