695 Cybersecurity Software jobs in Singapore
Cybersecurity Software Engineer
Posted today
Job Viewed
Job Description
Job Description:
- Serving as one of the core software engineer responsible for maintenance, development and deployment of iTrust's digital twins
- Implementing robust version control systems for security and maintainability.
- Establishing and enforcing DevSecOps principles across the codebase and development workflows.
- Leading the containerization and cloud deployment of Twin infrastructure to enable lightweight, scalable, and remote access for cyber training, education, and research purposes
- Architecting new features for the "Dragon Twin" integration platform, which unifies multiple twin environments
- Optimization of code for lower latency and better performance of the twin in simulated settings.
- Managing Twin deployments for various local and international large-scale cybersecurity exercises such as Locked Shields (organised by NATO CCDCOE), CISS (co-organised by iTrust and MINDEF) and CIDEX (organised by MINDEF)
- Developing comprehensive documentation and knowledge transfer materials for technical and non-technical stakeholders.
Job requirements:
- Knowledge and/or working experience in programming, including Python and C
- Minimum 2 years' experience in software development
- Bachelors in Computer Engineering, Software Engineering, Information Technology, Data Science or equivalent
- Experience in cyber security, especially in operational technology, will be advantageous though not mandatory
- Experience in, and comfortable with, training in a professional training will be advantageous
- More experienced or capable candidates may be offered, or in the future considered for, a more senior role e.g. cyber tech lead
Information Security
Version Control
Cyber Security
Software Engineering
JavaScript
Information Technology
SQL
Python
Containerization
Data Science
C#
Network Security
Linux
Software Development
CISSP
Firewalls
Cybersecurity Software Engineer
Posted 9 days ago
Job Viewed
Job Description
Job Description:
- Serving as one of the core software engineer responsible for maintenance, development and deployment of iTrust's digital twins
- Implementing robust version control systems for security and maintainability.
- Establishing and enforcing DevSecOps principles across the codebase and development workflows.
- Leading the containerization and cloud deployment of Twin infrastructure to enable lightweight, scalable, and remote access for cyber training, education, and research purposes
- Architecting new features for the "Dragon Twin" integration platform, which unifies multiple twin environments
- Optimization of code for lower latency and better performance of the twin in simulated settings.
- Managing Twin deployments for various local and international large-scale cybersecurity exercises such as Locked Shields (organised by NATO CCDCOE), CISS (co-organised by iTrust and MINDEF) and CIDEX (organised by MINDEF)
- Developing comprehensive documentation and knowledge transfer materials for technical and non-technical stakeholders.
Job requirements:
- Knowledge and/or working experience in programming, including Python and C
- Minimum 2 years' experience in software development
- Bachelors in Computer Engineering, Software Engineering, Information Technology, Data Science or equivalent
- Experience in cyber security, especially in operational technology, will be advantageous though not mandatory
- Experience in, and comfortable with, training in a professional training will be advantageous
- More experienced or capable candidates may be offered, or in the future considered for, a more senior role e.g. cyber tech lead
Cybersecurity Software Developer (DSC/JH)
Posted today
Job Viewed
Job Description
Cybersecurity Software Developer (DSC/JH)
As a
Cybersecurity Software Developer , you will play a key role in the end-to-end development, deployment, and improvement of cybersecurity software solutions. This role requires a balance of strong technical expertise, problem-solving ability, and collaborative skills to ensure the successful delivery of secure, reliable, and innovative products.
Key Responsibilities
Independently design, develop, and deliver cybersecurity software solutions by analysing information needs, engaging with users, studying system workflows, and applying agile software development practices.
Produce high-quality technical deliverables including documentation, flowcharts, diagrams, architecture layouts, and clean, well-commented code.
Assess operational feasibility through requirements analysis, problem definition, solution design, and architecture development, ensuring solutions meet performance and security standards.
Enhance system operations by performing system analysis, monitoring production environments, troubleshooting service issues, and recommending improvements in processes and procedures.
Review, debug, and validate code to ensure accuracy, reliability, and performance against defined standards.
Translate business requirements into actionable engineering tasks, while keeping stakeholders informed on progress, challenges, and project milestones.
Mentor and support junior engineers by providing technical guidance, coaching, and recommendations for professional certification and skills development.
Qualifications
Experience:
3+ years of professional experience in developing, deploying, or managing enterprise-level security infrastructure, databases, or system servers.
Technical Skills:
Proficiency in Python, with hands-on experience in frameworks such as Django for developing secure web applications.
