Job Search and Career Advice Platform

Enable job alerts via email!

Senior Specialist, Cybersecurity

U Mobile

Kuala Lumpur

On-site

MYR 120,000 - 150,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A telecommunications company in Kuala Lumpur is seeking a Cyber Security Operations leader to oversee the security strategy and operations. This role involves managing a team of analysts, responding to incidents, and ensuring compliance with security policies. The ideal candidate will have strong expertise in cybersecurity management, cloud security, and incident response. This is a crucial role to mitigate risks and enforce security governance within the organization.

Benefits

Health insurance
Training and development programs

Qualifications

  • Proven experience in cybersecurity operations and management.
  • Strong knowledge of cloud security practices and tools.
  • Experience managing incidents and conducting digital forensics.

Responsibilities

  • Lead cybersecurity operations and manage a team of analysts.
  • Monitor and respond to security incidents effectively.
  • Develop and implement security controls for cloud platforms.

Skills

Cybersecurity strategy planning
Security operations management
Incident response
Cloud security
Vulnerability management
Communication skills

Education

Relevant degree in Cybersecurity or related field

Tools

Endpoint Detection & Response (EDR)
Cloud platforms (AWS, Azure, Google Cloud)
Security assessment tools
Job description

Job SummaryThis role is for a Cyber Security Operations leader who will be responsible for planning, managing, and executing the overall security strategy. Key activities involve supervising a team of security analysts, overseeing day-to-day security operations like monitoring, troubleshooting, and incident response/forensics. The position also supports security governance, compliance, threat intelligence, and involves performing technical evaluations (POCs), as well as developing and delivering security awareness training.

Day-To-Day Activities
1. Security Operations and Troubleshooting
  • Assist the Cyber Security Operations Manager in planning, implementing, and managing the overall security operations strategy.
  • Supervise a team of security analysts and engineers, providing guidance, support, and training as needed.
  • Conduct regular security assessments, penetration testing, and vulnerability assessments to identify and mitigate risks.
  • In-depth knowledge in Endpoint Detection & Response (EDR/XDR) solutions.
  • Knowledgeable in IT networking, Network security solutions, WAF, Privilege Access Management (PAM), Virtualizations.
  • Technically capable in conducting POCs and related to cybersecurity.
  • Capable in plan and managed a multiple cybersecurity project simultaneously.
  • Monitor security systems and tools, investigating and responding to security incidents in a timely manner.
  • Coordinate with cross-functional teams, department and divisions to ensure compliance with established security policies, standards, and procedures.
2. Cloud Security
  • Apply your knowledge of cloud platforms (e.g., AWS, Google Cloud, Azure, etc) to develop and implement robust security controls and measures.
  • Work closely with the Cloud Operations team to ensure the security of cloud-based infrastructure, services, and applications.
  • Identify and address cloud-specific security risks, such as misconfigurations, data breaches, and unauthorized access.
  • Stay updated on the latest cloud security trends, emerging threats, and best practices to proactively address potential vulnerabilities.
3. Incident Response Handling and Forensic
  • Assist or lead and participate in incident response activities, including containment, eradication, and recovery.
  • Conduct digital forensics investigations to determine the root cause of security incidents and develop remediation plans.
  • Collaborate with internal stakeholders and external partners, such as law enforcement agencies, to address complex security incidents.
4. Support in Security Governance and Compliance
  • Assist in enforcing U Mobile security policies, standards, and procedures aligned with industry best practices and regulatory requirements.
  • Assist in periodic security audits and assessments to evaluate compliance with internal and external security standards.
  • Prepare and present reports or Root cause analysis (RCA) on security metrics, incidents, and risks to senior management and relevant stakeholders.
5. Vulnerability Management & Threat Intelligence
  • In-depth knowledge in VAPT assessment, scanning, identifying, assessing, reporting on, managing and remediating cyber vulnerabilities across endpoints, workloads, and systems.
  • Knowledge in cyber threat intelligence system and able to discovered, corelate and take action on discovered threats to reduced company risks.
  • Unauthorized Device Hunting
  • Perform regular security scans to detect unauthorized devices on the network.
  • Verify device identity and usage, escalating suspicious findings for further management action.
  • Document and report unauthorized device incidents to senior management.
6. Security Operations Ticket Handling
  • Capable on 24x7 standby (on rotational basis – if necessary) to handle security tickets.
  • Ensure timely response and closure of tickets within agreed SLA.
  • Escalate significant security events or incidents following established SOPs.
7. Technical Evaluation and testing
  • In charge in performing prove of concept (poc) on any technology related to cybersecurity.
  • Capable in creating test matrix suitable to U Mobile environment and writing details reports
  • Work closely with technology providers / vendors and ensure poc to be completed within the required timeline
8. Security Awareness and Training
  • Assist in developing and delivering security awareness programs to educate employees about security best practices and potential threats.
  • Conduct security training sessions for staff members to enhance their understanding of security protocols and procedures.
9. Documentation and Reporting
  • Maintain accurate records of security-related activities using internal system or equivalent tools.
  • Prepare and submit reports with recommended actions on identified cybersecurity issues.
  • Support in updating security policies, standards, and procedures.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.