If you are looking to excel and make a difference, take a closer look at us\xe2\x80\xa6Overview:As a member of the Security Governance, your primary responsibility will be to ensure the security & resilience of the organization\xe2\x80\x99s digital assets & information systems. You will play a crucial role in defending against cyber threats and safeguarding our critical data/system.Key Responsibilities:Establishing security measures around an organization\'s key assetsConduct intelligence / threat-based security assessments on critical systems / major applications / networks to identify security risks to brief systems owners of the potential impacts of those risks on their mission.Security Posture AssessmentIdentification and Validation of Security FlawsFirewall config / policies assessment.Stay up-to-date with the latest cyber threats, attack vectors, and industry best practices to continuously improve the organization\xe2\x80\x99s security posture.Collaborate with other teams to design and implement security solutions that align with the organization\xe2\x80\x99s overall security strategy.Prepare detailed reports and documentation related to cyber incidents, investigations, and security measures taken.Risk and Control Self-Assessment (RCSA)- for whole GITS departmentEach item needs to be assessed by weekly, monthly, quarterly, half yearly and yearly basisReconstruct RCSA TemplateOSP Review \xe2\x80\x93 EnsignRequired to be review yearly basisSOP & Policy ReviewAll related SOP and policy need to be review by yearlyPWC Audit requestCRMA BNM reviewBNM KRI ReportsJobholder RequirementsA Diploma/Bachelors degree in IT or Information/Cyber SecurityExperienceMinimum 5 - 7 years working experience in Information/Network/Cyber Security with project experienceUnderstanding of cybersecurity concepts, principles, and best practicesKnowledge of network security protocols and systemsFamiliarity with firewalls, intrusion prevention systems, and other security toolsGood to have:Specialized experience in Blue Teaming or experience working within a Security Operations Center performing a variety of the services listed above in the job responsibilities.Possess a broad knowledge of security methodologies, solutions and best practicesExperience with multiple open source and commercial testing tools; a non-comprehensive list includes Nessus, App Detective, Metasploit, Burp Suite, and nmapPossess advanced understanding of the strengths and weaknesses of security tools with the ability to select the right tool for the job; ability to configure and troubleshoot tools if necessaryAbility to analyze network traffic and identify potential threatsKnowledge of malware analysis and remediation techniquesUnderstanding of risk management and compliance requirementsGood communication and problem-solving skillsAttention to detail and the ability to work under pressureAbout Hong Leong BankWe are a leading financial institution in Malaysia backed by a century of entrepreneurial heritage. Providing comprehensive financial services guided by a Digital-at-the-Core ethos has earned us industry recognition and accolades for our innovative approach in making banking simpler and more effortless for our customers. Our digital and physical offerings span across a vast nationwide network in Malaysia, strengthened with an expanding regional presence in Singapore, Hong Kong, Vietnam, Cambodia, and China.We seek to strike a balance between diversity, inclusion and merit to achieve our mission of infusing diversity in thinking and skillsets into our organisation. Candidates are assessed based on merit and potential, in line with our mission to attract and recruit the best talent available. Expanding on our \xe2\x80\x9cDigital at the Core\xe2\x80\x9d ethos, we are progressively digitising the employee journey and experience to provide a strong foundation for our people to drive life-long learning, achieve their career aspirations and grow talent from within our organisation.Realise your full potential at Hong Leong Bank by applying now.
MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.