Job Search and Career Advice Platform

Enable job alerts via email!

IT Security Manager (ITSM)

Lenovo

Singapore

On-site

SGD 80,000 - 110,000

Full time

Yesterday
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading technology company in Singapore is seeking a skilled IT Security professional to lead cybersecurity incident response and manage security initiatives. Responsibilities include monitoring security threats, conducting vulnerability assessments, and ensuring compliance with security policies. The ideal candidate will possess a Bachelor's degree in a related field, over 5 years of experience in IT Security, and relevant certifications. This position requires strong analytical skills and effective communication to collaborate with various IT stakeholders to enhance the organization's security posture.

Qualifications

  • Minimum 5 years of experience in IT Security leadership role, with preferably 1 year in Cloud Security.
  • Hands-on experience with security tools such as SIEM, WAF, AV, EDR, PAM, and DAM.
  • Professional certifications such as CISSP or CISM are preferred.

Responsibilities

  • Work closely with IT Security Officer and SOC to monitor, detect, and respond to threats.
  • Lead Security Incident Response and post-mortem analyses for cybersecurity incidents.
  • Perform Vulnerability Assessments on various applications and devices.
  • Manage network, system, endpoint and runtime security of on-premises and cloud environments.

Skills

Analytical skills
Problem-solving skills
Effective communication skills
Attention to detail
Proactive mindset

Education

Bachelor's degree in information security, Computer Science, or related field

Tools

SIEM
WAF
AV
EDR
PAM
DAM
Terraform
CloudFormation
Job description
Description and Requirements
Key Responsibilities
1. Incident Response & Security Monitoring
  • Work closely with SIRO/SIRM, IT Security Officer (ITSO) and SOC to monitor, detect, and respond to threats on‑premises and on cloud.
  • Lead Security Incident Response (IR) and post‑mortem analyses for cybersecurity incidents arising from security threat events.
  • Stay current with emerging threats, vulnerabilities, and threat intelligence related to cloud platforms.
  • Disseminate security advisories, threat intelligence reports, security directives, and patch recommendations promptly to the relevant stakeholders in the agencies.
  • Partake in tabletop exercises, security risk management activities, audits and third‑party assessments to enhance incident response readiness.
2. Security Product Management
  • Monitor security events on SIEM Splunk, Cortex, Exa beam, perform event triage and analysis.
  • Perform Vulnerability Assessments (Tenable Nessus) on applications web client/server, mobile apps, networking and computing devices firmware, Operating System.
3. Security Governance & Compliance
  • Lead and conduct periodic security reviews to ensure adherence to IT Security Policies, Standards, Controls and industry best practices.
  • Recommend and implement security initiatives and enhancement based on findings from tabletop exercises (TTX) and audits.
  • Monitor and ensure compliance with secure configuration standards across network, systems and endpoint CIS Hardening at agencies.
  • Analyse Vulnerability Assessment (VA) scan results, track and report remediation status according to the stipulated timeframe.
4. Network, Systems and Endpoint Security
  • Manage, configure, and optimize security tools and platforms to ensure effective integration with network and IT infrastructure.
  • Manage network, system, endpoint and runtime security of on‑premises and cloud environments.
  • Perform regular reviews of accounts for both on‑premises and on cloud systems/applications.
5. Documentation and Reporting
  • Implement and update security policies, technical baselines, Standard Operating Procedures (SOPs).
  • Maintain documentation of security incidents, vulnerability assessments, security checklist, security controls and policies.
  • Prepare and deliver regular reports to update security performance metrics, incident trends, compliance status and risk mitigation efforts.
  • Ensure timely escalation and reporting of cybersecurity incidents to management and stakeholders.
6. Collaboration and Stakeholder Management
  • Provide guidance and mentor a team of IT Security Officers (ITSOs).
  • Collaborate with various IT teams Infrastructure, Applications, Project and external vendors to implement and maintain security controls and measures.
  • Act as the key liaison with stakeholders SIRO/SIRM, IT, Application Teams and cloud service providers to align security practices with organizational cybersecurity strategies and compliance requirements.
Qualifications
Education & Experience
  • Bachelor’s degree in information security, Computer Science, or related field.
  • Minimum 5 years of experience in IT Security leadership role, with preferably 1 year in Cloud Security.
Technical Skills
  • Hands‑on experience with security tools SIEM, WAF, AV, EDR, PAM, DAM.
  • Deep understanding of vulnerability management, threat analysis, and incident response processes.
  • Good understanding of secure network design, endpoint security, and system hardening techniques.
  • Familiarity with ICT security compliance frameworks, cybersecurity standards, and risk management practices.
  • Familiar with IaC security Terraform, CloudFormation and CI/CD security.
Certifications
  • Professional certifications such as CISSP or CISM are preferred.
  • Cloud certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate or equivalent would be advantageous.
Other Skills
  • Strong analytical and problem‑solving skills with attention to detail.
  • Effective communication skills, both written and verbal, with the ability to clearly articulate security risks and recommendations.
  • Ability to work independently with minimal supervision and collaboratively within a team in a dynamic and fast‑paced environment.
  • Proactive mindset with a continuous improvement attitude towards cybersecurity operations.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.