Job Details
Nationality Requirement: Malaysia
Job Description
KEY RESPONSIBILITIES AND ACCOUNTABILITIES
1. Proactive Security Assessment
Conduct regular vulnerability assessments and security reviews on servers, networks, applications, and databases.
Perform penetration testing or coordinate with third parties to identify security weaknesses.
Review system configurations and hardening compliance against security standards and best practices
2. Security Monitoring and Threat Detection
Monitor security logs, alerts, and events from security tools (e.g.,WAF , IDS/IPS, EDR).
Investigate suspicious activities and potential indicators of compromise.
Recommend and implement improvements to monitoring and detection mechanisms.
3. Incident Response and Forensics
Participate in incident response activities, including investigation, containment, eradication, and recovery.
Perform basic digital forensic analysis to determine root causes and impact of security incidents.
Document findings, timelines, and evidence in accordance with incident handling procedures.
4. Data Protection and Leak Prevention
Assess risks related to data exposure, unauthorized access, or data leakage.
Recommend controls such as encryption, access controls, and monitoring to protect sensitive data.
5. Security Governance and Compliance
Ensure systems comply with internal security policies, standards, and regulatory requirements (e.g., ISO 27001, ISMS, or relevant government guidelines if applicable).
Assist in risk assessments, audits, and security reviews.
Prepare security assessment reports and recommendations for management.
6. Continuous Improvement and Awareness
Track emerging threats, vulnerabilities, and cybersecurity trends.
Recommend improvements to security architecture and operational procedures.
Provide technical guidance to IT teams on secure system design and configuration.
QUALIFICATION, SKILLS & KNOWLEDGE
EDUCATION AND CERTIFICATION:
Bachelor’s degree in Cyber Security, Information Technology, Computer Science, or a related field.
REQUIRED KNOWLEDGE:
Minimum 4 - 6 years of experience in cybersecurity, system administration, or network security.
Experience in vulnerability assessment, security monitoring, and incident response.
TECHNICAL SKILLS
Knowledge of operating systems (Linux, Windows) and network protocols.
Familiarity with vulnerability scanning tools and security assessment methodologies.
Understanding of cryptography, authentication mechanisms, and access control.
Basic knowledge of digital forensics processes and tools.
Experience with SIEM or log analysis tools is an advantage.
CERTIFICATIONS (PREFERRED BUT NOT MANDATORY)
CEH, Security+, CySA+, or equivalent
CISSP, CISM, or similar advanced certifications
KEY COMPETENCIES
Analytical and problem-solving skills
Attention to detail and investigative mindset
Ability to work independently and proactively
Good documentation and reporting skills
Strong sense of integrity and confidentiality
WHY JOIN US
Comprehensive medical benefits for you, your spouse, and children, ensuring your well-being is our top priority.
Rest easy with our group term life coverage, providing you with security and assurance.
Stay energized with meal allowances that keep you fueled throughout the day.
An in-house futsal court, badminton court, plus a gym for post-work workouts.
A variety of fun-filled events and gatherings to unwind.
Achieve a healthy work-life balance, ensuring you thrive both in and out of the office.