Current jobs related to Senior Cyber Security Vulnerability Management - Malaysia - Sovereign’s Capital
-
Cyber Security Vulnerability Management Analyst
5 months ago
Malaysia NodeFlair Full time**Job Summary**: **Job Type** **Seniority** **Years of Experience** Information not provided In your new role you will: - Risk identification: Identifying and categorizing vulnerabilities based on their potential impact and likelihood of exploitation to prioritize remediation efforts effectively. - Scanning and testing: Utilizing automated scanning tools...
-
Graduate Cyber Security Consultant
6 months ago
Malaysia Wizlynx Group Full time**Key Role** As an upcoming or recent graduate within the Cyber Security curriculum, you will participate in a variety of engagements, conducting hands-on penetration testing beyond automated tool validation, which will focus on targets that may include network devices, servers, web and mobile apps, web APIs, wireless infrastructures, IoT devices, and other...
-
Product Manager
1 month ago
Malaysia Classy Wheeler Limited Full timeLeading telecom carrier and IT solutions company Job Description Candidates with more experience will be considered as Senior Product Manager (Cyber Security). Responsibilities Responsible for the P&L of the cyber security business. Develop and manage the cyber security products development cycle. Drive the growth of the security business in terms of...
-
Vice President
5 months ago
Malaysia Hays Full time**Your new company** Based in Cyberjaya, this organisation is a beacon in the cybersecurity landscape, renowned for its commitment to excellence and innovation. **Your new role** Report to CTO, this role will lead the charge in strategising, planning, and formulating proactive cybersecurity services. - This position is pivotal in shaping the security...
-
Cyber Security Executive
5 months ago
Malaysia NodeFlair Full time**Job Summary**: **Job Type** **Seniority** Mid **Years of Experience** Information not provided **Tech Stacks** Windows Server VMware JOB DETAIL Maintaining the company’s IT network, server and security systems JOB REQUIREMENT - Computer Systems / Networking / Systems Engineer degree and / or evedence of significant industry experience, together with...
-
Security Operations Centre My
5 months ago
Malaysia CIMB Group Full time**Job Purpose * The Bank has established Security Monitoring Process and Cyber Security Incident Response Process to detect and response to security incidents, and drive timely containment and remediation of the incident. **Key Responsibilities ** - Handle escalated security incident investigation and response from Tier-1: SOC Analyst. - Oversight on...
-
Security Analyst
7 months ago
Malaysia Ensign InfoSecurity Full timeEnsign is hiring ! Evaluates, tests, monitors and maintains information systems (IS) and cyber security policies, procedures and systems I Creates, implements and oversees identity management systems to meet specific security needs and complex compliance standards | Ensures that IS and cyber security plans, controls, processes, standards, policies and...
-
Advanced Cyber Security Architect/Engineer
2 months ago
Malaysia oilandgas Full timeJoin the industry leader to design the next generation of breakthroughs THE FUTURE IS WHAT WE MAKE IT Senior Advanced Cyber Security Architect / Engineer Kuala Lumpur, Malaysia Honeywell offers employees the opportunity to work on the world's most exciting projects, redefining the cities we live in, the buildings where we work, and the vehicles that move...
-
Advanced Cyber Security Architect/Engineer
2 months ago
Malaysia oilandgas.org.uk Full timeJoin the industry leader to design the next generation of breakthroughs THE FUTURE IS WHAT WE MAKE IT Senior Advanced Cyber Security Architect / Engineer Kuala Lumpur, Malaysia Honeywell offers employees the opportunity to work on the world's most exciting projects, redefining the cities we live in, the buildings where we work, and the vehicles that...
-
Security Analyst Level 2
5 months ago
Malaysia Ensign InfoSecurity Full timeEnsign is hiring ! L2 Analyst **Responsibilities**: - Monitor third party security feeds, forums, and mailing lists to gather information related to the client through automated means - Produce intelligence outputs to provide an accurate depiction of the current threat landscape and associated risk through the use of customer, community, and open source...
