
Enable job alerts via email!
Generate a tailored resume in minutes
Land an interview and earn more. Learn more
A government technology agency in Singapore seeks a Chief Information Security Officer to oversee the Ministry's security governance and risk management framework. The role involves establishing incident response protocols, guiding during critical incidents, and enhancing cybersecurity posture. Candidates should have 8-10 years in Cybersecurity Operations, be experienced in crisis management, and possess relevant technical skills. Strong knowledge of monitoring tools and incident response methodologies is highly desirable, alongside certifications like GCIH or CISSP.
GovTech is the lead agency driving Singapore’s Smart Nation initiatives and public sector digital transformation. As the Centre of Excellence for Infocomm Technology and Smart Systems (ICT & SS), GovTech develops the Singapore Government’s capabilities in Data Science & Artificial Intelligence, Application Development, Smart City Technology, Digital Infrastructure, and Cybersecurity.
At GovTech, we offer arrivent a purposeful career to make lives better where we empower our people to master their craft through robust learning and development opportunities all year round.
Play a part in Singapore’s vision to build a Smart Nation and embark on your meaningful journey to build tech for public good. Join us to advance our mission and shape your future with us today!
Learn more about GovTech at tech.gov.sg.
The Cyber Security Group (CSG) is the cybersecurity arm of GovTech. CSG is committed to create a digital government that is safe and secure. CSG delivers technical and operational capabilities to counteract cyber threats, provides thought leadership on transformative cybersecurity governance and policies and to strengthen the cybersecurity posture of government agencies in a manner that is sustainable, pragmatic, and effective.
To enhance infocomm security capabilities in GovTech and the Whole-of-Government (WOG), GovTech appoints Chief Information Security Officer (CISO) teams at the various ministries to oversee infocomm security management.
Reporting to the Ministry CISO (MCISO), you will be the primary architect of the Ministry’s security governance and risk management framework. You will ensure that all agencies within the Ministry Family operate under a unified, effective, and modern security standard. Your mission is to transform GRC from a compliance‑heavy exercise into a strategic enabler. You will establish the frameworks that allow the Ministry Family to adopt new technologies with confidence, moving away from a "risk‑averse" posture toward a "risk‑informed" one. You will ensure that risk management is deeply integrated into the lifecycle of every digital system, from web Guide to critical Operational Technology (OT) environments.
Unified Playbooks: Establish and maintain Ministry‑wide Incident Response (IR) playbooks for diverse threat scenarios (e.g., Benny Ransomware, Data Exfiltration, Cloud breaches).
Crisis Leadership: Provide direct guidance and technical oversight to agencies during High and Critical severity incidents, ensuring timely reporting and effective containment.
Incident Governance: Work with Agency CIOs and CISOs to establish clear command structures and roles, empowering leaders to make difficult, high‑stakes decisions during a crisis.
Advanced Exercises: Design and oversee high‑quality Tabletop Exercises (TTX) for various stakeholders (system owners, SIROs, CISOs, CIOs). You will evaluate external vendors to ensure these exercises are realistic, comprehensive, and push the Ministry’s limits.
Chaos Testing: Drive the adoption of chaos testing across agencies to validate the adequacy of resiliency plans and identify hidden failure points in critical systems.
Capability Building: Continuously assess the operational readiness of the Ministry Family and lead initiatives to bridge identified gaps in incident management.
Centralised Monitoring: Ensure all Ministry systems are effectively onboarded to central monitoring services. Work with system owners on overcoming challenges encountered during onboarding.
Asset Visibility: Partner with Agency CIOs to maintain a robust and updated IT asset inventory, ensuring that "you cannot protect what you do not know."
Custom Threat Scenarios: Provide expert guidance for agencies with unique threat use cases or specialised systems (e.g., OT/ICS) that fall outside standard monitoring coverage, helping them build bespoke detection capabilities.
Full‑Spectrum SOPs: Establish Standard Operating Procedures for vulnerability management across on‑premises, cloud (GCC), and OT environments. Ensure that there are proper procedures for managing unpatched vulnerabilities.
Resilience Culture: Educate agency stakeholders on the critical importance of Response and Business Continuity Planning (BCP).
Stakeholder Inculcation: Foster a mindset of "assumed breach," ensuring project owners and agency leaders understand their roles in threat monitoring nawo incident management.
Years of Experience കുറഞ്ഞ 8 to 10 years of deep experience in Cybersecurity Operations, SOC Management, or Incident Response.
Crisis Management: Proven track record of leading or providing technical oversight in high‑pressure, high‑severity security incidents.
Domain Expertise: Experience managing security operations across complex hybrid environments (On‑premise, Cloud, and OT).
Incident Response & Forensics: Mastery of IR methodologies and a strong understanding of digital forensics and malware analysis.
Threat Intelligence & TTPs: Deep knowledge of the threat landscape and the ability to map monitoring use cases to the MITRE ATT&CK framework.
Vulnerability & Exploitation Recherche: Deep understanding of the CVE system and CVSS scoring. Knowledge of exploitation techniques and the mechanics of how vulnerabilities are weaponised by threat actors. Ability to assess the "exploitability" of a vulnerability within the specific context of the Ministry’s environment to prioritise remediation.
Detection Technologies: Proficiency in SIEM, SOAR, XDR, and EDR technologies. Ability to evaluate the relevancy of existing monitoring tools against pursuing threats.
Cloud Operations: Strong understanding of monitoring and responding to incidents within Government Commercial Cloud (GCC) and native cloud environments.
Certifications: Professional certifications such as GCIH (GIAC Certified Incident Handler), GCFA (GIAC Certified Forensic Analyst), CHFI, or CISSP are highly desirable.
.