332 Information Governance jobs in Singapore
Information Security Governance Specialist
Posted today
Job Viewed
Job Description
The role of Information Security Governance Specialist involves the verification and assurance of subsystems' onboarding to Compliance Platforms. This includes building/updating a checklist of compliance items to be assessed and performing the assessment to validate and verify that projects/systems have successfully onboarded to the Compliance Platforms.
This position requires providing advisory and guidance to application teams in their preparations for compliance verifications and audits. Conducting regular compliance verifications to ensure applications have necessary processes, standards, and controls to comply with policies is also a key responsibility.
- Develop protocols and documentation for maintaining compliance standards.
- Lead and manage the compliance onboarding with application teams to ensure they meet planned schedules.
- Work closely and engage with engineering departments to identify areas of improvement and solve problems.
- Develop and maintain the management reporting dashboard with data analytical tools such as Power BI.
The ideal candidate should possess a degree in Information Technology, Computer Engineering, or a related discipline. At least 5 years of technical and/or project management experience in IT Operations and Support and/or Governance and Compliance is required.
Able to effectively communicate complex technical concepts, facilitating collaboration between teams across departments. Strong analytical and problem-solving skills to address compliance challenges and security risks issues are essential.
Demonstrate proactive behavior in improving and streamlining processes, incorporating feedback from audits and assessments to enhance application sustainment practices. Ability to prepare an organization for audits, ensuring documentation, processes, and controls align with policy and standards requirements.
Information Security
Posted today
Job Viewed
Job Description
Internship
Summary
Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.
Job Description
Responsibilities:
Application Security
Research web and mobile application security best practices
Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure
Assist in tracking and resolving penetration test and threat modelling findings
Perform internal security testing using Burp Suite and Kali Linux, etc.
Security Compliance
Work closely with various IT teams to identify, assess and manage information security risks
Assist to coordinate with application and various IT teams on various compliance controls.
Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.
MAS Technology Risk Management Guidelines
-Assist to collect and compile security related statistics, assess the information and prepare management reports.
- Assist in conducting regular phishing campaigns and compile the results for analysis.
Risk Management
- Assess and enforce the security controls of IT projects
Projects
Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.
Assist the project manager and liaise with vendor
Provide internal support during the implementation
Requirements:
Pursuing a degree with specialization in Information Security
Interest in cyber security
Good trouble-shooting and analytical skills
Independent and resourceful
Good interpersonal skills
Information Security
Posted today
Job Viewed
Job Description
Summary
Provide better appreciation and experiential learning in Cybersecurity defence in terms of concepts, architecture, technologies, tools, and operations.
Job Description
Responsibilities:
Application Security
- Research web and mobile application security best practices
- Research into the latest IAM technologies and propose enhancements to existing SIA infrastructure
- Assist in tracking and resolving penetration test and threat modelling findings
- Perform internal security testing using Burp Suite and Kali Linux, etc.
Security Compliance
- Work closely with various IT teams to identify, assess and manage information security risks
- Assist to coordinate with application and various IT teams on various compliance controls.
- Perform proactive threat analysis from network traffic, user and security logs, and other relevant security data to hunt for potential adversary activity.
MAS Technology Risk Management Guidelines
- Assist to collect and compile security related statistics, assess the information and prepare management reports.
- Assist in conducting regular phishing campaigns and compile the results for analysis.
Risk Management
- Assess and enforce the security controls of IT projects
Projects
- Assist in the Cyber and Information Security project requirement gathering, procurement and implementations.
- Assist the project manager and liaise with vendor
- Provide internal support during the implementation
Requirements
- Pursuing a degree with specialization in Information Security
- Interest in cyber security
- Good trouble-shooting and analytical skills
- Independent and resourceful
- Good interpersonal skills
Information Security
Posted today
Job Viewed
Job Description
Job Objectives
The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.
Key Responsibilities
This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:
Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.
Manage reverse third-party due diligence engagements related to GIS.
Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.
Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.
Execution of the GIS KRCSA (Key Risk and Control Self Assessments).
Management policy, procedures and standards updates and control.
Manage various GIS initiatives and duties as assigned.
Key Requirements
Communicate effectively with a variety of internal and external teams and stakeholders.
Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.
Ability to respond to any requests and issues on a timely basis.
Education
Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.
Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.
Knowledge of industry best practices.
