1,189 Senior Security jobs in Singapore
Information Security Engineer
Posted today
Job Viewed
Job Description
Carry out the end-to-end security management for enterprise of application security, host security, data security, network security, including but not limited to security policy management and system maintenance.
Responsible for the Governance, Risk and Compliance technical implementation of personal information protection requirements.
Project management, plan and coordinate security tools implementation throughout the overseas region. Providing periodic reporting of progress and issues.
Conduct and perform periodic security awareness training and phishing campaigns.
Responsible for the break-down and implementation of the development work in the baseline specification and technical architecture.
The ideal candidates we are looking for should be seasoned Information Security Professionals with:
KEY REQUIREMENTS
Bachelor’s degree or above in Computer Science.
At least 3 years working experience in network or information security related fields.
Familiar with ISO27001, ITIL related technical standards and control measures.
Familiar with common information security products and technical principles, e.g. system and network security, DLP, antivirus, encryption, SIEM, Zero Trust etc.
Security certification such as CISSP, CISA, CCNP, CCIE is preferred.
#J-18808-Ljbffr
Information Security
Posted today
Job Viewed
Job Description
Location: CBD, Singapore
Type: 1-year contract (with possible extension)
This is a leadership n Hands on role — you'll help set the strategy, make big decisions on security, and lead responses if anything goes wrong
You are tasked with keeping the company's IT systems and data secure.
This includes making sure there are strong security policies, protecting against cyber threats, and helping the company meet regulations.
You'll work closely with top management and teams across the company to manage risks and improve cybersecurity.
When need arises. you will need to hands on to solve the problems
.
Job scope:
Leadership
- Set and lead the company's overall IT security plan.
- Advise top leaders on cybersecurity matters.
- Create security rules and make sure everyone follows them.
- Help other departments understand and support security goals
Operations
- Manage the IT security budget carefully.
- Track performance — like system downtime, incident handling speed, and vendor performance.
- Make business cases to justify investments in security tools or projects.
Cybersecurity Incident Handling
- Keep improving systems to detect and prevent cyberattacks.(Leadership and Hands on)
- Monitor for threats and respond quickly if there's a breach.(Leadership and Hands on)
Compliance
- Identify and manage cybersecurity risks (including third-party/vendor risks).
- Ensure the company follows laws and industry standards (like MAS TRM, ISO 27001).
- Regularly check and report on security risks and how they're being handled.
Requirement
- A degree in Computer Science, IT with Certification :CISSP, CISM, CISA, CRISC, or CCSP.
- 5 years in IT Security n 3years in a leadership role like IT Security Manager or CISO.
Added advantage:
Finance or insurance domain.
Other Skills
- Strong knowledge of cybersecurity laws, risks, and standards.
- Ability to explain technical issues to non-technical people.
- Good leadership and teamwork skills.
- Experience with budgeting and running IT security projects.
What You'll Be Measured On:
- Annual cybersecurity strategy report
- Quarterly risk reports and dashboards
- Performance metrics (e.g: incident handling, cost efficiency)
- Budget usage and cost tracking
- Regular reviews of IT security performance and vendor quality
Work location :CBD
Whats on offer
(1) Attractive package
(2) Stable Management
(3) Dynamic work environment.
For better response, pls apply via job page
click job opening, click relevant position.
We regret that only shortlisted candidates will be notified.
Tell employers what skills you haveInformation Security
Leadership
Security Operations
Cyber Security
Investments
ISO
ISO 27001
Compliance
Budgeting
CISA
Network Security
CISSP
Information Security Engineer #IJF
Posted today
Job Viewed
Job Description
Responsibility:
- Responsible for provision, deployment, configuration, and administration of many different pieces of network and security-related hardware and software.
- Responsible for evaluate, test, and troubleshoot technologies when new technologies are onboard
- Responsible for provide technical support for resolution of customer problems, incidents, issues, requests, and queries
- Configuring network devices, such as routers and switches, and ensuring they are up-to-date
- Experience with firewall rules implementation and troubleshooting upon incidents.
- Monitoring network performance, identifying areas for improvement, and ensuring optimal network uptime.
- Involve in update/upgrade/migration of security tools used by the team
- Maintain clear and functional documentations on process guides, technical instructions, network details, etc.
- Manage cybersecurity projects & coordinate with customer to deliver security solutions and initiatives timely.
- Any other adhoc duties as assigned
Requirements:
- Nitec/Diploma in Computer Engineering, Information Security or related field;
- Applicants with at least 1 years of relevant experience
- Strong knowledge of networking protocols (TCP/IP, DNS, DHCP), network devices (routers, switches, firewalls), and operating systems.
