Job Search and Career Advice Platform

Enable job alerts via email!

IT Security Officer (ITSO)

ENGGSOL PTE. LTD.

Singapore

On-site

SGD 70,000 - 90,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A technology services company in Singapore is seeking an IT Security Officer to manage cybersecurity incidents and conduct vulnerability assessments. This role involves ensuring compliance with cybersecurity policies and working with both internal IT teams and external vendors to maintain the organization's cybersecurity posture. The ideal candidate should possess experience in cybersecurity management and familiarity with security tools such as Tenable, Nessus, and Splunk.

Qualifications

  • Experience managing cybersecurity incidents.
  • Ability to conduct vulnerability assessments and security reviews.

Responsibilities

  • Manage and escalate cybersecurity incidents.
  • Conduct vulnerability scanning and analysis.
  • Ensure compliance with cybersecurity policies.
  • Prepare reports on security performance metrics.

Skills

Cybersecurity management
Vulnerability assessments
Compliance knowledge
Security awareness training
Security tools knowledge (e.g., Tenable, Nessus, Splunk)

Tools

Tenable
Nessus
Splunk
Job description

The IT Security Officer (ITSO) is responsible for managing cybersecurity incidents, conducting vulnerability assessments, ensuring compliance with cybersecurity policies, and maintaining the security of network and IT assets. This role works closely with internal IT teams and external vendors to uphold the Agency’s cybersecurity posture and compliance requirements.

Key Responsibilities
1. Cybersecurity Management
  • Track, manage, and escalate cybersecurity incidents and critical security threat events to the Agency as required.
  • Disseminate security advisories, threat intelligence reports, security directives, and patch recommendations promptly to the relevant stakeholders in the Agency.
  • Conduct information security awareness training sessions to cultivate a security-conscious culture among staff.
  • Lead or assist in conducting tabletop exercises and security risk management activities to enhance incident response readiness.
2. Security Product Management
  • Perform vulnerability scanning and security assessments on applications (client/server, mobile apps) deployed in the corporate networks using Tenable and Nessus.
  • Analyze vulnerability scan results, recommend remediation actions, and track resolution status.
  • Utilize Splunk or security tools for security event monitoring, log collection, and analysis of security incidents.
  • Perform onboarding and vulnerability scanning of computing devices before connecting to the corporate network to ensure compliance with cyber hygiene standards.
3. Compliance and Reviews
  • Conduct periodic security reviews and audits to ensure adherence to the Agency’s ICT and cybersecurity incident response plans.
  • Perform security assessments of ICT systems, including detailed log analysis and reporting.
  • Recommend and support implementation of security improvements based on audit findings and emerging threat landscapes.
4. Network and Security Integration
  • Manage, configure, and optimize security tools and platforms to ensure effective integration with the network and IT infrastructure.
  • Implement, regular updates and maintain security policies, technical baselines, and standard operating procedures (SOPs) to protect the Agency’s IT environment.
  • Monitor and ensure compliance with secure configuration standards across systems and devices.
5. Documentation and Reporting
  • Maintain detailed and up-to-date documentation of security incidents, vulnerability assessments, security checklist, security controls, and related policies.
  • Prepare and deliver regular reports on security performance metrics, incident trends, compliance status, and risk mitigation efforts.
  • Ensure timely escalation and reporting of major and cyber risk incidents to management and relevant stakeholders.
6. Collaboration and Advisory
  • Work closely with other IT teams (e.g., Infrastructure, Application, Project teams) and external vendors to support, implement, and maintain security solutions.
  • Provide security advisory and recommendations to support projects, system implementations, and procurement activities to ensure security-by-design principles are embedded.
  • Collaborate with the Agency to align security practices with organizational cybersecurity strategies and compliance requirements.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.