Description and Requirements
Key Responsibilities:
1.
Incident Response & Security Monitoring
Track, manage, and escalate cybersecurity incidents and critical security threat events as required.Conduct information security awareness trainings to cultivate a security-conscious culture among staff.Stay current with emerging threats, vulnerabilities, and threat intelligence related to cloud platforms.Disseminate security advisories, threat intelligence reports, security directives, and patch recommendations promptly to the relevant stakeholders in the agencies.Partake in tabletop exercises, security risk management activities, audits and third-party assessments to enhance incident response readiness.2.
Security Product Management
Perform Vulnerability Assessments (Tenable Nessus) on applications web client/server, mobile apps), networking and computing devices firmware, Operating System).Analyse vulnerability scan results, recommend remediation actions, and track resolution status.Monitor security events on SIEM Splunk, Cortex, Exa beam), perform event triage and analysis.Perform onboarding and vulnerability scanning of computing devices before connecting to the corporate network to ensure compliance with cyber hygiene standards.3.
Security Governance & Compliance
Conduct periodic security reviews to ensure adherence to IT Security Policies, Standards, Controls and industry best practices.Recommend and implement security initiatives and enhancement based on findings from tabletop exercises (TTX) and audits.Monitor and ensure compliance with secure configuration standards across network, systems and endpoint CIS Hardening) at agencies.Analyse Vulnerability Assessment (VA) scan results, track and report remediation status according to the stipulated timeframe.4.
Network, Systems and Endpoint Security
Manage, configure, and optimize security tools and platforms to ensure effective integration with network and IT infrastructure.Manage network, system, endpoint and runtime security of on-premises and cloud environments.Perform regular reviews of accounts for both on-premises and on cloud systems/applications.5.
Documentation and Reporting
Implement and update security policies, technical baselines, Standard Operating Procedures (SOPs).Maintain documentation of security incidents, vulnerability assessments, security checklist, security controls and policies.Prepare and deliver regular reports to update security performance metrics, incident trends, compliance status and risk mitigation efforts.Ensure timely escalation and reporting of cybersecurity incidents to management and stakeholders.6.
Collaboration and Stakeholder Management
Collaborate with various IT teams Infrastructure, Applications, Project) and external vendors to implement and maintain security controls and measures.Provide security advisory and recommendations to support projects and system implementations.Act as the key liaison with stakeholders SIRO/SIRM, IT, Application Teams) and cloud service providers to align security-by-design principles, cybersecurity strategies and compliance requirements.Qualifications:
Education & Experience
Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related discipline.Minimum 3 years of experience in Security Operations.Technical Skills
Hands-on experience with security tools SIEM, WAF, AV, EDR, PAM, DAM).Deep understanding of vulnerability management, threat analysis, and incident response (IR) processes.Good understanding of secure network design, endpoint security, and system hardening techniques.Familiarity with ICT security compliance frameworks, cybersecurity standards, and risk management practices.Familiar with IaC security Terraform, CloudFormation) and CI/CD security.Certifications
Professional certifications such as CISSP or CISM are preferred.Cloud certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate or equivalent would be advantageous.Other Skills
Strong analytical and problem-solving skills with attention to detail.Effective communication skills, both written and verbal, with the ability to clearly articulate security risks and recommendations.Ability to work independently with minimal supervision and collaboratively within a team in a dynamic and fast-paced environment.Proactive mindset with a continuous improvement attitude towards cybersecurity operations.#LPS
Additional Locations: * Singapore - Central Singapore - Singapore * Singapore - Central Singapore - SINGAPORE * Singapore * Singapore - Central Singapore * Singapore - Central Singapore - Singapore , * Singapore - Central Singapore - SINGAPORE