- Strong knowledge and understanding of IT infrastructure and security operations
- Ability to diagnose and resolve network issues effectively.
- Knowledge and understanding of Endpoint security, IDPS, WAF, APT, FW, Cloud Security
- Experience in enterprise level network
Interested applicants, please Email , and look for
Jensen Fang Lifa
Recruit Express Pte Ltd
EA License No. 99C4599
EA Personnel Registration Number: R
We regret that only shortlisted candidates will be contacted.
Tell employers what skills you haveSwitches
Information Security
Security Operations
Troubleshooting
Network Engineering
Cyber Security
DLP
CheckPoint Firewall
CyberArk
Networking
Cisco Routers
Operating Systems
Network Switches
Cyber Security Management
WAN
Network Security
Cisco Switches
DNS
Firewalls
Technical Support
Information Security Engineer (CyberArk)
Posted today
Job Viewed
Job Description
CyberArk Engineer
We are seeking a skilled and motivated
CyberArk Engineer
to join our growing security engineering team. In this role, you will be responsible for designing, implementing, and supporting
privileged access management (PAM)
solutions using
CyberArk , ensuring the highest levels of
security ,
compliance , and
operational efficiency .
The ideal candidate will hold a
CyberArk Certified Delivery Engineer (CDE)
certification and have experience with
Sentry
(preferred). You will collaborate with cross-functional teams to protect sensitive data and critical systems from unauthorized access.
Key Responsibilities:
Manage the onboarding and lifecycle of privileged accounts across various systems and environments.
Implement CyberArk policies and security best practices to align with compliance and regulatory standards.
Develop and maintain automation scripts and integrations with CyberArk using
REST APIs ,
PowerShell , and other tools.
Monitor and troubleshoot CyberArk infrastructure and user issues, providing escalation support as needed.
Troubleshoot and remediate CyberArk
Central Policy Manager (CPM)
failures, including credential rotation errors, connectivity issues, and policy misconfigurations.
Analyse CPM logs and error codes to identify root causes and implement durable solutions in collaboration with infrastructure and application teams.
Perform health checks and tuning of CPM components to ensure stability and optimal performance.
Basic understanding of custom
CPM
and
PSM
connectors for target platforms not natively supported by CyberArk.
Work with application owners to gather requirements for new connectors, create integration documentation, and test connector functionality in pre-production environments.
Leverage scripting (e.g., PowerShell, Python) to enhance connector behaviour and automate remediation tasks.
Contribute to the connector certification process and maintain version control for custom components.
Assist with audits, documentation, and reporting of privileged access activities.
Work with IT, DevOps, and Security teams to integrate PAM solutions into existing workflows.
Stay up to date with emerging threats, PAM trends, and CyberArk product updates.
Required Qualifications:
CyberArk Certified Delivery Engineer (CDE)
certification (must-have)
3+ years
of experience implementing and supporting CyberArk solutions in enterprise environments
Proficiency with CyberArk components and architecture
Strong scripting skills ( PowerShell ,
Python , etc.) and experience using CyberArk APIs
Understanding of
Identity and Access Management (IAM)
concepts,
Zero Trust , and
least privilege
Solid knowledge of
Windows/Linux systems ,
Active Directory , and
network security fundamentals
Preferred Qualifications:
Experience or certification with
Sentry
CyberArk Defender
or
Guardian
certification(s)
Familiarity with cloud PAM implementations ( AWS ,
Azure ,
GCP )
Experience with
SIEM tools
and security monitoring
Bachelor’s degree
in Computer Science, Information Security, or related field
Interested candidates may apply through the application system. We regret to inform only Shortlisted candidates will be notified.
By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at You acknowledge that you have read, understood, and agree with the Privacy Policy.
PERSOLKELLY Singapore Pte Ltd • RCB No. E • EA License No. 01C4394 • EA Registration No. R (Derrick Tiew Yong Han)
#J-18808-Ljbffr
Information Security Engineer (CyberArk)
Posted today
Job Viewed
Job Description
Information Security Engineer (CyberArk)
We are seeking a skilled and motivated
CyberArk Engineer
to join our growing security engineering team. In this role you will design, implement, and support
privileged access management (PAM)
solutions using
CyberArk , ensuring the highest levels of security, compliance, and operational efficiency.
We are looking for a candidate who holds a
CyberArk Certified Delivery Engineer (CDE)
certification and has experience with
Sentry
(preferred). You will collaborate with cross‐functional teams to protect sensitive data and critical systems from unauthorized access.