Technical Skills
Overall experience 5+ years of experience.
2+ years of relevant experience in Security/IT governance disciplines.
Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.
Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.
Good knowledge of Security concepts and practices.
Good knowledge of Security related guidelines and advisories from regulators.
Good with numbers for use in metrics.
Soft Skills
Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.
Process aware mindset.
Strong analytical and problem-solving skills.
Effective time management and organizational skills.
Strong team player.
Able to work independently with minimal supervision.
High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.
Willing to learn quickly.
Information Security
Posted today
Job Viewed
Job Description
Job Objectives
The Security Governance Specialist role will support the Head of Security Governance in enhancing and maintaining the Security Governance within the Group Information Security(GIS) function in the Bank.
Key Responsibilities
This position will support senior Security Governance team members and work closely with various business, risk and technology stakeholders to:
• Proactively assess the compliance exposure to current and emerging security-related regulatory requirements and plan & track remediation efforts.
• Manage reverse third-party due diligence engagements related to GIS.
• Manage audit, assurance and regulatory engagements related to GIS including ongoing knowledge management on queries and request for information.
• Track and report against the technology KORI(Key Operational Risk Indicators)/KRIs and required security metrics.
• Execution of the GIS KRCSA (Key Risk and Control Self Assessments).
• Management policy, procedures and standards updates and control.
• Manage various GIS initiatives and duties as assigned.
Key Requirements
• Communicate effectively with a variety of internal and external teams and stakeholders.
• Capable of managing a variety of priorities and deliverables with minimal guidance or supervision.
• Ability to respond to any requests and issues on a timely basis.
Education
• Diploma/Degree in engineering/Computer Science / IT/Cyber Security from a recognized education institution.
• Professional Technology Risk Management/Cybersecurity related qualification will be favorable although not mandatory.
• Knowledge of industry best practices.
Technical Skills
• Overall experience 5+ years of experience.
• 2+ years of relevant experience in Security/IT governance disciplines.
• Have a strong security risk and analytical mindset in approaching situations and interactions with stakeholders.
• Effective negotiating skills and demonstrated sensitivity to working and interacting with stakeholders.
• Good knowledge of Security concepts and practices.
• Good knowledge of Security related guidelines and advisories from regulators.
• Good with numbers for use in metrics.
Soft Skills
• Good written and verbal communication skills and expertise in setting and managing stakeholder expectations.
• Process aware mindset.
• Strong analytical and problem-solving skills.
• Effective time management and organizational skills.
• Strong team player.
• Able to work independently with minimal supervision.
• High degree of attention to detail and discipline on tracking and managing the closure of identified gaps and issues.
• Willing to learn quickly.
IT Security Policies
Information Security
Security Architecture
Information Security Policies
Information Security Policy
Security Governance
Application Security
Due Diligence
Cyber Security
Information Security Governance
IT Governance
Knowledge Management
Assurance
IT Security Assessments
Operational Risk
CISA
Regulatory Requirements
IT Security Best Practices
Audit
CISSP
Information Security
Posted today
Job Viewed
Job Description
Location: CBD, Singapore
Type: 1-year contract (with possible extension)
This is a leadership n Hands on role — you'll help set the strategy, make big decisions on security, and lead responses if anything goes wrong
You are tasked with keeping the company's IT systems and data secure.
This includes making sure there are strong security policies, protecting against cyber threats, and helping the company meet regulations.
You'll work closely with top management and teams across the company to manage risks and improve cybersecurity.
When need arises. you will need to hands on to solve the problems
.
Job scope:
Leadership
- Set and lead the company's overall IT security plan.
- Advise top leaders on cybersecurity matters.
- Create security rules and make sure everyone follows them.
- Help other departments understand and support security goals
Operations
- Manage the IT security budget carefully.
- Track performance — like system downtime, incident handling speed, and vendor performance.
- Make business cases to justify investments in security tools or projects.
Cybersecurity Incident Handling
- Keep improving systems to detect and prevent cyberattacks.(Leadership and Hands on)
- Monitor for threats and respond quickly if there's a breach.(Leadership and Hands on)
Compliance
- Identify and manage cybersecurity risks (including third-party/vendor risks).
- Ensure the company follows laws and industry standards (like MAS TRM, ISO 27001).
- Regularly check and report on security risks and how they're being handled.
