170 Identity Governance jobs in Singapore
Identity Governance Specialist
Posted today
Job Viewed
Job Description
We are seeking a seasoned Identity Governance professional to spearhead the design, deployment, and administration of IAM-IGA solutions. This individual will lead the development of scalable identity architectures, facilitate collaboration among cross-functional teams, and ensure seamless integration efforts.
- Collaborate with stakeholders to develop IAM-IGA configurations based on client requirements and solution designs.
- Evaluate system architecture and provide recommendations for improvement.
- Demonstrate expertise in troubleshooting complex application architectures with diverse middleware technologies.
The successful candidate will be responsible for maintaining and supporting IGA solutions through timely troubleshooting, incident response, and patching.
- Create and maintain comprehensive documentation for design specifications, installations, upgrades, and test cases.
- Cultivate relationships with vendors and support teams to resolve implementation issues and upgrade challenges.
A Bachelor's degree in Information Technology, Cybersecurity, Information Security, Computer Science, or a related field is required. Minimum 5 years of experience in designing, deploying, implementing, and administering IGA solutions is necessary.
Senior Identity Governance Specialist
Posted today
Job Viewed
Job Description
We are seeking a highly skilled Senior Identity Governance Specialist to join our team.
This is a unique opportunity to make a significant impact on the security and compliance of our organisation.
Responsibilities
- Develop and implement comprehensive user access review cycles, ensuring compliance with organisational security policies and regulatory requirements.
- Oversee the complete UAR lifecycle from initial data extraction through to final certification, ensuring accuracy and timeliness of all access review activities.
- Compile and validate access data from multiple enterprise systems, cross-referencing user permissions and validating accuracy of access rights across all applications and platforms.
- Coordinate extensively with stakeholders across the organisation to obtain timely responses and certifications, managing relationships to ensure review completion within required timeframes.
- Track and follow up on access exceptions, working closely with system owners to ensure prompt remediation of identified compliance issues and security risks.
- Maintain comprehensive documentation of UAR processes, findings, and remediation activities to support audit requirements and continuous improvement initiatives.
Privileged Access Management
- Manage privileged access reviews within CyberArk environment, ensuring appropriate oversight of high-risk access permissions and maintaining security of critical systems.
- Conduct regular assessments of privileged accounts to ensure principle of least privilege is maintained and access remains appropriate for business requirements.
IAM Audit and Compliance
- Conduct comprehensive IAM audits to assess the effectiveness of identity governance controls and identify gaps in access management processes.
- Perform detailed analysis of user access patterns, identifying anomalies, orphaned accounts, and potential security risks through systematic audit procedures.
- Prepare detailed audit reports documenting findings, risk assessments, and recommended remediation actions for management and external auditors.
- Support internal and external audit activities by providing evidence of IAM controls, access logs, and compliance documentation.
- Maintain audit trails for all identity management activities, ensuring comprehensive documentation for regulatory compliance and forensic analysis.
Identity Management Operations
- Support identity management cleanup initiatives, including process review, requirement documentation, user acceptance testing (UAT), and ongoing Day 2 IAM operations.
- Collaborate with technical teams to implement identity governance improvements and automation opportunities to enhance operational efficiency.
- Participate in the design and implementation of identity management solutions that align with enterprise security architecture and compliance requirements.
Compliance and Risk Management
- Ensure all identity and access management activities comply with internal policies, regulatory requirements, and industry best practices.
- Identify and assess identity-related risks, developing mitigation strategies and working with stakeholders to implement appropriate controls.
- Support internal and external audits by providing comprehensive documentation and evidence of access management controls and processes.
- Conduct risk-based access assessments to prioritise remediation efforts and resource allocation.
Process Improvement and Documentation
- Continuously evaluate existing IAM processes to identify opportunities for automation, streamlining, and efficiency improvements.
- Develop and maintain detailed process documentation, standard operating procedures, and training materials for IAM activities.
- Collaborate with cross-functional teams to implement process improvements and technology solutions that reduce manual effort whilst maintaining security and compliance standards.
Core Java/J2EE Application Developer (Oracle Identity Governance)
Posted today
Job Viewed
Job Description
Responsibilities
Analyse, develop, enhance, debug, support, maintain, test applications (Oracle Identity & Access Management IAM)
The primary work comprises of requirement analysis, mapping design, technical specification, programming, code review, job scheduling, perform unit test and SIT, support UAT, deploy to production, post implementation support, and technical documentation.