-
Gcs - Tier 2 Analyst My (Tier 2 - Security Analyst)
5 months ago
Malaysia CIMB Group Full time**Job Purpose ** - The Bank has established Security Monitoring Process and Cyber Security Incident Response Process to detect and response to security incidents, and drive timely containment and remediation of the incident.**Key Responsibilities ** - Handle escalated security incident investigation and response from Tier-1: SOC Analyst. - Oversight on...
-
Cyber Threat Intelligence Analyst
7 months ago
Malaysia Ensign InfoSecurity Full timeEnsign is hiring ! Evaluates, tests, monitors and maintains information systems (IS) and cyber security policies, procedures and systems I Creates, implements and oversees identity management systems to meet specific security needs and complex compliance standards | Ensures that IS and cyber security plans, controls, processes, standards, policies and...
-
Product Manager
4 weeks ago
Malaysia Classy Wheeler Limited Full timeLead a team to drive growth in the cyber security business, leveraging market research and go-to-market strategies to enhance customer experience. Job Description As a Senior Product Manager, you will be responsible for the P&L of the cyber security business, developing and managing the cyber security products development cycle, and driving the growth of...
-
Security Analyst L1
5 months ago
Malaysia Ensign InfoSecurity Full timeEnsign is hiring ! **Responsibilities**: - Perform security monitoring, vulnerability management, data loss / policy violation prevention and threat hunting - Monitor security sensors and review logs to identify network anomalies or intrusions - Provide analysis from monitoring, research and assessment of security log data from a large number of...
-
Cloud Solution Security Architect
4 months ago
Malaysia NodeFlair Full time**Job Summary**: **Salary** RM13,000 - RM15,999 / Monthly **Job Type** **Seniority** Lead **Years of Experience** Information not provided **Tech Stacks** Strategy AWS Docker Azure Kubernetes C Job Description A professional at this position level must have the following responsibilities: a) Establish security requirements for cloud-based solutions by...
-
Cloud Solution Security Architect
4 months ago
Malaysia NodeFlair Full time**Job Summary**: **Salary** RM13,000 - RM15,999 / Monthly **Job Type** **Seniority** Lead **Years of Experience** Information not provided **Tech Stacks** Strategy C Job Description A professional at this position level must have the following responsibilities: a) ICS/OT Security Architecture vision and strategy & strategy alignment - Ensure alignment...
-
Security Analyst Level 1
5 months ago
Malaysia Ensign InfoSecurity Full timeEnsign is hiring ! L1 **Responsibilities**: - Perform security monitoring, vulnerability management, data loss / policy violation prevention and threat hunting - Monitor security sensors and review logs to identify network anomalies or intrusions - Provide analysis from monitoring, research and assessment of security log data from a large number of...
-
Security Engineer
2 months ago
Malaysia Prometric Ireland Limited Full timeKuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia Job Description About Us: Prometric is a leading provider of technology-enabled testing and assessment solutions to many of the world’s most recognized licensing and certification organizations, academic institutions, and government agencies. We support more than 7 million test takers annually at...
-
Information Security Digital Data Reviewer
5 months ago
Malaysia NodeFlair Full time**Job Summary**: **Job Type** **Seniority** Junior **Years of Experience** Information not provided **Role Summary** - As a content reviewer, you will be tasked with working on workflows that focus on apps that pose security risks to users. - Collaborate with multiple teams such as cyber security experts, client stakeholders and other peer teams for...
-
Gcs - Crypto My (Crypto Lead)
5 months ago
Malaysia CIMB Group Full time**Job Purpose ** - Manages and continuously enhances the capabilities within Data Security portfolio by providing expert advice and drives various PKI, Certificate Management, encryption & key management initiatives within the bank. Excellent collaborator with business, divisions and offers technical guidance to respective stakeholders**Key Responsibilities...