Requirement
- A degree in Computer Science, IT with Certification :CISSP, CISM, CISA, CRISC, or CCSP.
- 5 years in IT Security n 3years in a leadership role like IT Security Manager or CISO.
Added advantage:
Finance or insurance domain.
Other Skills
- Strong knowledge of cybersecurity laws, risks, and standards.
- Ability to explain technical issues to non-technical people.
- Good leadership and teamwork skills.
- Experience with budgeting and running IT security projects.
What You'll Be Measured On:
- Annual cybersecurity strategy report
- Quarterly risk reports and dashboards
- Performance metrics (e.g: incident handling, cost efficiency)
- Budget usage and cost tracking
- Regular reviews of IT security performance and vendor quality
Work location :CBD
Whats on offer
(1) Attractive package
(2) Stable Management
(3) Dynamic work environment.
For better response, pls apply via job page
click job opening, click relevant position.
We regret that only shortlisted candidates will be notified.
Tell employers what skills you haveInformation Security
Leadership
Security Operations
Cyber Security
Investments
ISO
ISO 27001
Compliance
Budgeting
CISA
Network Security
CISSP
Information Security Engineer
Posted today
Job Viewed
Job Description
CyberArk Engineer
We are seeking a skilled and motivated CyberArk Engineer to join our growing security engineering team. In this role, you will be responsible for designing, implementing, and supporting privileged access management (PAM) solutions using CyberArk, ensuring the highest levels of security, compliance, and operational efficiency.
The ideal candidate will hold a CyberArk Certified Delivery Engineer (CDE) certification and have experience with Sentry (preferred). You will collaborate with cross-functional teams to protect sensitive data and critical systems from unauthorized access.
Key Responsibilities:
- Manage the onboarding and lifecycle of privileged accounts across various systems and environments.
- Implement CyberArk policies and security best practices to align with compliance and regulatory standards.
- Develop and maintain automation scripts and integrations with CyberArk using REST APIs, PowerShell, and other tools.
- Monitor and troubleshoot CyberArk infrastructure and user issues, providing escalation support as needed.
- Troubleshoot and remediate CyberArk Central Policy Manager (CPM) failures, including credential rotation errors, connectivity issues, and policy misconfigurations.
- Analyse CPM logs and error codes to identify root causes and implement durable solutions in collaboration with infrastructure and application teams.
- Perform health checks and tuning of CPM components to ensure stability and optimal performance.
- Basic understanding of custom CPM and PSM connectors for target platforms not natively supported by CyberArk.
- Work with application owners to gather requirements for new connectors, create integration documentation, and test connector functionality in pre-production environments.
- Leverage scripting (e.g., PowerShell, Python) to enhance connector behaviour and automate remediation tasks.
- Contribute to the connector certification process and maintain version control for custom components.
- Assist with audits, documentation, and reporting of privileged access activities.
- Work with IT, DevOps, and Security teams to integrate PAM solutions into existing workflows.
- Stay up to date with emerging threats, PAM trends, and CyberArk product updates.
Required Qualifications:
- CyberArk Certified Delivery Engineer (CDE) certification (must-have)
- 3+ years of experience implementing and supporting CyberArk solutions in enterprise environments
- Proficiency with CyberArk components and architecture
- Strong scripting skills (PowerShell, Python, etc.) and experience using CyberArk APIs
- Understanding of Identity and Access Management (IAM) concepts, Zero Trust, and least privilege
- Solid knowledge of Windows/Linux systems, Active Directory, and network security fundamentals
Preferred Qualifications:
- Experience or certification with Sentry
- CyberArk Defender or Guardian certification(s)
- Familiarity with cloud PAM implementations (AWS, Azure, GCP)
- Experience with SIEM tools and security monitoring
- Bachelor's degree in Computer Science, Information Security, or related field
Interested candidates may apply through the application system. We regret to inform only Shortlisted candidates will be notified.
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.
PERSOLKELLY Singapore Pte Ltd
• RCB No E
• EA License No. 01C4394
• EA Registration No. R Derrick Tiew Yong Han)
This is in partnership with the Employment and Employability Institute Pte Ltd ("e2i").
e2i is the empowering network for workers and employers seeking employment and employability solutions. e2i serves as a bridge between workers and employers, connecting with workers to offer job security through job-matching, career guidance and skills upgrading services, and partnering employers to address their manpower needs through recruitment, training, and job redesign solutions. e2i is a tripartite initiative of the National Trades Union Congress set up to support nation-wide manpower and skills upgrading initiatives.