Requirements
Strong experience in Customization of ADF UI and SOA workflows.
Experience on XML, XSD, SOAP, WSDL, SOA BPEL process, Oracle Business Rule and Human Workflows for request approvals in Approval policy.
Strong experience in integrating OIM with AD, Exchange, RACF, AS400 connectors
Must have Core Java/J2EE knowledge for customizations.
Strong experience in developing connectors, approval workflows, and custom event handlers, custom scheduled tasks and reconciliation.
Good command on UI customization and UDF’s and lookup fields in the design console to extend the connector functionality.
Expertise on Flat File, Directory server reconciliation, Bulkload utility .
Integrated and Implemented Role based Access Control products with Identity and Access Management solutions.
Hands on experience on SSL configuration
Have knowledge on WebLogic application server, WebSphere, OHS, JBoss and apache servers
Strong understanding of Agile Scrum and Waterfall SDLC methodologies.
Application of latest Bundle Patches
Key Domain/ Technical Skills
Oracle Identity Governance (12 C) ,Java,SQL,SOA,Linux scripting, WebLogic
#J-18808-Ljbffr
Information Security
Posted today
Job Viewed
Job Description
Internship
Summary
Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.
Job Description
Responsibilities:
Application Security
Research web and mobile application security best practices
Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure
Assist in tracking and resolving penetration test and threat modelling findings
Perform internal security testing using Burp Suite and Kali Linux, etc.
Security Compliance
Work closely with various IT teams to identify, assess and manage information security risks
Assist to coordinate with application and various IT teams on various compliance controls.
Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.
MAS Technology Risk Management Guidelines
-Assist to collect and compile security related statistics, assess the information and prepare management reports.
- Assist in conducting regular phishing campaigns and compile the results for analysis.
Risk Management
- Assess and enforce the security controls of IT projects
Projects
Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.
Assist the project manager and liaise with vendor
Provide internal support during the implementation
Requirements:
Pursuing a degree with specialization in Information Security
Interest in cyber security
Good trouble-shooting and analytical skills
Independent and resourceful
Good interpersonal skills
Information Security
Posted today
Job Viewed
Job Description
Summary
Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.
Job Description
Responsibilities:
Application Security
- Research web and mobile application security best practices
- Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure
- Assist in tracking and resolving penetration test and threat modelling findings
- Perform internal security testing using Burp Suite and Kali Linux, etc.
Security Compliance
- Work closely with various IT teams to identify, assess and manage information security risks
- Assist to coordinate with application and various IT teams on various compliance controls.
- Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.
MAS Technology Risk Management Guidelines
- Assist to collect and compile security related statistics, assess the information and prepare management reports.
- Assist in conducting regular phishing campaigns and compile the results for analysis.
Risk Management
- Assess and enforce the security controls of IT projects
Projects
- Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.
- Assist the project manager and liaise with vendor
- Provide internal support during the implementation
Requirements
- Pursuing a degree with specialization in Information Security
- Interest in cyber security
- Good trouble-shooting and analytical skills
- Independent and resourceful
- Good interpersonal skills
Information Security
Posted today
Job Viewed
Job Description
Job Objectives
The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.
Key Responsibilities
This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:
Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.
Manage reverse third-party due diligence engagements related to GIS.
Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.
Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.
Execution of the GIS KRCSA (Key Risk and Control Self Assessments).
Management policy, procedures and standards updates and control.
Manage various GIS initiatives and duties as assigned.
Key Requirements
Communicate effectively with a variety of internal and external teams and stakeholders.
Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.
Ability to respond to any requests and issues on a timely basis.
Education
Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.
Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.
Knowledge of industry best practices.
Technical Skills
Overall experience 5+ years of experience.
2+ years of relevant experience in Security/IT governance disciplines.
Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.
Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.
Good knowledge of Security concepts and practices.
Good knowledge of Security related guidelines and advisories from regulators.
Good with numbers for use in metrics.
Soft Skills
Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.
Process aware mindset.
Strong analytical and problem-solving skills.
Effective time management and organizational skills.
Strong team player.
Able to work independently with minimal supervision.
High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.
Willing to learn quickly.
Information Security
Posted today
Job Viewed
Job Description
Job Objectives
The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.
