Job Search and Career Advice Platform

Enable job alerts via email!

IT and Cyber Risk Manager

ADI Resourcing

Petaling Jaya

On-site

MYR 80,000 - 120,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A cybersecurity firm is seeking a professional to safeguard their networks and systems. The candidate will monitor internet and email security, respond to vulnerabilities, and conduct assessments. Applicants must have a Bachelor's degree in IT or Information Security, 5-8 years of relevant experience, and strong analytical skills with effective communication abilities. This position requires managing security incidents and ensuring compliance with cyber laws, along with in-depth knowledge of networking protocols.

Qualifications

  • 5-8 years of experience in cybersecurity or related fields.
  • Proficiency in analyzing logs and network data.
  • Understanding of TCP/IP and common networking protocols.

Responsibilities

  • Monitor and maintain internet and email security.
  • Respond to and resolve security incidents.
  • Ensure testing of network for security violations.

Skills

Vulnerability assessments
Cybersecurity awareness
Effective communication
Analytical skills

Education

Bachelor's degree in IT or Information Security

Tools

Vulnerability scanning tools
Cloud Security tools
Job description
Responsibilities
  • Monitor and maintain the internet, email and web security for entire organization.
  • Track, monitor, analyze and resolve any vulnerability or security issue.
  • Monitor new CVE and ensure affected systems are being patched accordingly.
  • Respond and resolve any vulnerability or security incident that may arise.
  • Act as the point of contact on any security incidents to respond, isolate, remediate, or resolve the incident quickly.
  • Ensure periodic testing of the organizations network and systems to determine security violations and inefficiencies.
  • Stay up-to-date on the latest cyber threats and adapt CIS Benchmarks to proactively safeguard any new emerging security risks.
  • Manage user accounts and access controls.
  • Develop, implement and maintain the IT and Cyber security frameworks, procedures and policies.
  • Safeguard all network elements including but not limited to computer networks, local area networks (LANs), wide area networks (WANs), internet connections, intranet, VPNs, VLANs, VoIP and other data communication systems.
  • Monitor network performance, identify bottlenecks, and troubleshoot network issues.
  • Create user awareness with continuous education on Cybersecurity.
Key Skill Requirements
  • Proficiency in conducting regular vulnerability assessments of the systems to prevent any security incident.
  • Awareness of the latest methods used by hackers and malicious elements to break into systems.
  • Competency to use the available tools to discover any dubious movement in the network and system.
  • Soft skills including effective verbal communication and advanced written with all levels in the company.
  • Knowledge of cyber laws and compliance requirements as per the law of the land.
  • Ability to conduct an in-depth analysis of computer networks and identify any vulnerabilities in the system. Attention to detail is a fundamental personality trait for this position and able to meet deadlines with minimal supervision.
Qualification and Experiences Requirement
  • Bachelors degree in Information Technology (IT), Information Security (IS) or equivalent education with work related experience.
  • Minimum 5-8 years of prior relevant experience.
  • Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements.
  • Hands‑on experience analyzing high volumes of logs, network data (e.g., Full-Packet Capture FPC), and other attack artifacts in support of incident investigations.
  • Experience with vulnerability scanning and monitoring solutions.
  • Experience on Office365 and other Cloud Security (e.g., GCP, AWS, Azure).
  • Understanding of mobile technology and OS (e.g., Android, Huawei, iOS, Windows), VMware technology is a plus.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.