Be The First To Know
About the latest Information governance Jobs in Singapore !
Information Security Specialist
Posted today
Job Viewed
Job Description
Work Location :
Singapore, Singapore
Hours:
40
Line of Business:
Technology Solutions
Pay Details:
We're committed to providing fair and equitable compensation to all our colleagues. As a candidate, we encourage you to have an open dialogue with a member of our HR Team and ask compensation related questions, including pay details for this role.
Job Description:
Responsibilities:
- Conduct Penetration Tests: Perform thorough and methodical penetration testing on web applications, mobile, AI, network infrastructures, and other systems to identify security vulnerabilities.
- Vulnerability Assessment: Assess and analyze security weaknesses, and provide actionable recommendations to mitigate risks and improve overall security posture.
- Report Findings: Document and communicate findings clearly and effectively to both technical and non-technical stakeholders. Prepare comprehensive reports with recommendations for remediation.
- Develop and Execute Test Plans: Design and execute detailed test plans
- Stay Current: Keep up-to-date with the latest security trends, vulnerabilities, and tools to ensure testing methodologies are current and effective.
- Collaborate with Teams: Work closely with IT and development teams to understand system architectures, provide guidance on security best practices, and support the implementation of security improvements.
- Perform Risk Assessments: Evaluate and assess potential security risks related to new and existing systems and technologies.
- Compliance: Ensure that penetration testing practices comply with relevant regulations, standards, and organizational policies.
Requirements:
- At least 8-10 years of relevant experience
- Technical Skills:
- Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and Kali.
- Knowledge of common web application vulnerabilities (e.g., OWASP Top Ten) and network security principles.
- Analytical Skills: Strong analytical and problem-solving abilities with attention to detail.
- Communication: Excellent verbal and written communication skills, with the ability to convey complex technical concepts to non-technical stakeholders.
- Ethical Standards: Demonstrated understanding of ethical hacking principles and a commitment to maintaining high ethical standards.
Preferred Qualifications:
- Experience with penetration testing in AI, cloud environments (e.g., AWS, Azure) and PCI testing.
- Familiarity with security standards and frameworks
- Certifications: Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Penetration Tester (GPEN) are highly desirable.
Who We Are
TD is one of the world's leading global financial institutions and is the fifth largest bank in North America by branches/stores. Every day, we deliver legendary customer experiences to over 27 million households and businesses in Canada, the United States and around the world. More than 95,000 TD colleagues bring their skills, talent, and creativity to the Bank, those we serve, and the economies we support. We are guided by our vision to Be the Better Bank and our purpose to enrich the lives of our customers, communities and colleagues.
TD is deeply committed to being a leader in customer experience, that is why we believe that all colleagues, no matter where they work, are customer facing. As we build our business and deliver on our strategy, we are innovating to enhance the customer experience and build capabilities to shape the future of banking. Whether you've got years of banking experience or are just starting your career in financial services, we can help you realize your potential. Through regular leadership and development conversations to mentorship and training programs, we're here to support you towards your goals. As an organization, we keep growing – and so will you.
Our Total Rewards Package
Our Total Rewards package reflects the investment we make in our colleagues to help them, and their families achieve their well-being goals. Total Rewards at TD includes a base salary and several other key plans such as health and well-being benefits, including medical coverage, paid time off, career development, and reward and recognition programs.
Additional Information:
We're delighted that you're considering building a career with TD. Through regular development conversations, training programs, and a competitive benefits plan, we're committed to providing the support our colleagues need to thrive both at work and at home.
Colleague Development
If you're interested in a specific career path or are looking to build certain skills, we want to help you succeed. You'll have regular career, development, and performance conversations with your manager, as well as access to an online learning platform and a variety of mentoring programs to help you unlock future opportunities. Whether you have a passion for helping customers and want to expand your experience, or you want to coach and inspire your colleagues, there are many different career paths within our organization at TD – and we're committed to helping you identify opportunities that support your goals.
Training & Onboarding
We will provide training and onboarding sessions to ensure that you've got everything you need to succeed in your new role.
