Job Search and Career Advice Platform

Enable job alerts via email!

Security Consultant

ACCLIVIS TECHNOLOGIES AND SOLUTIONS PTE. LTD.

Serangoon Garden Circus

On-site

SGD 60,000 - 80,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A technology solutions provider in Singapore is seeking a professional to manage technology risk assessments and security operations. Candidates should have 3–5 years of experience, relevant qualifications in IT or cybersecurity, and be proficient in English and Mandarin. The role includes monitoring networks, conducting incident responses, and maintaining security compliance with regulatory standards.

Qualifications

  • Min. 3 – 5 years of experience in technology risk and regulatory compliance.
  • Strong knowledge of security frameworks and endpoint security.
  • Relevant certifications such as Comptia Security+ or CISSP are advantageous.

Responsibilities

  • Conduct technology risk analysis and adhere to regulatory requirements.
  • Monitor networks for suspicious activities and security incidents.
  • Lead the incident response lifecycle and maintain playbooks.

Skills

Technology risk assessment
Security operations
Incident response
Forensic analysis
Bilingual in English and Mandarin

Education

Diploma or Degree in IT or cybersecurity

Tools

Security Information and Event Management (SIEM)
Identity and Access Management (IAM)
Privileged Access Management (PAM)
Digital Forensics
Job description
Job Description
Main Duties and Responsibilities:
1. Technology Risk Assessment for Regulatory Compliance
  • Conduct technology risk analysis, ensuring alignment with business and regional regulatory requirements.
  • Maintain, document and update changes to policies, SOPs, artifacts, risk registers, etc.
  • Perform assessments for third-party and regulatory adherence.
  • Actively engage in certification, auditing, findings, assessment and compliance efforts.
2. Security Operations
  • Continuously watch network traffic, systems, and applications for suspicious activity, anomalies and potential security incidents.
  • Identify security flaws and weaknesses in the networks, systems and applications to prevent them from being exploited.
  • Conduct detailed assessment & audit on all security controls, esp. email, endpoints, app., data, etc.
  • Deploy, configure, and manage various security tools such as endpoint, IAM, PAM, xDR, SIEM, etc according to NIST, CISA and MITRE framework protocols.
  • Threat detection, incident response, vulnerability management, security policy enforcement and continuous monitoring of security controls.
  • Develop and execute plans to respond to security incidents, containing and mitigating them.
  • Collaborate, and follow-up with other key technical team members and HODs.
3. Incident Response
  • Lead incident response lifecycle (detection, triage, containment, eradication, recovery).
  • Handle security incidents tickets escalated by team, and draft security incident report covering the root cause, forensic evidence, and recommended mitigation plans.
  • Conduct and support forensic analysis of endpoints, logs, and network traffic to determine root cause and impact.
  • Coordinate with internal stakeholders and external partners during critical incidents.
  • Develop and maintain playbooks and incident reports.
Job Requirements: (e.g., educational/professional qualifications)
  • Min. 3 – 5 years of experience in technology risk, blue team operations, and regulatory compliance.
  • Diploma or Degree in IT, cybersecurity, or related field.
  • Proficient in both English and Mandarin as you will need to work closely with Chinese counterparts.
  • Expertise in technology risk, defensive strategies, endpoint security, IAM, PAM, and access control.
  • Strong knowledge of security frameworks, layered defense, SIEM, endpoint & VPN security, DLP, etc.
  • Familiarity with vulnerability management, and security configuration and automation.
  • Digital Forensics and Incident Response (DFIR) experience enabling deeper investigations and root cause analysis is an added advantage.
  • Ability to analyze security issues and recommend effective solutions.
  • Relevant certifications such as Comptia Security+, CISSP, or vendor/industry certifications is an added advantage.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.