Cybersecurity Knowledge:
Strong understanding of frameworks and standards such as NIST, OWASP, and familiarity with common attack techniques. Possession of cybersecurity certifications such as OSCP (or equivalent) is highly preferred.
Hands-on Expertise:
Demonstrated experience in one or more of the following areas: Security software development; System hardening and patching; Vulnerability scanning and penetration testing; Incident response and remediation.
Project Delivery:
Proven ability to work independently on key technical deliverables, lead discussions across cross-functional teams, and contribute to solution architecture and product quality.
Soft Skills:
Excellent communication, stakeholder management, and interpersonal skills, with the ability to collaborate effectively in diverse teams.
Analytical Skills:
Strong problem-solving mindset with the ability to identify, analyze, and resolve complex technical issues.
Be careful - Don’t provide your bank or credit card details when applying for jobs. Don't transfer any money or complete suspicious online surveys. If you see something suspicious, report this job ad.
#J-18808-Ljbffr
Cybersecurity Software Developer (DSC/JH)
Posted today
Job Viewed
Job Description
Job Overview
As a
Cybersecurity Software Developer , you will play a key role in the end-to-end development, deployment, and improvement of cybersecurity software solutions. This role requires a balance of strong technical expertise, problem-solving ability, and collaborative skills to ensure the successful delivery of secure, reliable, and innovative products.
Key Responsibilities
Independently design, develop, and deliver cybersecurity software solutions by analysing information needs, engaging with users, studying system workflows, and applying agile software development practices.
Produce high-quality technical deliverables including documentation, flowcharts, diagrams, architecture layouts, and clean, well-commented code.
Assess operational feasibility through requirements analysis, problem definition, solution design, and architecture development, ensuring solutions meet performance and security standards.
Enhance system operations by performing system analysis, monitoring production environments, troubleshooting service issues, and recommending improvements in processes and procedures.
Review, debug, and validate code to ensure accuracy, reliability, and performance against defined standards.
Translate business requirements into actionable engineering tasks, while keeping stakeholders informed on progress, challenges, and project milestones.
Mentor and support junior engineers by providing technical guidance, coaching, and recommendations for professional certification and skills development.
Qualifications
Experience:
3+ years of professional experience in developing, deploying, or managing enterprise-level security infrastructure, databases, or system servers.
Technical Skills:
Proficiency in Python, with hands-on experience in frameworks such as Django for developing secure web applications.
Cybersecurity Knowledge:
Strong understanding of frameworks and standards such as NIST, OWASP, and familiarity with common attack techniques. Possession of cybersecurity certifications such as OSCP (or equivalent) is highly preferred.
Hands-on Expertise:
Demonstrated experience in one or more of the following areas:
Security software development
System hardening and patching
Vulnerability scanning and penetration testing
Incident response and remediation
Project Delivery:
Proven ability to work independently on key technical deliverables, lead discussions across cross-functional teams, and contribute to solution architecture and product quality.
Soft Skills:
Excellent communication, stakeholder management, and interpersonal skills, with the ability to collaborate effectively in diverse teams.
Analytical Skills:
Strong problem-solving mindset with the ability to identify, analyze, and resolve complex technical issues.
Work location: Mapletree Business City
#J-18808-Ljbffr
Information Security
Posted today
Job Viewed
Job Description
Internship
Summary
Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.
Job Description
Responsibilities:
Application Security
Research web and mobile application security best practices
Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure
Assist in tracking and resolving penetration test and threat modelling findings
Perform internal security testing using Burp Suite and Kali Linux, etc.
Security Compliance
Work closely with various IT teams to identify, assess and manage information security risks
Assist to coordinate with application and various IT teams on various compliance controls.
Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.
MAS Technology Risk Management Guidelines
-Assist to collect and compile security related statistics, assess the information and prepare management reports.
- Assist in conducting regular phishing campaigns and compile the results for analysis.
Risk Management
- Assess and enforce the security controls of IT projects
Projects
Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.
Assist the project manager and liaise with vendor
Provide internal support during the implementation
Requirements:
Pursuing a degree with specialization in Information Security
Interest in cyber security
Good trouble-shooting and analytical skills
Independent and resourceful
Good interpersonal skills
Information Security
Posted today
Job Viewed
Job Description
Summary
Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.
Job Description
Responsibilities:
Application Security
- Research web and mobile application security best practices
- Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure
- Assist in tracking and resolving penetration test and threat modelling findings
- Perform internal security testing using Burp Suite and Kali Linux, etc.
