Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
- Monitor, manage, and maintain firewalls, intrusion detection/prevention systems (IDS/IPS), and antivirus solutions.
- Assist in configuring and securing servers, endpoints, and network devices.
- Implement access control, data encryption, and patch management.
- * Monitor security alerts, logs, and events through SIEM (Security Information & Event Management) tools.
- Investigate suspicious activities and escalate incidents as necessary.
- Provide first-level response and support in the event of a cyberattack, malware infection, or data breach.
- * Ensure compliance with organizational IT security policies and relevant regulatory requirements.
- Maintain accurate documentation of security incidents, system changes, and configurations.
- Support audits by preparing security reports and logs.
Key Skills
Ranked by relevanceReady to apply?
Join Tiger Hong Security Services & Consultants Pte Ltd and take your career to the next level!
Application takes less than 5 minutes