Roles & Responsibilities
ALTEN Group is a world leader in Engineering and Technology consulting services providing outsourced Engineering, R&D, and IT Services for different industries such as Transportation, Defence, Energy and Security with 55,000 engineers in nearly 35 countries. ANOTECH is the subsidiary of the Group delivering ALTEN's Engineering Services in Singapore.
As a Project Manager, you will be leading government sector projects with a focus on cybersecurity and digital transformation. The ideal candidate will have a consulting background and a proven track record managing complex, multi-stakeholder public sector programs that involve security, infrastructure, or compliance components. You will be responsible for the end-to-end management of project delivery, ensuring alignment with government regulations, cybersecurity frameworks, and strategic objectives.
Responsibilities
Cybersecurity Threat Monitoring, Incident Response & Forensics
- Oversee day-to-day security monitoring and effective use of SIEM, and endpoint protection
- Lead incident response, containment, eradication and root cause analysis for any Cybersecurity event
- Ensure clear incident security classification, escalation workflows and communication protocols with the organization and with Authority
Vulnerability and Patch Management
- Lead the vulnerability assessment and penetration testing programme (annual)
- Lead the quarterly vulnerability assessment
- Track and manage the remediation of vulnerabilities across endpoints (servers, network devices, appliances, middleware and containers)
- Ensure patching cycles across the various platforms (Organization, Authority, and Disaster Recovery)
Security Infrastructure Management
- Implement, configure, troubleshoot and maintain security technologies such as firewall, intrusion detection / prevention systems, HSM, PAM)
- Understand the usage of Active Directory for identity, authentication and access control
- Implement Privileged Access Management policies and procedure
- Implement TLS 1.2/1.3 configuration
- Implement SSL certificate rotation, and HSM integration
Secure System Hardening & Architecture
- Oversee OS, application and network hardening (RHEL, Windows Server, Kubernetes, database and network devices)
- Review and approve security architecture designs such as token management, secrets management, encryption models
- Ensure compliance of security design for new system components, functions and projects
Privileged Access Management & Control
- Lead and govern the privileged access management across active directory domains
- Oversee break-glass emergency access procedure, and segregation of duties
- Ensure periodic access reviews, and compliance reporting
Cybersecurity (IM8) Governance & Compliance
- Define and enforce compliance with Cybersecurity IM8 policies, standards and procedures across all environments
- Drive audit compliance, coordinate audit engagements and provision of evidence to auditors
- Maintain the risk register, track remediation progress and ensure risks are effectively managed
Cybersecurity Operations Leadership and Management
- Lead a team of two cybersecurity engineers, ensuring high competency in mission critical operations
- Work closely with SDM, Cybersecurity engineers, Level 1 engineers and Level 2 engineers to maintain a secure operational environment
- Ensure clear documentation, SOP, runbooks and knowledge transfer for all security-related activities
- Drive continuous training, skill improvement and certification for the Cybersecurity team
Requirements
- Bachelor Degree in Information Security, Computer Science, Engineering, or a closely related discipline
- Must be eligible to obtain G50 security clearance
- At least 5 years of proven experience in Cybersecurity or information security roles for mission critical 24x7 production support, preferably in public sector
- Strong competency in operating system security (RHEL, Windows Server), network security and Kubernetes security
- Hands‑on experience with following tools such as SIEM (LogRhythm), Vulnerability Scanner (Nessus), IAM/PAM (Beyond Trust / CyberArk), HSM, TLS/PKI, Firewall (Check Point, Palo Alto), IDS/IPS
- Certification is preferred, such as CISSP, CISM and CEH.
- Strong composure under intense pressure
- Strong communication skills both written and spoken
- Attention to Detail
- High Integrity and Professionalism
- Initiative and Proactiveness
- Strong sense of accountability and integrity
- Able to handle cross-functional coordination
Tell employers what skills you have
- Information Security
- Security Architecture
- CEH
- Defence
- Remediation
- Kubernetes
- vulnerability scanners
- Cybersecurity Framework Application
- Red Hat Linux
- Penetration Testing
- Compliance
- Project Management
- PMP
- Prevention
- Project Delivery
- Vulnerability Assessment
- Network Security
- CISSP