Key Responsibilities
This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:
• Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.
• Manage reverse third-party due diligence engagements related to GIS.
• Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.
• Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.
• Execution of the GIS KRCSA (Key Risk and Control Self Assessments).
• Management policy, procedures and standards updates and control.
• Manage various GIS initiatives and duties as assigned.
Key Requirements
• Communicate effectively with a variety of internal and external teams and stakeholders.
• Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.
• Ability to respond to any requests and issues on a timely basis.
Education
• Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.
• Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.
• Knowledge of industry best practices.
Technical Skills
• Overall experience 5+ years of experience.
• 2+ years of relevant experience in Security/IT governance disciplines.
• Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.
• Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.
• Good knowledge of Security concepts and practices.
• Good knowledge of Security related guidelines and advisories from regulators.
• Good with numbers for use in metrics.
Soft Skills
• Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.
• Process aware mindset.
• Strong analytical and problem-solving skills.
• Effective time management and organizational skills.
• Strong team player.
• Able to work independently with minimal supervision.
• High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.
• Willing to learn quickly.
IT Security Policies
Information Security
Security Architecture
Information Security Policies
Information Security Policy
Security Governance
Application Security
Due Diligence
Cyber Security
Information Security Governance
IT Governance
Knowledge Management
Assurance
IT Security Assessments
Operational Risk
CISA
Regulatory Requirements
IT Security Best Practices
Audit
CISSP
Be The First To Know
About the latest Identity governance Jobs in Singapore !
Information Security
Posted today
Job Viewed
Job Description
Location: CBD, Singapore
Type: 1-year contract (with possible extension)
This is a leadership n Hands on role — you'll help set the strategy, make big decisions on security, and lead responses if anything goes wrong
You are tasked with keeping the company's IT systems and data secure.
This includes making sure there are strong security policies, protecting against cyber threats, and helping the company meet regulations.
You'll work closely with top management and teams across the company to manage risks and improve cybersecurity.
When need arises. you will need to hands on to solve the problems
.
Job scope:
Leadership
- Set and lead the company's overall IT security plan.
- Advise top leaders on cybersecurity matters.
- Create security rules and make sure everyone follows them.
- Help other departments understand and support security goals
Operations
- Manage the IT security budget carefully.
- Track performance — like system downtime, incident handling speed, and vendor performance.
- Make business cases to justify investments in security tools or projects.
Cybersecurity Incident Handling
- Keep improving systems to detect and prevent cyberattacks.(Leadership and Hands on)
- Monitor for threats and respond quickly if there's a breach.(Leadership and Hands on)
Compliance
- Identify and manage cybersecurity risks (including third-party/vendor risks).
- Ensure the company follows laws and industry standards (like MAS TRM, ISO 27001).
- Regularly check and report on security risks and how they're being handled.
Requirement
- A degree in Computer Science, IT with Certification :CISSP, CISM, CISA, CRISC, or CCSP.
- 5 years in IT Security n 3years in a leadership role like IT Security Manager or CISO.
Added advantage:
Finance or insurance domain.
Other Skills
- Strong knowledge of cybersecurity laws, risks, and standards.
- Ability to explain technical issues to non-technical people.
- Good leadership and teamwork skills.
- Experience with budgeting and running IT security projects.
What You'll Be Measured On:
- Annual cybersecurity strategy report
- Quarterly risk reports and dashboards
- Performance metrics (e.g: incident handling, cost efficiency)
- Budget usage and cost tracking
- Regular reviews of IT security performance and vendor quality
Work location :CBD
Whats on offer
(1) Attractive package
(2) Stable Management
(3) Dynamic work environment.
For better response, pls apply via job page
click job opening, click relevant position.
We regret that only shortlisted candidates will be notified.
Tell employers what skills you haveInformation Security
Leadership
Security Operations
Cyber Security
Investments
ISO
ISO 27001
Compliance
Budgeting
CISA
Network Security
CISSP
Information Security Engineer
Posted today
Job Viewed
Job Description
CyberArk Engineer
We are seeking a skilled and motivated CyberArk Engineer to join our growing security engineering team. In this role, you will be responsible for designing, implementing, and supporting privileged access management (PAM) solutions using CyberArk, ensuring the highest levels of security, compliance, and operational efficiency.
