Are you a Cyber Security expert in helping businesses embrace digital transformation securely and protecting data? An attractive opportunity awaits you to join an established organisation. You will be responsible for developing and conducting vulnerability assessment, security analytics, malware analysis, managing penetration testing to ensure the resiliency of the large enterprise systems.
Degree in Computer Science, Computer Engineering or Information System;
At least 5 years of experience in vulnerability assessment, threat detection or vulnerability / incident Management;
Good knowledge of cyber security concepts and technologies;
Possesses hands on experience and skills in malware analysis, cyber analytics, threat detection, ethical hacking, computer forensics, end-point detection etc.;
Proven record in identification, investigation and resolution of potential IT security risks, controls and process gaps;
Ability to constantly manage controls and processes with strong attention to details;
Preempt any risks and mitigate any threats or problematic areas proactively;
Strong problem solving and analytical skills with excellent oral and written communication, strong team player and interpersonal skills.
Knowledgeable in COBIT, ISO27001/2 and international practices (NIST, STIG, CIS).
Manage & maintain Vulnerability Management System (VMS) to identify vulnerabilities or confirm compliance to security standards;
Perform technical / security reviews on servers, network devices, applications;
Follow up with respective owners on the actions to be taken from the Vulnerability Assessment outcome, ensuring all issues detected are remediated accordingly;
Drive Threat Intelligence projects' definitions and implementations;
Define and implement enhanced detection and protection capabilities leveraging IOCs propagation in IT Security Solutions;
Coordinate with Engineering team to configure uplifts in Protect or Detect solutions;
Identify weaknesses and vulnerabilities within the systems and proposing / implementing countermeasures;
Review, endorse, align and ensure information security compliance with proper risk management and migration plans.