Key Responsibilities:
Manage onboarding and lifecycle of privileged accounts across various systems and environments.
Implement CyberArk policies and security best practices to align with compliance and regulatory standards.
Develop and maintain automation scripts and integrations with CyberArk using REST APIs, PowerShell, and other tools.
Monitor and troubleshoot CyberArk infrastructure and user issues, providing escalation support as needed.
Diagnose and remediate Central Policy Manager (CPM) failures, including credential rotation errors, connectivity issues, and policy misconfigurations.
Analyze CPM logs and error codes to identify root causes and implement durable solutions with infrastructure and application teams.
Perform health checks and tuning of CPM components to ensure stability and optimal performance.
Work with application owners to gather requirements for new connectors, create integration documentation, and test connector functionality in pre‐production environments.
Leverage scripting (PowerShell, Python) to enhance connector behaviour and automate remediation tasks.
Contribute to the connector certification process and maintain version control for custom components.
Assist with audits, documentation, and reporting of privileged access activities.
Collaborate with IT, DevOps, and Security teams to integrate PAM solutions into existing workflows.
Stay up to date with emerging threats, PAM trends, and CyberArk product updates.
Required Qualifications:
CyberArk Certified Delivery Engineer (CDE) certification (must‐have).
3+ years of experience implementing and supporting CyberArk solutions in enterprise environments.
Proficiency with CyberArk components and architecture.
Strong scripting skills (PowerShell, Python, etc.) and experience using CyberArk APIs.
Understanding of Identity and Access Management (IAM) concepts, Zero Trust, and least privilege.
Solid knowledge of Windows/Linux systems, Active Directory, and network security fundamentals.
Preferred Qualifications:
Experience or certification with Sentry.
CyberArk Defender or Guardian certification(s).
Familiarity with cloud PAM implementations (AWS, Azure, GCP).
Experience with SIEM tools and security monitoring.
Bachelor’s degree in Computer Science, Information Security, or related field.
Interested candidates may apply through the application system. We regret to inform that only shortlisted candidates will be notified.
#J-18808-Ljbffr
Information Security Engineer #IJF
Posted 9 days ago
Job Viewed
Job Description
Responsibility:
- Responsible for provision, deployment, configuration, and administration of many different pieces of network and security-related hardware and software.
- Responsible for evaluate, test, and troubleshoot technologies when new technologies are onboard
- Responsible for provide technical support for resolution of customer problems, incidents, issues, requests, and queries
- Configuring network devices, such as routers and switches, and ensuring they are up-to-date
- Experience with firewall rules implementation and troubleshooting upon incidents.
- Monitoring network performance, identifying areas for improvement, and ensuring optimal network uptime.
- Involve in update/upgrade/migration of security tools used by the team
- Maintain clear and functional documentations on process guides, technical instructions, network details, etc.
- Manage cybersecurity projects & coordinate with customer to deliver security solutions and initiatives timely.
- Any other adhoc duties as assigned
Requirements:
- Nitec/Diploma in Computer Engineering, Information Security or related field;
- Applicants with at least 1 years of relevant experience
- Strong knowledge of networking protocols (TCP/IP, DNS, DHCP), network devices (routers, switches, firewalls), and operating systems.
- Strong knowledge and understanding of IT infrastructure and security operations
- Ability to diagnose and resolve network issues effectively.
- Knowledge and understanding of Endpoint security, IDPS, WAF, APT, FW, Cloud Security
- Experience in enterprise level network
Interested applicants, please Email , and look for
Jensen Fang Lifa
Recruit Express Pte Ltd
EA License No. 99C4599
EA Personnel Registration Number: R
We regret that only shortlisted candidates will be contacted.
Information Security Associate
Posted today
Job Viewed
Job Description
**Line of Service**Internal Firm Services**Industry/Sector**Not Applicable**Specialism**IFS - Risk & Quality (R&Q)**Management Level**Associate**Job Description & Summary**At PwC, we help clients build trust and reinvent so they can turn complexity into competitive advantage. We’re a tech-forward, people-empowered network with more than 370,000 people in 149 countries. Across audit and assurance, tax and legal, deals and consulting we help clients build, accelerate and sustain momentum. Find out more at
If you love the business side of information security this is the place to be. Within the CISO pillar we work closely with member firm stakeholders to understand their business model and roadmap for technology.
In turn the CISO pillar outlines the roadmap for NIS and drives engagement and adoption of central security services in line with the PwC Cyber Readiness program.
Our mission is to identify, control, and reduce the attack surface across the network of member firms while increasing our adversaries’ cost of attack.
