Roles & Responsibilities
Key Roles and Responsibilities
- Conduct risk assessment on digital solutions and third parties. Identify potential risks and provide options to protect the OT critical infrastructure, ICT Infrastructure, application systems and cloud environment.
- Conduct compliance check on internal controls to ensure compliance with established policies and applicable regulations.
- Assist in developing policies, standards and guidelines to safeguard digital assets in adherence to business needs, industrial best practices and regulatory requirements.
- Provide advisory services to internal departments on business digital initiatives using Security By design / Zero Trust framework to ensure consistency in controls.
- Manage security projects and solution implementation activities that address cybersecurity risks.
- Plan, design and conduct cyber security incident response workshops and exercises (table-top exercises, simulation, and drills)
- Be aware of latest industry standards, regulatory requirements and the potential impacts to cybersecurity policies, standards and procedures.
Qualifications & Experience
Minimum 5 years’ experience in Cybersecurity, Risk and ComplianceKnowledgeable in security standards or regulations such as NIST, ISO 27001, SOC2, CCOP (SG), PDPA (SG), GDPR(EU), MPLS(CN), Security by DesignTechnical know-how and experience in solutions such as (but not limited to)Cloud Infrastructure, e.g. Azure, AWS, Huawei, AliCloud compliance e.g., Cloud Posture Management, Workload protectioAwareness Platform e.g., Proofpoint, Knowbe4Network Security e.g., F / W, IPS, Remote Access, NAC, Data DiodeContent Security e.g., Web, Email protectionEnd point Security e.g., AV, EDR, DLPIdentify Protection e.g. MFA, Privilege access managementThreat Management e.g., SIEM, UEBA, NDR, ASM, BASGRC Tool e.g., RSA ArcherHardening guidelines for MS products, LinuxVulnerability Assessment and Application Testing Tool e.g., Tenable, Qualys, Veracode, Synopsys etc.System development lifecycle or DevOps frameworkCertifications such as CISA, CISM, CISSP, GICSP, CCSK, CRISC will be an added advantageKnowledge in OT solutions and security will be an added advantageTell employers what skills you have
Risk Assessment
Qualys
ICT
ISO
IPS
ISO 27001
Internal Controls
Threat Management
AV
Hardening
CISA
Regulatory Requirements
Vulnerability Assessment
Network Security
CISSP