Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Responsibilities:
- As part of the team, you will develop and maintain cybersecurity standards, procedures, configurations or rulesets for the systems and services.
- For validation of security procedures, you will conduct security exercises which may include table-top or simulation exercises.
- Participate in security incident response that includes understanding alerts, coordination with various system or service operators, identifying potential threats and performing basic triaging prior to escalation to next level security responder.
- Coordinate in Indicators-Of-Compromise (IOC) scanning, collating the reports from various system operators with consolidated update to the stakeholders.
- Perform vulnerability assessment using automated and manual tools with recommendation for actionable remediation controls. Understand the published vulnerabilities with their respective security patches with context to the deployed system and perform risk assessment onto them.
- Monitor and notify security patches releases for the various products. Involve in the security patch assessment rating based on standards like Common Vulnerability Scoring System (CVSS) as well as with the context of the deployed environment.
- Engage with stakeholders with presentation or reporting on the vulnerability scanning results, security testing results, security incident or security posture of the systems
- Knowledgeable in cyber security principles, operational security management techniques, architecture and designs, cybersecurity attributes (e.g. confidentiality, integrity, availability, accountability, assurance, etc.) and security measures (e.g. authentication, authorisation etc.) for applications in an enterprise environment or setup
- Possess more than 5 years' working experience on cybersecurity in one or more of the following domains: Network security design, applications secure development, cryptography, mobile management, cloud hosting design and implementation, DevSecOps, etc
- Possess security certifications such as SANS GCIH, CISSP, CISM, AWS or any cloud service security specialty is an added advantage
- Knowledgeable on cyber security technologies (SIEM, VMS, CTEM, VA, GRC and Cloud Security toolsets
- Experience in risk assessment on system, network, application cloud security vulnerabilities, misconfigurations and security patches with technical understanding on their mitigation
- Has understanding of vulnerability assessment, penetration testing report, conduct a full impact of identified and reported vulnerabilities, recommend, and conduct remediation and mitigation
- Experience in understanding alerts, identifying potential threats and performing basic triaging prior to escalation to next level security responder.
- Has good interpersonal and stakeholder management skills with presentation skills, and the ability to write clearly, concisely, and within context.
- Experience in working with cross-functional, multi-disciplinary teams or contractors to formulate and institute security policies, standards, procedures and configurations
The remuneration package will commensurate with your qualifications and experience. Interested applicants, please click "Apply Now".
We thank you for your interest and please note that only shortlisted candidates will be notified.
By submitting your application, you agree that your personal data may be collected, used and disclosed by Assurity Trusted Solutions Pte. Ltd. (ATS), GovTech and their service providers and agents in accordance with ATS's privacy statement which can be found at: or such other successor site.
Benefits
- A wholly-owned subsidiary of GovTech
- An attractive yearly training budget with annual performance bonus
- Contract Staff enjoys the same benefits as Permanent Employees
Key Skills
Ranked by relevanceReady to apply?
Join Assurity Trusted Solutions Pte Ltd and take your career to the next level!
Application takes less than 5 minutes