Key Roles and Responsibilities
- Conduct risk assessment on digital solutions and third parties. Identify potential risks and provide options to protect the OT critical infrastructure, ICT Infrastructure, application systems and cloud environment.
- Conduct compliance check on internal controls to ensure compliance with established policies and applicable regulations.
- Assist in developing policies, standards and guidelines to safeguard digital assets in adherence to business needs, industrial best practices and regulatory requirements.
- Provide advisory services to internal departments on business digital initiatives using Security By design / Zero Trust framework to ensure consistency in controls.
- Manage security projects and solution implementation activities that address cybersecurity risks.
- Plan, design and conduct cyber security incident response workshops and exercises (table-top exercises, simulation, and drills)
- Be aware of latest industry standards, regulatory requirements and the potential impacts to cybersecurity policies, standards and procedures.
Qualifications & Experience
- Minimum 5 years’ experience in Cybersecurity, Risk and Compliance
- Knowledgeable in security standards or regulations such as NIST, ISO 27001, SOC2, CCOP (SG), PDPA (SG), GDPR(EU), MPLS(CN), Security by Design
- Technical know-how and experience in solutions such as (but not limited to)
- · Cloud Infrastructure, e.g. Azure, AWS, Huawei, Ali
- · Cloud compliance e.g., Cloud Posture Management, Workload protectio
- · Awareness Platform e.g., Proofpoint, Knowbe4
- · Network Security e.g., F/W, IPS, Remote Access, NAC, Data Diode
- · Content Security e.g., Web, Email protection
- · End point Security e.g., AV, EDR, DLP
- · Identify Protection e.g., MFA, Privilege access management
- · Threat Management e.g., SIEM, UEBA, NDR, ASM, BAS
- · GRC Tool e.g., RSA Archer
- · Hardening guidelines for MS products, Linux
- · Vulnerability Assessment and Application Testing Tool e.g., Tenable, Qualys, Veracode, Synopsys etc.
- · System development lifecycle or DevOps framework
- • Certifications such as CISA, CISM, CISSP, GICSP, CCSK, CRISC will be an added advantage
- • Knowledge in OT solutions and security will be an added advantage