Security Compliance
- Work closely with various IT teams to identify, assess and manage information security risks
- Assist to coordinate with application and various IT teams on various compliance controls.
- Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.
MAS Technology Risk Management Guidelines
- Assist to collect and compile security related statistics, assess the information and prepare management reports.
- Assist in conducting regular phishing campaigns and compile the results for analysis.
Risk Management
- Assess and enforce the security controls of IT projects
Projects
- Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.
- Assist the project manager and liaise with vendor
- Provide internal support during the implementation
Requirements
- Pursuing a degree with specialization in Information Security
- Interest in cyber security
- Good trouble-shooting and analytical skills
- Independent and resourceful
- Good interpersonal skills
Information Security
Posted today
Job Viewed
Job Description
Job Objectives
The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.
Key Responsibilities
This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:
Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.
Manage reverse third-party due diligence engagements related to GIS.
Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.
Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.
Execution of the GIS KRCSA (Key Risk and Control Self Assessments).
Management policy, procedures and standards updates and control.
Manage various GIS initiatives and duties as assigned.
Key Requirements
Communicate effectively with a variety of internal and external teams and stakeholders.
Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.
Ability to respond to any requests and issues on a timely basis.
Education
Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.
Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.
Knowledge of industry best practices.
Technical Skills
Overall experience 5+ years of experience.
2+ years of relevant experience in Security/IT governance disciplines.
Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.
Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.
Good knowledge of Security concepts and practices.
Good knowledge of Security related guidelines and advisories from regulators.
Good with numbers for use in metrics.
Soft Skills
Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.
Process aware mindset.
Strong analytical and problem-solving skills.
Effective time management and organizational skills.
Strong team player.
Able to work independently with minimal supervision.
High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.
Willing to learn quickly.
Be The First To Know
About the latest Cybersecurity software Jobs in Singapore !
Information Security
Posted today
Job Viewed
Job Description
Job Objectives
The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.
Key Responsibilities
This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:
• Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.
• Manage reverse third-party due diligence engagements related to GIS.
• Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.
• Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.
• Execution of the GIS KRCSA (Key Risk and Control Self Assessments).
• Management policy, procedures and standards updates and control.
• Manage various GIS initiatives and duties as assigned.
Key Requirements
• Communicate effectively with a variety of internal and external teams and stakeholders.
• Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.
• Ability to respond to any requests and issues on a timely basis.
Education
• Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.
• Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.
• Knowledge of industry best practices.
Technical Skills
• Overall experience 5+ years of experience.
• 2+ years of relevant experience in Security/IT governance disciplines.
• Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.
• Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.
• Good knowledge of Security concepts and practices.
• Good knowledge of Security related guidelines and advisories from regulators.
• Good with numbers for use in metrics.
Soft Skills
• Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.
• Process aware mindset.
• Strong analytical and problem-solving skills.
• Effective time management and organizational skills.
• Strong team player.
• Able to work independently with minimal supervision.
• High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.
• Willing to learn quickly.
IT Security Policies
Information Security
Security Architecture
Information Security Policies
Information Security Policy
Security Governance
Application Security
Due Diligence
Cyber Security
Information Security Governance
IT Governance
Knowledge Management
Assurance
IT Security Assessments
Operational Risk
CISA
Regulatory Requirements
IT Security Best Practices
Audit
CISSP
Information Security
Posted today
Job Viewed
Job Description
Location: CBD, Singapore
Type: 1-year contract (with possible extension)
This is a leadership n Hands on role — you'll help set the strategy, make big decisions on security, and lead responses if anything goes wrong
You are tasked with keeping the company's IT systems and data secure.
This includes making sure there are strong security policies, protecting against cyber threats, and helping the company meet regulations.
You'll work closely with top management and teams across the company to manage risks and improve cybersecurity.
When need arises. you will need to hands on to solve the problems
.
Job scope:
Leadership
- Set and lead the company's overall IT security plan.
- Advise top leaders on cybersecurity matters.
- Create security rules and make sure everyone follows them.
- Help other departments understand and support security goals
Operations
- Manage the IT security budget carefully.
- Track performance — like system downtime, incident handling speed, and vendor performance.
- Make business cases to justify investments in security tools or projects.
Cybersecurity Incident Handling
- Keep improving systems to detect and prevent cyberattacks.(Leadership and Hands on)
- Monitor for threats and respond quickly if there's a breach.(Leadership and Hands on)
Compliance
- Identify and manage cybersecurity risks (including third-party/vendor risks).
- Ensure the company follows laws and industry standards (like MAS TRM, ISO 27001).
- Regularly check and report on security risks and how they're being handled.