The ideal candidate will hold a CyberArk Certified Delivery Engineer (CDE) certification and have experience with Sentry (preferred). You will collaborate with cross-functional teams to protect sensitive data and critical systems from unauthorized access.
Key Responsibilities:
- Manage the onboarding and lifecycle of privileged accounts across various systems and environments.
- Implement CyberArk policies and security best practices to align with compliance and regulatory standards.
- Develop and maintain automation scripts and integrations with CyberArk using REST APIs, PowerShell, and other tools.
- Monitor and troubleshoot CyberArk infrastructure and user issues, providing escalation support as needed.
- Troubleshoot and remediate CyberArk Central Policy Manager (CPM) failures, including credential rotation errors, connectivity issues, and policy misconfigurations.
- Analyse CPM logs and error codes to identify root causes and implement durable solutions in collaboration with infrastructure and application teams.
- Perform health checks and tuning of CPM components to ensure stability and optimal performance.
- Basic understanding of custom CPM and PSM connectors for target platforms not natively supported by CyberArk.
- Work with application owners to gather requirements for new connectors, create integration documentation, and test connector functionality in pre-production environments.
- Leverage scripting (e.g., PowerShell, Python) to enhance connector behaviour and automate remediation tasks.
- Contribute to the connector certification process and maintain version control for custom components.
- Assist with audits, documentation, and reporting of privileged access activities.
- Work with IT, DevOps, and Security teams to integrate PAM solutions into existing workflows.
- Stay up to date with emerging threats, PAM trends, and CyberArk product updates.
Required Qualifications:
- CyberArk Certified Delivery Engineer (CDE) certification (must-have)
- 3+ years of experience implementing and supporting CyberArk solutions in enterprise environments
- Proficiency with CyberArk components and architecture
- Strong scripting skills (PowerShell, Python, etc.) and experience using CyberArk APIs
- Understanding of Identity and Access Management (IAM) concepts, Zero Trust, and least privilege
- Solid knowledge of Windows/Linux systems, Active Directory, and network security fundamentals
Preferred Qualifications:
- Experience or certification with Sentry
- CyberArk Defender or Guardian certification(s)
- Familiarity with cloud PAM implementations (AWS, Azure, GCP)
- Experience with SIEM tools and security monitoring
- Bachelor's degree in Computer Science, Information Security, or related field
Interested candidates may apply through the application system. We regret to inform only Shortlisted candidates will be notified.
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.
PERSOLKELLY Singapore Pte Ltd
• RCB No E
• EA License No. 01C4394
• EA Registration No. R Derrick Tiew Yong Han)
This is in partnership with the Employment and Employability Institute Pte Ltd ("e2i").
e2i is the empowering network for workers and employers seeking employment and employability solutions. e2i serves as a bridge between workers and employers, connecting with workers to offer job security through job-matching, career guidance and skills upgrading services, and partnering employers to address their manpower needs through recruitment, training, and job redesign solutions. e2i is a tripartite initiative of the National Trades Union Congress set up to support nation-wide manpower and skills upgrading initiatives.
Information Security Specialist
Posted today
Job Viewed
Job Description
Work Location :
Singapore, Singapore
Hours:
40
Line of Business:
Technology Solutions
Pay Details:
We're committed to providing fair and equitable compensation to all our colleagues. As a candidate, we encourage you to have an open dialogue with a member of our HR Team and ask compensation related questions, including pay details for this role.
Job Description:
Responsibilities:
- Conduct Penetration Tests: Perform thorough and methodical penetration testing on web applications, mobile, AI, network infrastructures, and other systems to identify security vulnerabilities.
- Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
- Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
- Develop and Execute Test Plans: Design and execute detailed test plans
- Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
- Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements.
- Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
- Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
Requirements:
- At least 8-10 years of relevant experience
- Technical Skills:
- Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
- Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
- Analytical Skills: Strong analytical and problem-solving abilities with attention to detail.
- Communication: Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
- Ethical Standards: Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
Preferred Qualifications:
- Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
- Familiarity with security standards and frameworks
- Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
Who We Are
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing – and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investment we make in our colleagues to help them, and their families achieve their well-being goals. Total Rewards at TD includes a base salary and several other key plans such as health and well-being benefits, including medical coverage, paid time off, career development, and reward and recognition programs.
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD – and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
If you require an accommodation for the recruitment / interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.