Key Roles and Responsibilities
Conduct risk assessment on digital solutions and third parties.
Identify potential risks and provide options to protect the OT critical infrastructure, ICT Infrastructure, application systems and cloud environment.
Conduct compliance check on internal controls to ensure compliance with established policies and applicable regulations.
Assist in developing policies, standards and guidelines to safeguard digital assets in adherence to business needs, industrial best practices and regulatory requirements.
Provide advisory services to internal departments on business digital initiatives using Security By design / Zero Trust framework to ensure consistency in controls.
Manage security projects and solution implementation activities that address cybersecurity risks.
Plan, design and conduct cyber security incident response workshops and exercises (table-top exercises, simulation, and drills)
Be aware of latest industry standards, regulatory requirements and the potential impacts to cybersecurity policies, standards and procedures.
Qualifications & Experience
Minimum 5 years’ experience in Cybersecurity, Risk and Compliance
Knowledgeable in security standards or regulations such as NIST, ISO 27001, SOC2, CCOP (SG), PDPA (SG), GDPR(EU), MPLS(CN), Security by Design
Technical know-how and experience in solutions such as (but not limited to)
· Cloud Infrastructure, e.g. Azure, AWS, Huawei, Ali
· Cloud compliance e.g., Cloud Posture Management, Workload protectio
· Awareness Platform e.g., Proofpoint, Knowbe4
· Network Security e.g., F/W, IPS, Remote Access, NAC, Data Diode
· Content Security e.g., Web, Email protection
· End point Security e.g., AV, EDR, DLP
· Identify Protection e.g., MFA, Privilege access management
· Threat Management e.g., SIEM, UEBA, NDR, ASM, BAS
· GRC Tool e.g., RSA Archer
· Hardening guidelines for MS products, Linux
· Vulnerability Assessment and Application Testing Tool e.g., Tenable, Qualys, Veracode, Synopsys etc.
· System development lifecycle or DevOps framework
• Certifications such as CISA, CISM, CISSP, GICSP, CCSK, CRISC will be an added advantage
• Knowledge in OT solutions and security will be an added advantage
#J-18808-Ljbffr