Enable job alerts via email!

Senior Specialist, Cybersecurity

U Mobile Sdn Bhd

Kuala Lumpur

On-site

MYR 120,000 - 150,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading telecommunications company is seeking a Senior Specialist in Cybersecurity to lead security operations and manage the overall cybersecurity strategy. The ideal candidate will have over 10 years of experience in cybersecurity, specializing in incident response, threat intelligence, and vulnerability management. This role offers a dynamic environment with opportunities to work on cloud security and compliance initiatives. Flexibility and teamwork are essential as you collaborate across functions.

Benefits

Comprehensive medical, dental, optical, and insurance benefits
Flexi working hours arrangements
Staff Line & Device Subsidy
Special employee discounts for selected F&B Brands

Qualifications

  • Minimum 10 years of experience in cybersecurity operations and engineering.
  • Experience in vulnerability assessment testing.
  • Knowledge of cloud security and threat intelligence.

Responsibilities

  • Oversee day-to-day security operations including monitoring and incident response.
  • Conduct regular security assessments and penetration tests.
  • Lead incident response activities including containment and recovery.

Skills

Threat intelligence
Incident response
Cybersecurity operations
Vulnerability assessment
EDR/XDR knowledge
Cloud security
Analytical thinking

Education

Degree in Computer Science / IT / Cybersecurity

Tools

EDR/XDR solutions
Network security solutions
Incident ticketing systems
Job description
Senior Specialist, Cybersecurity

For registered candidates, please login to apply

Life at U Mobile

We are Passionate, Innovative, Trustworthy, Team-Oriented & Fun-Loving.

At U Mobile, we are always on the lookout for great talents and passionate individuals to join our growing team.

Let’s start your journey with an award-winning organization!

#UnbeatableCareerAwaits

Top Reasons To Join Us!
  • Awarded Most Preferred Employers in Telecommunication Industry (2022, 2023 & 2024)
  • Bronze Winner in Cross-Generational Workforce Engagement (2024)
  • Gold Winner for Excellence in Workplace Culture (2021)
  • Comprehensive medical, dental, optical and insurance benefits
  • Flexi working hours arrangements
  • Staff Line & Device Subsidy
  • Smart Casual Attire
  • Child Parental Care Leave
  • Convenient location with access to public transport (Imbi Monorail/Bukit Bintang MRT)
  • Special employee discounts for selected F&B Brands
Job Summary

This role is for a Cyber Security Operations leader who will be responsible for planning, managing, and executing the overall security strategy. Key activities involve supervising a team of security analysts, overseeing day-to-day security operations like monitoring, troubleshooting, and incident response/forensics. The position also supports security governance, compliance, threat intelligence, and involves performing technical evaluations (POCs), as well as developing and delivering security awareness training.

