Enable job alerts via email!
A leading technology company in Singapore seeks a Product Security Leader to direct cybersecurity and privacy strategies for its products. You will guide secure development practices and collaborate with engineering and leadership teams. The ideal candidate has over 10 years of experience in cybersecurity and secure software development, with strong leadership and communication skills. The role supports a culture of security and requires a Bachelor's degree in a relevant field.
Sign-in & Get noticed by top recruiters and get hired fast
Mobile Security, Cloud Security, Vulnerability Management, GRC, Security Operations, IAM, Application Security, Nessus, Threat Modeling, Qualys,SAST, DAST, DevSecops, Threat Modelling, Logging Audit, Burpsuite, Devsecops, Ethical HackingCEH, SSLSecure Sockets Layer, Vulnerability AssessmentPenetration Testing, Web Security, Webservices Security, Vulnerability testing, Mobile Security Testing
Mobile Security, Cloud Security, Vulnerability Management, GRC, Security Operations, IAM, Application Security, Nessus, Threat Modeling, Qualys,SAST, DAST, DevSecops, Threat Modelling, Logging Audit, Burpsuite, Devsecops, Ethical HackingCEH, SSLSecure Sockets Layer, Vulnerability AssessmentPenetration Testing, Web Security, Webservices Security, Vulnerability testing, Mobile Security Testing
CEH, network security, application security, cloud security, identity management, SIEM, Splunk, QRadar, firewalls, encryption, threat modeling, penetration testing,CompTIA Security, AWSAzure Security, endpoint protection, vulnerability scanners, incident response, cloud security frameworks, DevSecOps
Network Security, Cloud Security, Rest Api, Kubernetes, Automation, Python, Security Engineering, Cryptography, Certificate Authority, HITRUST, Cyber Security, Security Incident Response,OS Security, Container Security Assessments, AWS Services, Static Dynamic Code Analysis, Penetration Testing Methodologies, Information Security Analyses, Encryption Algorithms, Public Key Infrastructure, OAUTH Authentication, 2FA, AWS Solution Architect, NIST 80053, CISSTIG Benchmark Audit, SOC2, Threat Modelling, Security Reviews, Penetration Tests, Security by Design Principles, Architecture Level Security Concepts, Security Threats, Exploiting Security Vulnerabilities
Mobile Security, Cloud Security, Vulnerability Management, GRC, Security Operations, IAM, Application Security, Nessus, Threat Modeling, Qualys,SAST, DAST, DevSecops, Threat Modelling, Logging Audit, Burpsuite, Devsecops, Ethical HackingCEH, SSLSecure Sockets Layer, Vulnerability AssessmentPenetration Testing, Web Security, Webservices Security, Vulnerability testing, Mobile Security Testing
Mobile Security, Cloud Security, Vulnerability Management, GRC, Security Operations, IAM, Application Security, Nessus, Threat Modeling, Qualys,SAST, DAST, DevSecops, Threat Modelling, Logging Audit, Burpsuite, Devsecops, Ethical HackingCEH, SSLSecure Sockets Layer, Vulnerability AssessmentPenetration Testing, Web Security, Webservices Security, Vulnerability testing, Mobile Security Testing
CEH, network security, application security, cloud security, identity management, SIEM, Splunk, QRadar, firewalls, encryption, threat modeling, penetration testing,CompTIA Security, AWSAzure Security, endpoint protection, vulnerability scanners, incident response, cloud security frameworks, DevSecOps
Network Security, Cloud Security, Rest Api, Kubernetes, Automation, Python, Security Engineering, Cryptography, Certificate Authority, HITRUST, Cyber Security, Security Incident Response,OS Security, Container Security Assessments, AWS Services, Static Dynamic Code Analysis, Penetration Testing Methodologies, Information Security Analyses, Encryption Algorithms, Public Key Infrastructure, OAUTH Authentication, 2FA, AWS Solution Architect, NIST 80053, CISSTIG Benchmark Audit, SOC2, Threat Modelling, Security Reviews, Penetration Tests, Security by Design Principles, Architecture Level Security Concepts, Security Threats, Exploiting Security Vulnerabilities