Job Search and Career Advice Platform

Enable job alerts via email!

Security Architect

Teleport

Kuala Lumpur

On-site

MYR 150,000 - 200,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading tech company based in Kuala Lumpur seeks a Security Architect to oversee the enterprise security framework across multi-cloud environments, including GCP and Tencent Cloud. The role focuses on security compliance, proactive monitoring design, and ensuring security controls meet ISO 27001 standards. Candidates should possess 3-4 years of experience in security architecture or governance roles and strong knowledge of Java/Spring Boot security and regulatory requirements across Southeast Asia.

Qualifications

  • 3–4 years of experience in Security Architecture, Security Engineering, GRC, or Cloud Security Governance roles.
  • Strong understanding of Java/Spring Boot security concepts and OWASP Top 10 risks.
  • Working knowledge of ISO 27001 and its translation into technical requirements.

Responsibilities

  • Define centralized security monitoring and alerting architecture across multiple clouds.
  • Establish security architecture blueprints and policies for applications across regions.
  • Define security requirements for Secure SDLC including SAST/DAST expectations.

Skills

Security Architecture
Regulatory Compliance
Monitoring Design
Java/Spring Boot security
MongoDB security controls
ISO 27001
GCP
Tencent Cloud

Tools

SIEM / log management solutions
Cloudflare security capabilities
Job description

Security Architect – Governance, Risk, and Compliance & Platform Security

Role Overview

As a Security Architect, you will be responsible for defining and governing our enterprise security framework across a multi-cloud environment spanning GCP and Tencent Cloud.

This role focuses on security architecture, regulatory compliance, proactive monitoring design, and audit readiness, rather than day‑to‑day cloud operations. You will guide engineering and infrastructure teams on what must be built and why, ensuring security controls align with ISO 27001 and regional regulatory requirements across China and South‑East Asia.

You will act as the bridge between compliance, security design, and engineering execution, ensuring security is embedded into platforms and applications by default.

Key Responsibilities
1. Proactive Security Monitoring & Threat Governance (Top Priority)
  • Define a centralized security monitoring and alerting architecture across GCP, Tencent Cloud, and Cloudflare.
  • Specify log sources, retention policies, and alerting standards to ensure real‑time visibility into security events.
  • Design threat detection use cases and “tripwires”, such as:
  • Unauthorized MongoDB data access or exports
  • Brute‑force or abuse patterns on Java/Spring Boot APIs
  • Privileged access or IAM changes in Tencent Cloud
  • Work with DevOps and SRE teams to ensure monitoring controls are implemented, tested, and continuously improved.
2. Security Architecture & Standards
  • Define and document security architecture blueprints and policies for applications and platforms operating across multiple regions.
  • Establish identity, access control, and network isolation standards, ensuring least‑privilege and segregation of duties.
  • Define data protection requirements, including encryption at rest and in transit, secure key management, and access auditing for MongoDB.
  • Specify defense‑in‑depth requirements, including expectations for Cloudflare (WAF, Zero Trust, DDoS) and application‑level security controls.
  • Review solution designs and provide security sign‑off for new initiatives and major changes.
3. Secure SDLC & Vulnerability Management
  • Define security requirements for Secure SDLC, including SAST/DAST expectations within CI/CD pipelines.
  • Establish vulnerability severity criteria and remediation SLAs aligned with risk and regulatory impact.
  • Ensure application security standards address OWASP Top 10 risks for Java/Spring Boot services.
  • Partner with engineering teams to ensure security findings are tracked, resolved, and verified.
4. ISO 27001 & Regulatory Compliance (Core Focus)
  • Lead the technical interpretation and implementation of ISO 27001 controls, acting as the primary security architecture point of contact.
  • Translate regulatory requirements into practical technical and monitoring controls.
  • Maintain continuous audit readiness by defining automated evidence collection for:
  • Access reviews
  • Logging and monitoring
  • Vulnerability scans
  • Configuration compliance
  • Support internal and external audits with clear, well‑documented security evidence.
5. China & South‑East Asia Regulatory Knowledge
  • Provide security guidance aligned with China’s regulatory frameworks (e.g., MLPS 2.0, data localization requirements).
  • Advise teams on South‑East Asia regulatory considerations, such as:
  • Malaysia (PDPA)
  • Thailand (PDPA)
  • Ensure cross‑border data access and storage designs are reviewed for regulatory impact and compliance risk.
  • Work with legal, compliance, and product teams to ensure security architecture supports regional expansion.
Requirements
Technical & Professional Requirements
Experience
  • 3–4 years of experience in Security Architecture, Security Engineering, GRC, or Cloud Security Governance roles.
Application & Platform Security
  • Strong understanding of Java/Spring Boot security concepts and OWASP Top 10 risks.
  • Knowledge of MongoDB security controls, including RBAC, TLS, encryption, and audit logging.
Monitoring & Security Tooling
  • Experience designing or governing SIEM / log management solutions (e.g., ELK, Datadog, or cloud‑native tools).
  • Familiarity with Cloudflare security capabilities (WAF, Zero Trust, DDoS), from a design and governance perspective.
Compliance & Regulation
  • Working knowledge of ISO 27001 and how to translate controls into technical and operational requirements.
  • Awareness of China and South‑East Asia data protection and cybersecurity regulations and their impact on system design.
What Success Looks Like
  • Clear, enforceable security standards adopted across engineering teams.
  • Proactive detection of security risks through well‑defined monitoring and alerting.
  • Strong alignment between security architecture and regional regulatory requirements.
  • Audit‑ready posture for ISO 27001 with minimal manual effort.
  • Security viewed as an enabler, not a blocker, by product and engineering teams.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.