Network Information Security team is redefining cyber security on a global scale at PwC. Our mission protects 223,000 PwC members across 157 member firms worldwide, as well as our global clients.
If you are seeking an exciting career with the scope to grow your information and cyber security skills, then NIS will empower you to do so.**Roles & Responsibilities**:**Project Support:*** Assist in the planning, execution, and monitoring of projects.* Utilise strong critical thinking and problem solving skills day to day* Collaborate with team members to ensure project deliverables are met on time and within scope.* Prepare and maintain project documentation, including reports, presentations, and meeting minutes.* Quickly adapt to changing priorities and project requirements.* Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment.* Proactively identify and address potential issues or roadblocks to ensure smooth project execution.* Work with other NIS teams both locally, regionally and globally to deliver the security needs specific to the firm.**Compliance and Vulnerability Management:*** Support work in vulnerability management and compliance activities* Handles BAU activities such as managing security exceptions* Help the business comply with the Information Security Policy by leveraging your cyber security knowledge and expertise.* Collaborate with PwC IT and global team to align security process and tools.**Application Security:*** Guide and support the business team to complete all required security reviews* Build knowledge on application security to effectively support security assessments* Align with different global and local teams to identify and fix gaps or risk found.**Other*** Help with daily security incident handling* Help to manage junior staff, eg. internsAn effective CISO pillar candidate will also possess the following **skills/ Requirements*** Able to work in a fast-paced environment, can upskill quickly and learn proactively* Analytical: Inquisitive nature and intuition regarding what questions to ask, when, and their relative significance.* Technical: Broad understanding of security technology.* Business: High level understanding of PwC’s business model, service offerings, and business operating environment as it pertains to the firm’s threat landscape. Ability to frame threats and exposures in a business context recognized by non-technical staff and executives.* Individuals selected for this role are expected to have both extensive knowledge and managerial know-how related to the following aspects: Demonstrate flexibility in managing tasks and responsibilities in a dynamic work environment* Understanding of technical and non-technical information security risks.* Have skills to analyse data and visualise data (good to have knowledge of Excel, PowerPoint etc.)* Good written and effective communicator to deal with various stakeholders* Meticulous and possesses an eye for details* Proactive, keen to learn, enjoys solving challenging problems, thinking outside of the box* Diligent and open to feedback* Experience in a role balanced between business stakeholders and a central service organization.* Possess knowledge about application security to effectively support security assessments* Time and Task Management: Ability to prioritise risk, manage a variety of take, take ownership to drive completion of activities and deliver on time**Education and Experience**:* Interest in Information Security* Bachelor’s or master’s degree (technical degree) or equivalent Industry certification**Candidate Specifications:***Desired Certifications:** (Certifications aren’t a prerequisite however are well regarded)**Education Level:** Undergraduate Degree (e.g. BIT, BSc) STEM or equivalent work experience: 2 - 4 years’ of progressive professional roles involving information security, computer science and/or other technical background**Education** *(if blank, degree and/or field of study not specified)*Degrees/Field of Study required:Degrees/Field of Study preferred:**Certifications** *(if blank, certifications not specified)***Required Skills**Application Security, Application Security Assessment, Application Security Assessments, Application Security Reviews, Application Security Testing, Cybersecurity Controls, Cyber Security Standards, Security Vulnerability Assessments, Threat and Vulnerability Assessment, Vulnerability Assessments, Web Application Security, Web Application Security Testing**Optional Skills**Accepting Feedback, Accepting Feedback, Active Listening, Azure Data Factory, Communication, Cybersecurity, Cybersecurity Governance, Data Architecture, Data Archiving, Data Flow Mapping, Data Privacy Act, Emotional Regulation, Empathy, Enterprise Content Management, Incident Response Plan, Inclusion, Information Rights Management (IRM), Information Security, Information Security Governance, Information Security Management System (ISMS), Intellectual Curiosity, IT Infrastructure, Operating Model, Optimism, Privacy and Security {+ 6 more}**Desired Languages** *(If blank, desired languages not specified)***Travel Requirements**0%NoNo**Job Posting End Date**
#J-18808-Ljbffr
Be The First To Know
About the latest Senior security Jobs in Singapore !
Information Security Consultant
Posted 9 days ago
Job Viewed
Job Description
Perform IT security operations involving activities such as security
log reviews, vulnerability assessments, security access review and
security configuration review to ensure compliance based on customers'
requirements. Critical Key Functions and Key Tasks Perform
Vulnerability Assessment Scanning
* Work with the internal project
team and customers to establish the in-scope inventories.