Requirement
- A degree in Computer Science, IT with Certification :CISSP, CISM, CISA, CRISC, or CCSP.
- 5 years in IT Security n 3years in a leadership role like IT Security Manager or CISO.
Added advantage:
Finance or insurance domain.
Other Skills
- Strong knowledge of cybersecurity laws, risks, and standards.
- Ability to explain technical issues to non-technical people.
- Good leadership and teamwork skills.
- Experience with budgeting and running IT security projects.
What You'll Be Measured On:
- Annual cybersecurity strategy report
- Quarterly risk reports and dashboards
- Performance metrics (e.g: incident handling, cost efficiency)
- Budget usage and cost tracking
- Regular reviews of IT security performance and vendor quality
Work location :CBD
Whats on offer
(1) Attractive package
(2) Stable Management
(3) Dynamic work environment.
For better response, pls apply via job page
click job opening, click relevant position.
We regret that only shortlisted candidates will be notified.
Tell employers what skills you haveInformation Security
Leadership
Security Operations
Cyber Security
Investments
ISO
ISO 27001
Compliance
Budgeting
CISA
Network Security
CISSP
Information Security Engineer
Posted today
Job Viewed
Job Description
CyberArk Engineer
We are seeking a skilled and motivated CyberArk Engineer to join our growing security engineering team. In this role, you will be responsible for designing, implementing, and supporting privileged access management (PAM) solutions using CyberArk, ensuring the highest levels of security, compliance, and operational efficiency.
The ideal candidate will hold a CyberArk Certified Delivery Engineer (CDE) certification and have experience with Sentry (preferred). You will collaborate with cross-functional teams to protect sensitive data and critical systems from unauthorized access.
Key Responsibilities:
- Manage the onboarding and lifecycle of privileged accounts across various systems and environments.
- Implement CyberArk policies and security best practices to align with compliance and regulatory standards.
- Develop and maintain automation scripts and integrations with CyberArk using REST APIs, PowerShell, and other tools.
- Monitor and troubleshoot CyberArk infrastructure and user issues, providing escalation support as needed.
- Troubleshoot and remediate CyberArk Central Policy Manager (CPM) failures, including credential rotation errors, connectivity issues, and policy misconfigurations.
- Analyse CPM logs and error codes to identify root causes and implement durable solutions in collaboration with infrastructure and application teams.
- Perform health checks and tuning of CPM components to ensure stability and optimal performance.
- Basic understanding of custom CPM and PSM connectors for target platforms not natively supported by CyberArk.
- Work with application owners to gather requirements for new connectors, create integration documentation, and test connector functionality in pre-production environments.
- Leverage scripting (e.g., PowerShell, Python) to enhance connector behaviour and automate remediation tasks.
- Contribute to the connector certification process and maintain version control for custom components.
- Assist with audits, documentation, and reporting of privileged access activities.
- Work with IT, DevOps, and Security teams to integrate PAM solutions into existing workflows.
- Stay up to date with emerging threats, PAM trends, and CyberArk product updates.
Required Qualifications:
- CyberArk Certified Delivery Engineer (CDE) certification (must-have)
- 3+ years of experience implementing and supporting CyberArk solutions in enterprise environments
- Proficiency with CyberArk components and architecture
- Strong scripting skills (PowerShell, Python, etc.) and experience using CyberArk APIs
- Understanding of Identity and Access Management (IAM) concepts, Zero Trust, and least privilege
- Solid knowledge of Windows/Linux systems, Active Directory, and network security fundamentals
Preferred Qualifications:
- Experience or certification with Sentry
- CyberArk Defender or Guardian certification(s)
- Familiarity with cloud PAM implementations (AWS, Azure, GCP)
- Experience with SIEM tools and security monitoring
- Bachelor's degree in Computer Science, Information Security, or related field
Interested candidates may apply through the application system. We regret to inform only Shortlisted candidates will be notified.
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.
PERSOLKELLY Singapore Pte Ltd
• RCB No E
• EA License No. 01C4394
• EA Registration No. R Derrick Tiew Yong Han)
This is in partnership with the Employment and Employability Institute Pte Ltd ("e2i").
e2i is the empowering network for workers and employers seeking employment and employability solutions. e2i serves as a bridge between workers and employers, connecting with workers to offer job security through job-matching, career guidance and skills upgrading services, and partnering employers to address their manpower needs through recruitment, training, and job redesign solutions. e2i is a tripartite initiative of the National Trades Union Congress set up to support nation-wide manpower and skills upgrading initiatives.