Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Operations Lead

MANPOWER STAFFING SERVICES (SINGAPORE) PTE LTD

Singapore

On-site

SGD 80,000 - 120,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading staffing solutions firm in Singapore is seeking an experienced Cybersecurity Operations Lead to oversee critical security operations in a 24×7 environment. This role requires strong incident response and vulnerability management capabilities while ensuring compliance with governance standards. You will manage a team of cybersecurity engineers and implement security technologies to enhance operational security practices. Candidates should possess relevant degrees and at least 5 years of experience in cybersecurity, with certifications like CISSP or CISM.

Qualifications

  • Minimum of 5 years of cybersecurity or information security experience.
  • CISSP, CISM, CEH or equivalent certification.
  • Composure under pressure and ability to lead during incidents.

Responsibilities

  • Oversee day-to-day security monitoring using SIEM.
  • Lead incident response and root cause analysis for cybersecurity events.
  • Manage remediation of vulnerabilities across all environments.

Skills

Incident response
Vulnerability management
Operating system security
Networking fundamentals
Excellent communication skills

Education

Bachelor’s degree in Information Security, Computer Science, Engineering, or related discipline

Tools

SIEM (LogRhythm)
Vulnerability Scanner (Nessus)
IAM/PAM (BeyondTrust/CyberArk)
HSM
Firewalls (Check Point, Palo Alto)
Kubernetes
Job description
Position Summary

We are seeking an experienced Cybersecurity Operations Lead to oversee mission‑critical security operations in a 24×7 environment. This role is responsible for threat monitoring, incident response, vulnerability management, and ensuring compliance with IM8 governance standards. You will lead a team of cybersecurity engineers, manage security infrastructure, and drive continuous improvement in operational security practices.

Responsibilities
Threat Monitoring & Incident Response
  • Oversee day-to-day security monitoring using SIEM and endpoint protection tools.
  • Lead incident response, containment, eradication, and root cause analysis for cybersecurity events.
  • Ensure clear incident classification, escalation workflows, and communication protocols.
Vulnerability & Patch Management
  • Lead vulnerability assessments and penetration testing programs.
  • Manage remediation of vulnerabilities across servers, network devices, middleware, and containers.
  • Ensure timely patching cycles across all environments.
Security Infrastructure & System Hardening
  • Implement, configure, and maintain security technologies (firewalls, IDS/IPS, HSM, PAM).
  • Oversee OS, application, and network hardening (RHEL, Windows Server, Kubernetes).
  • Review and approve security architecture designs for new components and projects.
Privileged Access Management
  • Govern privileged access across Active Directory domains.
  • Ensure segregation of duties, emergency access procedures, and periodic access reviews.
Governance & Compliance
  • Enforce compliance with IM8 cybersecurity policies and standards.
  • Drive audit readiness, maintain risk registers, and track remediation progress.
Team Leadership
  • Liaise with cross function teams.
  • Ensure clear documentation, SOPs, and knowledge transfer for all security activities.
  • Drive continuous training and certification for team members.
Requirements
  • Bachelor’s degree in Information Security, Computer Science, Engineering, or related discipline.
  • Minimum 5 years of proven experience in cybersecurity or information security roles supporting mission‑critical operations, preferably in the public sector.
  • Competency in operating system security (RHEL, Windows Server), network security, and Kubernetes security.
  • Hands‑on experience with tools such as SIEM (LogRhythm), Vulnerability Scanner (Nessus), IAM/PAM (BeyondTrust/CyberArk), HSM, TLS/PKI, Firewalls (Check Point, Palo Alto), IDS/IPS.
  • CISSP, CISM, CEH or equivalent.
  • Security principles (CIA, defense in depth, least privilege).
  • Networking and OS fundamentals.
  • Identity & Access Management, cryptography basics.
  • Application security fundamentals (OWASP Top 10, secure coding principles).
  • Incident response and IM8 compliance knowledge.
  • Composure under pressure and ability to lead during incidents.
  • Excellent communication skills (written and spoken).
  • High integrity, attention to detail, and accountability.
  • Proactive, collaborative, and able to manage cross‑functional coordination.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.