Role Overview:
The role involves safeguarding systems, applications, and infrastructure through proactive vulnerability management, the application of security controls, secure development practices, incident response, and continuous threat monitoring. You will collaborate with both internal teams and external service providers to enhance the cybersecurity posture and align with best practices and industry standards.
Key Responsibilities:
Vulnerability Management & Assessment:
- Evaluate the cybersecurity aspects of design proposals across various systems, applications, and infrastructure.
- Source, manage, and oversee external vendors conducting annual vulnerability assessments and penetration tests.
- Review assessment reports and recommend remediation actions for identified weaknesses.
Implementation of Security Controls:
- Recommend and implement security controls based on industry best practices, standards, and guidelines (e.g., OWASP Top 10, NIST, CIS).
- Contribute to the development and maintenance of security policies, procedures, configurations, and standards aligned with ISO 27001.
- Participate in internal audits and reviews to ensure the effectiveness of the ISMS and security controls.
Secure Development Practices:
- Integrate secure coding practices and OWASP Top 10 recommendations throughout the software development lifecycle (SDLC).
- Collaborate with developers to identify and address security vulnerabilities during design and coding phases.
Incident Response & Recovery:
- Monitor logs for signs of malicious activity and potential data breaches.
- Coordinate with contractors, security vendors, and internal teams to manage incidents, identify root causes, and implement recovery procedures.
Continuous Learning & Threat Awareness:
- Stay informed on the latest cybersecurity threats, vulnerabilities, mitigation techniques, and emerging technologies.
- Attend training, read industry publications, and participate in conferences as needed to maintain up-to-date knowledge.
Collaboration & Security Awareness:
- Work closely with security professionals and the governance team to educate colleagues on security best practices and raise awareness about potential threats.
Qualifications:
Educational Background:
- Degree in Information Systems/Technology, Computer Engineering, Computer Science, Information and Communications Technology (ICT), or a related field.
Certifications:
- Preferred certifications: CISSP, CISA, CISM, CompTIA Security+, or equivalent.
Experience & Skills:
- Strong understanding of cybersecurity principles and best practices, with at least 5 years of relevant experience managing contractors and designing cybersecurity solutions.
- Experience in drafting tender specifications for vulnerability assessments, penetration testing, and creating SOPs for incident response.
- Proficiency with security tools, log extraction techniques, and related technologies.
Interested candidate who wish to apply for the advertised position, please click on Apply Now. We regret that only shortlisted candidates will be notified.
EA License NO.: 01C4394
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its overseas subsidiaries and affiliates collecting, using and disclosing your personal data to prospective employers/companies based in any country for purposes of evaluating suitability for employment, conducting reference checks, administering employment related services and such other purposes stated in our privacy policy. Our full privacy policy is available at www.persolkelly.com.sg. If you wish to withdraw your consent, please drop us an email to let us know.