Senior Cyber Security Vulnerability Management
3 months ago
Company Description
Life at Grab
At Grab, every Grabber is guided by The Grab Way, which spells out our mission, how we believe we can achieve it, and our operating principles - the 4Hs: Heart, Hunger, Honour and Humility. These principles guide and help us make decisions as we work to create economic empowerment for the people of Southeast Asia.
Job Description
Get to know the team
The Cyber Security Policy, Audit Support & Remediation team is a young experienced team primarily responsible for developing, implementing, and maintaining robust cyber security policies. The policies are crucial to define the organization’s cyber security stance, set expectations, assign responsibilities, and enable concrete steps in case of a security breach. We serve as the key point of interaction for internal and external auditors and regulators, overseeing information requests, evidence gathering, and issue deliberation. If you are looking for an environment to grow and improve your skills in cybersecurity, we welcome you to be part of our team
Get to know the role
The Cyber Security Policy, Audit Support & Remediation team is expanding our responsibilities to manage the reporting of vulnerabilities to Senior Management and the Board. The ideal candidate should understand the technical aspects of collating vulnerability data, analyzing the data to identify trends, and preparing dashboards and charts to report the results. You should have experience in triaging vulnerabilities and know how to determine the impact and severity of a vulnerability to enterprise systems. You will be working with multiple stakeholders from cybersecurity and engineering teams to prepare the reports.
The Day-to-Day Activities
-
Vulnerability Management: Responsible for the complete life cycle of vulnerabilities including identifying, categorizing, prioritizing, remedying, and mitigating potential system vulnerabilities. This will involve:
Identification: Discovering potential vulnerabilities across our IT and cloud assets.
Categorization: Classifying identified vulnerabilities based on their nature and potential impact.
Prioritization: Determining the order in which vulnerabilities must be addressed based on factors like severity, exploitability, and business impact.
Remediation: Planning and proposing actions to correct identified vulnerabilities.
VM Triaging: Apply your knowledge of vulnerability management to triage vulnerabilities effectively, ensuring the most high-impact vulnerabilities are addressed first.
-
Automation & Reporting: Develop and employ automated solutions for vulnerability management reporting, streamlining the process, and ensuring accurate, timely reports. You will be expected to:
Automation: Develop and utilize automation methods for the identification, reporting and remediation of vulnerabilities, making the process more efficient.
Reporting: Generate accurate and timely reports on current vulnerabilities, their status, and remediation, which would benefit both technical and executive audiences.
Cross-functional Collaboration: Work with different teams to drive vulnerability resolutions and increase awareness about potential threats, vulnerabilities, and remediation tactics across the organization.
Continuous Improvement: Stay updated with the latest vulnerability trends and threats, ensuring Grab's systems remain secure and resilient.
Qualifications
The Must-Haves
- At least 5 years of experience focusing on vulnerability management in a complex technological environment.
- In-depth knowledge and hands-on experience with vulnerability triaging.
- Knowledge of vulnerabilities and misconfigurations in Cloud native applications
- Proven track record of leveraging automation for vulnerability management reporting.
- Excellent problem-solving skills and process-oriented thinking.
- Good communication skills, with the ability to converse technically with IT professionals and simplify complex concepts for non-technical stakeholders.
- BSc/MSc in Computer Science, Information Security, or a related field. Relevant professional certifications (e.g., CISSP, CISM, CEH) would be advantageous.
The Nice-to-Haves
- Knowledge on OWASP web Top 10 and OWASP API Security Top 10, OSCP certification
- Experience using tools such as Nmap, Wiz, Nessus, BurpSuite, Metasploit, etc.
- Basic knowledge in data technologies and analytical tools (e.g. SQL, Data Lake, Data Warehouse, PowerBI, Elastic, Kibana)
- Experience in creating dashboards and data visualizations (e.g., in Excel, PowerBI, Kibana) for reporting key metrics and stats would be an advantage
- Experience with programming in Python
- Knowledge of vulnerability management processes and solutions
Additional Information
Our Commitment
We recognize that with these individual attributes come different workplace challenges, and we will work with Grabbers to address them in our journey towards creating inclusion at Grab for all Grabbers.