The Day-To-Day Activities
1. Security Operations and Troubleshooting
  • Assist the Cyber Security Operations Manager in planning, implementing, and managing the overall security operations strategy.
  • Supervise a team of security analysts and engineers, providing guidance, support, and training as needed.
  • Conduct regular security assessments, penetration testing, and vulnerability assessments to identify and mitigate risks.
  • In-depth knowledge in Endpoint Detection & Response (EDR/XDR) solutions.
  • Knowledgeable in IT networking, Network security solutions, WAF, Privilege Access Management (PAM), Virtualizations.
  • Technically capable in conducting POCs and related to cybersecurity.
  • Capable in plan and managed a multiple cybersecurity project simultaneously.
  • Monitor security systems and tools, investigating and responding to security incidents in a timely manner.
  • Coordinate with cross-functional teams, department and divisions to ensure compliance with established security policies, standards, and procedures.
  • Apply your knowledge of cloud platforms (e.g., AWS, Google Cloud, Azure, etc) to develop and implement robust security controls and measures.
  • Work closely with the Cloud Operations team to ensure the security of cloud-based infrastructure, services, and applications.
  • Identify and address cloud-specific security risks, such as misconfigurations, data breaches, and unauthorized access.
  • Stay updated on the latest cloud security trends, emerging threats, and best practices to proactively address potential vulnerabilities.
2. Cloud Security
  • Apply your knowledge of cloud platforms (e.g., AWS, Google Cloud, Azure, etc) to develop and implement robust security controls and measures.
  • Work closely with the Cloud Operations team to ensure the security of cloud-based infrastructure, services, and applications.
  • Identify and address cloud-specific security risks, such as misconfigurations, data breaches, and unauthorized access.
  • Stay updated on the latest cloud security trends, emerging threats, and best practices to proactively address potential vulnerabilities.
3. Incident Response Handling and Forensic
  • Assist or lead and participate in incident response activities, including containment, eradication, and recovery.
  • Conduct digital forensics investigations to determine the root cause of security incidents and develop remediation plans.
  • Collaborate with internal stakeholders and external partners, such as law enforcement agencies, to address complex security incidents.
4. Support in Security Governance and Compliance
  • Assist in enforcing U Mobile security policies, standards, and procedures aligned with industry best practices and regulatory requirements.
  • Assist in periodic security audits and assessments to evaluate compliance with internal and external security standards.
  • Prepare and present reports or Root cause analysis (RCA) on security metrics, incidents, and risks to senior management and relevant stakeholders.
5. Vulnerability Management & Threat Intelligence
  • In-depth knowledge in VAPT assessment, scanning, identifying, assessing, reporting on, managing and remediating cyber vulnerabilities across endpoints, workloads, and systems.
  • Knowledge in cyber threat intelligence system and able to discovered, correlate and take action on discovered threats to reduce company risks.
  • Unauthorized Device Hunting
  • Perform regular security scans to detect unauthorized devices on the network.
  • Verify device identity and usage, escalating suspicious findings for further management action.
  • Document and report unauthorized device incidents to senior management.
6. Security Operations Ticket Handling
  • Capable on 24x7 standby (on rotational basis – if necessary) to handle security tickets.
  • Ensure timely response and closure of tickets within agreed SLA.
  • Escalate significant security events or incidents following established SOPs.
7. Technical Evaluation and Testing
  • In charge in performing proof of concept (poc) on any technology related to cybersecurity.
  • Capable in creating test matrix suitable to U Mobile environment and writing details reports.
  • Work closely with technology providers / vendors and ensure poc to be completed within the required timeline.
8. Security Awareness and Training
  • Assist in developing and delivering security awareness programs to educate employees about security best practices and potential threats.
  • Conduct security training sessions for staff members to enhance their understanding of security protocols and procedures.
9. Documentation and Reporting
  • Maintain accurate records of security-related activities using internal system or equivalent tools.
  • Prepare and submit reports with recommended actions on identified cybersecurity issues.
  • Support in updating security policies, standards, and procedures.
About You
Education

Degree in Computer Science / IT / Cybersecurity or related

Experience

Min 10 years’ experience in performing cybersecurity operation, engineering, analysis, events troubleshooting, trouble ticket handling. Experience in vulnerability assessment testing and remediation management. Exposure of threat intelligence with knowledge on dark web and threat hunting. Experience in operating EDR/XDR and performing hunting to remediate the detected alerts. Experience in report writing with presentation.

Competencies
  • Able to detect and analyze threat information obtained from various resources with minimum supervision.
  • Able to perform and conduct cybersecurity related testing activity as and when needed regardless of during or non-office hours.
  • Able to understand the severity of an event or incident and perform 1st response to escalate within a timely manner.
  • To properly document internal cybersecurity related information and organize in structured way for ease of team members to access and refer.
  • To be able to conduct briefing and presentation related cybersecurity processes, approach and policy as and when necessary.
  • Posses’ certification in EDR/XDR, Next-Gen Firewalls, WAF, Cloud security, or any cybersecurity related certification will be an advantage.
Personal Attributes
  • Analytical Thinking– Thinks critically and solves problems.
  • Detail-Oriented – Spots small issues before they grow.
  • Curious – Eager to learn and explore new threats.
  • Trustworthy – Handles sensitive data responsibly.
  • Calm Under Pressure – Stays focused during incidents.
  • Clear Communicator – Explains tech to non-tech people.
  • Team Player – Works well with others.
  • Adaptable – Quick to adjust to new tools and threats.
  • Organized – Manages time and tasks efficiently.
  • Creative Thinking – Able to think creatively and out-side the box.
What’s Next?

Once you have applied online, our team will review your application and due to a high volume of applications, only shortlisted candidates will be notified.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.