Information Security Analyst

1 week ago


Cyberjaya, Malaysia Advanced Micro Devices, Inc Full time

Overview:
**WHAT YOU DO AT AMD CHANGES EVERYTHING**

We care deeply about transforming lives with AMD technology to enrich our industry, our communities, and the world. Our mission is to build great products that accelerate next-generation computing experiences - the building blocks for the data center, artificial intelligence, PCs, gaming and embedded. Underpinning our mission is the AMD culture. We push the limits of innovation to solve the world’s most important challenges. We strive for execution excellence while being direct, humble, collaborative, and inclusive of diverse perspectives.

AMD together we advance_

**Responsibilities**:
**THE ROLE**:
The Third-Party Risk Analyst plays a crucial role in assessing, managing, and mitigating risks associated with external vendors, partners, and other third parties. This position is responsible for conducting third-party risk assessments, monitoring vendor compliance with company policies, and ensuring adherence to industry standards, legal regulations, and internal governance frameworks. The role requires cross-functional collaboration with teams such as IT, Legal, Procurement, and Information Security to evaluate risks and implement mitigating controls.

**THE PERSON**:

- Third-party risk assessments and monitoring.
- Supply chain risk analysis and mitigation.
- Responding to third-party cybersecurity questionnaires.
- Vendor due diligence and ongoing monitoring.
- TPRM process improvement and reporting.

**KEY RESPONSIBILITIES**:

- Third Party Risk Assessments: Conduct in-depth assessments of vendors, suppliers, and partners to identify potential risks in areas like cybersecurity, data protection, regulatory compliance, and operational resilience.
- Vendor Onboarding and Due Diligence: Assist in vendor onboarding by evaluating third-party risk questionnaires, reviewing contractual agreements, and ensuring compliance with internal policies and standards (e.g., NIST, ISO 27001, GDPR).
- Ongoing Monitoring: Continuously monitor third parties for changes in risk exposure, track remediation activities, and re-assess risks periodically to ensure ongoing compliance with company standards.
- Collaboration with Internal Teams: Work closely with IT, Security, Legal, and Procurement teams to address third-party risks and ensure that appropriate controls are in place and functioning as intended.
- Risk Reporting: Create and present risk assessment reports and dashboards to stakeholders, including senior leadership, highlighting areas of concern, key risks, and recommended mitigation strategies.
- Vendor Contract Reviews: Assist in reviewing contracts to ensure they include appropriate risk-related clauses, such as security controls, data privacy, liability, and business continuity terms.
- Regulatory Compliance: Ensure third-party risk management activities comply with applicable regulations, such as SOX, HIPAA, GDPR, CCPA, and others relevant to the organization.

**PREFERRED EXPERIENCE**:

- Knowledge of risk management frameworks such as NIST, ISO 27001, SOC 2, and other industry standards.
- Experience with third-party risk management tools (e.g., LogicGate, UpGuard, etc.) is a plus.
- Strong analytical skills and the ability to assess complex risk scenarios.
- Excellent written and verbal communication skills, with the ability to explain technical concepts to non-technical stakeholders.
- Ability to work independently and collaboratively across teams
- Certifications such as CISA, CRISC, or CISSP.
- Experience in risk assessment methodologies, including conducting compliance audits.

**ACADEMIC CREDENTIALS**:

- Bachelor’s degree in Information Systems Management, Information Security, Business Administration, or a related field.

**LOCATION**:
Penang, Malaysia

LI-JK1

LI-Hybrid

Qualifications:

- Benefits offered are described: _AMD benefits at a glance.



  • Cyberjaya, Malaysia Advanced Micro Devices, Inc Full time

    Overview: **WHAT YOU DO AT AMD CHANGES EVERYTHING** We care deeply about transforming lives with AMD technology to enrich our industry, our communities, and the world. Our mission is to build great products that accelerate next-generation computing experiences - the building blocks for the data center, artificial intelligence, PCs, gaming and embedded....


  • Cyberjaya, Selangor, Malaysia Tata Consultancy Services Full time 150,000 - 250,000 per year

    About TCS:Join Tata Consultancy Services, Asia Pacific and be part of an organization committed to sustainable development for our future. TCS follows the Tata group philosophy of building sustainable businesses that are rooted in the community and demonstrate care for the environment. Our unique values position us to combine a purpose-driven worldview with...


  • Cyberjaya, Malaysia Logicalis Full time

    **Description** We are looking for a Network Security Analyst to join our team in Cyberjaya. As a Network Security Analyst, you will be involved in following work instruction-based processes to deliver first-level support for network-related requests and issues. It entails ensuring compliance with customer service level agreements and serving as the primary...


  • Cyberjaya, Malaysia Logicalis Full time

    **Description** We are looking for a Network Security Analyst to join our team in Cyberjaya. As a Network Security Analyst, you will be involved in following work instruction-based processes to deliver first-level support for network-related requests and issues. It entails ensuring compliance with customer service level agreements and serving as the primary...


  • Cyberjaya, Malaysia Experian Full time

    Full-time Employee Status: Regular Role Type: Hybrid Department: Information Technology & Systems Schedule: Full Time **Company Description**: Experian is the world’s leading global information services company. During life’s big moments - from buying a home or a car, to sending a child to college, to growing a business by connecting with new...


  • Cyberjaya, Malaysia Experian Full time

    Company Description Experian is the world’s leading global information services company. During life’s big moments - from buying a home or a car, to sending a child to college, to growing a business by connecting with new customers - we empower consumers and our clients to manage their data with confidence. We help individuals to take financial control...


  • Cyberjaya, Malaysia Royal Bank of Canada Full time

    **Come Work with Us!** At RBC, our culture is deeply supportive and rich in opportunity and reward. You will help our clients thrive and our communities prosper, empowered by a spirit of shared purpose. Whether you’re helping clients find new opportunities, developing new technology, or providing expert advice to internal partners, you will be doing work...


  • Cyberjaya, Selangor, Malaysia Dagang Nexchange Berhad Full time 90,000 - 120,000 per year

    Responsibilities:Develop, document, and implement the IT policies and procedures in compliance with relevant legislation, regulations, and accreditation standards and requirementsImplementing and maintaining Information Security Management System (ISMS) certificationEnsure compliance with the IT Security Policy and ISMS certification as established by the...

  • Solution Specialist

    16 hours ago


    Cyberjaya, Malaysia vCyberiz Sdn Bhd Full time

    **Responsibilities**: - Implement, configure, and optimize Microsoft 365 and Azure Security & Compliance solutions across client environments. - Deploy and support Microsoft security platforms, including Microsoft Purview, Entra ID, Defender for Cloud, Defender for Office 365, and Defender for Endpoint, ensuring alignment with client security and compliance...

  • SOC Analyst

    3 days ago


    Cyberjaya, Malaysia Agensi Pekerjaan iForte Sdn Bhd Full time

    **Position: Analyst Dev Engineer / SOC Analyst** **Responsibility**: - Provide engineering support for SOC environment and its software life cycle management. - Test and deploy patches for SOC systems. - Supports SOC team in planning life-cycle of security log sources, including on-boarding, modifying and decommissioning of log sources. - Perform data...