Job Search and Career Advice Platform

Enable job alerts via email!

Senior Specialist, Cyber Defense

GXBank

Selangor

On-site

MYR 100,000 - 150,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading digital bank in Malaysia is seeking an experienced professional to lead cyber security incident management efforts. The ideal candidate will have a Bachelor's degree and at least 4 years of experience in Enterprise Incident Response or Security Operations. This role requires expertise in cyber security frameworks, log analysis tools, and incident response strategies. The bank offers competitive compensation and a collaborative work environment focused on innovation and technology.

Qualifications

  • Relevant Security or Technical certifications such as (ISC)2, SANS, OSCP.
  • Minimum 4 years of Enterprise Incident Response and/or Security Operations Centre experience.
  • Operational experience with log aggregation and analysis platforms.

Responsibilities

  • Lead investigation efforts for cyber security incidents.
  • Conduct live response analysis and malware triage.
  • Communicate progress and findings to the Incident Management team.

Skills

Cyber Incident Management
Splunk
Incident Response
Forensic analysis
Programming/Scripting

Education

Bachelor's degree in a related area

Tools

AWS
GCP
Azure
Job description
Overview

GX Bank Berhad - the Grab-led Digital Bank - is the FIRST digital bank in Malaysia, approved by BNM to commence operations. We aim to leverage technology and innovation to serve the financial needs of the unserved and underserved individuals, and micro and small medium enterprises.

We are driven by our shared purpose and passion to bring positive transformation to the banking industry, starting with solutions that address the financial struggles of Malaysians and businesses.

Role
  • Lead and coordinate the investigation effort for cyber security incidents from initial escalation through after-action reporting.
  • Accountable to lead the response effort for security incidents including review of alert post-escalation, investigation of the incident, containment of the threat, and remediation of issues leading to the threat.
  • Conduct live response analysis, network analysis, log analysis, and malware triage in support of incident response investigation.
  • Effectively communicate investigative progress, findings, opportunities and challenges to the Incident Management team.
  • Manage intake of incidents and reports from Security Operations Center and respective stakeholders using the internal case management system in a timely and accurate manner.
  • Serve as Subject Matter Expert for cyber security incidents in meetings with internal and external teams.
The must haves
  • Bachelor's degree in a related area.
  • Relevant Security or Technical certifications including but not limited to (ISC)2 , SANS, OSCP.
  • Knowledge or experience with Cyber Incident Management programs.
  • Minimum 4 years of Enterprise Incident Response and/or Security Operations Centre experience.
  • Functional knowledge of Cyber Security and Incident Response foundations, theory, terminology (Kill Chain, TTPs, APT, Threat Hunting).
  • Operational experience with Splunk, ELK/Elastic, or similar log aggregation and log analysis platforms.
  • Familiar with Cloud technologies (e.g. AWS, GCP, Azure).
  • Breach Incident Response Experience (Scoping, Sweeping, Containment, Remediation Planning).
  • Ability to work independently on a variety of assignments with minimal supervision.
  • Programming/scripting experience is an asset.
  • Unix/Linux and Windows System Administration experience.
  • Knowledge of / experience with enterprise security tools.
  • Malware, Network, Web, and Forensic analysis skills.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.