Job Search and Career Advice Platform

Enable job alerts via email!

MIS Department Manager

Jobstreet Malaysia

Seberang Perai

On-site

MYR 200,000 - 250,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A recruiting firm in Malaysia seeks a Cybersecurity Manager to develop and implement strategies, oversee network security, and manage IT infrastructure. The role includes leading a team, ensuring compliance with regulations, and collaborating with various departments. Candidates should have experience in cybersecurity and IT management. This position offers opportunities for professional growth and influence on organizational security posture.

Qualifications

  • Experience implementing cybersecurity strategies and best practices.
  • Strong knowledge of network monitoring and incident response.
  • Proven ability in managing IT infrastructures and hardware components.

Responsibilities

  • Develop and implement cybersecurity policies and procedures.
  • Oversee monitoring of networks and systems for security breaches.
  • Manage procurement and maintenance of IT hardware.

Skills

Cybersecurity strategies
Network monitoring
IT infrastructure management
Vendor management
Job description

Develop and implement cybersecurity strategies, policies, procedures, and best practices to protect the organisation's digital assets and sensitive information.

Oversee the monitoring of networks, systems, and applications for security breaches or intrusions. Implement proactive measures to detect and respond to security incidents promptly.

Promote cybersecurity awareness and training programs for employees to ensure compliance with security policies and enhance overall cybersecurity posture.

Plan, design, and manage the organization’s IT infrastructure including servers, network devices, and data centres.

Oversee the procurement, installation, configuration, and maintenance of hardware components such as servers, routers, switches, and storage devices.

Monitor hardware performance and capacity, and implement upgrades or replacements as needed to ensure optimal performance and reliability.

Manage the deployment, configuration, and maintenance of software applications and systems across the organization.

Ensure compliance with software licensing agreements and manage software inventory effectively.

Patch Management: Implement and oversee patch management processes to ensure systems are up-to-date with security patches and updates.

Lead a team of IT professionals responsible for cybersecurity, hardware, and software functions. Provide guidance, coaching, and performance evaluations.

Collaborate with other departments such as legal, compliance, and business units to align IT initiatives with organizational goals and regulatory requirements.

Vendor Management: Manage relationships with external vendors, service providers, and consultants for cybersecurity tools, hardware, and software solutions.

Develop IT strategies and roadmaps related to cybersecurity, hardware, and software to support business objectives and growth.

Develop and manage budgets for cybersecurity initiatives, hardware upgrades, and software acquisitions.

Identify and assess IT risks related to cybersecurity, hardware, and software, and implement risk mitigation strategies.

Ensure compliance with relevant laws, regulations, and standards related to cybersecurity, data protection, and IT operations.

Develop and enforce IT policies, procedures, and standards related to cybersecurity, hardware, and software usage and management.

Monitor and analyze the performance of cybersecurity measures, hardware systems, and software applications. Implement improvements based on metrics and feedback.

Stay updated with industry trends and emerging technologies related to cybersecurity, hardware, and software. Evaluate and recommend adoption of new technologies that could enhance organizational efficiency and security.

Be careful - Don’t provide your bank or credit card details when applying for jobs. Don't transfer any money or complete suspicious online surveys. If you see something suspicious, report this job ad.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.