Interview Process
We'll reach out to candidates of interest to schedule an interview. We do our best to communicate outcomes to all applicants by email or phone call.
Accommodation
If you require an accommodation for the recruitment / interview process (including alternate formats of materials, or accessible meeting rooms or other accommodation), please let us know and we will work with you to meet your needs.
Information Security Officer
Posted today
Job Viewed
Job Description
Job Title: Security GRC Lead/ ISO
About the Role
We are hiring an Security GRC Lead/ISO for our client in the insurance sector . This is a senior leadership role responsible for developing and executing the enterprise-wide information security strategy. The successful candidate will drive policy, governance, and risk management initiatives while overseeing cybersecurity operations and ensuring alignment between business and security objectives.
Key Responsibilities
- Develop and lead the company-wide information security strategy in alignment with business goals and regulatory standards (e.g., MAS TRM, ISO
- Serve as the key advisor and senior leadership on cybersecurity and risk matters.
- Lead the creation and enforcement of security policies, procedures, and standards.
- Manage security risk assessments, third-party/vendor risk, and compliance initiatives.
- Oversee incident response and threat management across the organization.
- Monitor and report key security metrics, including incident response time, system availability, and vendor performance.
- Evaluate and implement emerging cybersecurity technologies and best practices.
Qualifications
- Bachelor's or Master's in Computer Science, Information Security, or related field.
- Professional certifications such as CISSP, CISM, CISA, CRISC , or equivalent are preferred.
- 8–10 years of relevant experience, with at least 5 years in a security leadership role (e.g., IT Security Manager, CISO).
- Proven experience in regulated industries , ideally within financial services or insurance.
- Strong knowledge of MAS TRM guidelines , risk frameworks, and GRC practices.
- Excellent leadership, communication, and stakeholder management skills.
If this opportunity aligns with your skills and career goals, we encourage you to apply.
EA License: 21C0783
EAP Registration No: R
information security manager
Posted today
Job Viewed
Job Description
- Develop, implement, and manage the organization's information security strategy, policies, and procedures .
- Lead the design and enforcement of security controls to protect systems, networks, and data from cyber threats.
- Manage a team of security professionals, providing technical guidance, mentoring, and performance management .
- Oversee risk assessments, vulnerability management, penetration testing, and incident response .
- Ensure compliance with regulatory requirements, industry standards, and frameworks (e.g., ISO 27001, NIST, GDPR, PCI-DSS, HIPAA).
- Collaborate with IT, DevOps, and business teams to embed security into application development and infrastructure design .
- Manage security operations center (SOC) activities , including monitoring, threat detection, and escalation.
- Define, track, and report security KPIs and risk metrics to senior leadership.
- Evaluate, select, and implement security tools and technologies to strengthen organizational defenses.
- Lead security awareness and training programs to promote a strong security culture .
- Cybersecurity & Risk Management : Strong knowledge of threat modeling, risk assessment methodologies, incident response frameworks , and business continuity planning .
- Security Technologies : Hands-on expertise with firewalls, IDS/IPS, SIEM (Splunk, QRadar, ELK), EDR/XDR, DLP, IAM, PAM solutions, WAF, and CASB .
- Cloud Security : Proficiency in securing workloads on AWS, Azure, and GCP , including IAM, KMS, Cloud Security Posture Management (CSPM) .
- Application & Network Security : Experience in secure SDLC, DevSecOps practices, vulnerability management, penetration testing tools (Burp Suite, Metasploit, Nessus, Qualys) .
- Cryptography & Data Protection : Understanding of PKI, SSL/TLS, encryption protocols, key management, tokenization, and data masking .
- Governance, Risk & Compliance (GRC) : Familiarity with ISO 27001, SOC 2, NIST CSF, COBIT, GDPR, HIPAA, PCI-DSS frameworks.
- Incident Response & Forensics : Ability to manage SIEM alerts, digital forensics, malware analysis , and lead response teams during breaches.
- Scripting & Automation : Knowledge of Python, PowerShell, or Bash for automating security operations and log analysis.
- Security certifications such as CISSP, CISM, CISA, CEH, OSCP, CCSP, ISO 27001 Lead Implementer/Auditor .
- Experience in Zero Trust Architecture and container security (Docker, Kubernetes) .
- Knowledge of threat intelligence platforms and SOC automation (SOAR) .