* Prepare the environment and complete the pre-scan activities.
* Conduct vulnerability assessment scanning using the designated tool.
* Review
the scan results, process the results, and issue the scan reports to
stakeholders. * Follow up with the internal teams on the remediation.
* Published the remediation status IT Security Incident Management
* Involved in IT Security Incident Response Team (SIRT)
* Work with internal teams to resolve the reported security incidents
* Provide periodic status updates to IT Security Manager IT Security Alerts &
Advisory
* Tracking of IT security alerts and advisory issued by SOC and threat intelligence authorities. * Inform the appropriate stakeholders on the alert notifications
* Track the progress of remediations by the respective teams to ensure proper closure
* Conduct Security Log reviews
* Perform review of security logs in accordance to the agreed frequency.
* Investigate and clarify any anomaly with the respective towers.
* Escalate potential security incidents to project team and customers for attention.
* Prepare periodic log review reports. Security Advisory and Briefing
* Be the point-of-contact/customer liaison to assist and advise customer for ICT security related matters
* Conduct in Weekly / Monthly meeting with Customers on security related matters.
* Prepare the content and material relevant to the projects
* Conduct information security awareness training Support Audit & Compliance
* Act as the liaison officer for the IT security reviews and audits
* Collate and review information requested by auditors from respective teams.
* Support the auditors during audit period.
* Work with the team to review and respond to audit issues.
* Work with the team to remediate audit findings.
* Monitor and track the closure of audit findings.
* Other Ad-hoc activities instructed by manager.
Offensive Security Engineer (Red Team) - Information Security
Posted today
Job Viewed
Job Description
Offensive Security Engineer (Red Team) - Information Security
Join to apply for the
Offensive Security Engineer (Red Team) - Information Security
role at
Shopee .
Job Responsibilities
Design and perform APT adversary emulation to assess infrastructure, systems, and applications against confidentiality, integrity, authentication, availability, authorization, and non-repudiation standards.
Translate requirements into test plans, develop and execute scripts or codes to identify vulnerabilities, following established standards and procedures.
Responsible for weaponization capabilities within the red team.
Research and identify undiscovered vulnerabilities (0-day) during red team engagements.
Requirements
Bachelor’s degree or higher in Computer Science, Information Technology, Programming & Systems Analysis, Engineering, or related fields.
At least 2 years of experience in red team roles or relevant security positions.
Strong security development skills, proficiency in Python, Go, with experience in web crawling and distributed development.
Ability to audit code, identify vulnerabilities such as command injection, insecure deserialization, stack overflows, and independently develop exploits.
Experience with frameworks like Puppeteer, Playwright, RabbitMQ, ELK, Yaklang, etc.
Excellent communication skills and teamwork spirit.
Self-motivated with quick learning ability.
Preferred Experience
Experience in penetration testing, red teaming, and familiarity with ATT&CK Framework kill chains (e.g., initial access, Windows AD testing, lateral movement).
Experience in APT offensive and defensive operations.
Proven record of bug bounty awards, contributions as Github star authors, etc.
Additional Details
Seniority level: Mid-Senior level
Employment type: Full-time
Job function: Information Technology
Industries: Software Development, Internet Marketplace Platforms, Technology, Information and Internet
Referrals can double your chances of interviewing at Shopee.
#J-18808-Ljbffr
Information Security, Senior Specialist
Posted today
Job Viewed
Job Description
Overview
This is a Senior Specialist role within Singtel Singapore Cyber Operations Team that is responsible and accountable for proactively identifying and mitigating cyber threats by developing and optimizing detection mechanisms for Singtel Singapore. The role will report to the Senior Director Information Security.
Responsibilities
Lead, design and develop on-prem and cloud (Azure, AWS, GCP) defensive tools and procedures to optimise threat mitigation and improve security posture.
Analyse vulnerabilities and threats and engineer detection rules and signatures to identify malicious activity.
Maintain and optimize SIEM use cases, ensuring high fidelity and low false-positive rates. Engineer threat detection methods and automations to defend against newer threats from Generative AI and Quantum Computing.
Perform regular tuning and testing of detection systems based on evolving threat landscapes.
Design and implement security automation workflows on SOAR to enhance threat response efficiency.
Collaborate with Threat Analyst to create actionable detection methodologies.
Stay current with the latest threat intelligence and security trends to ensure that our threat detection strategies and processes remain effective.
Support security incidents involving malware infections, data breaches, and other cyber threats when necessary. Engineer using Generative AI and Automation to make such analysis and containment more efficient and effective.
Continuously update the organisation’s threat profile and threat detection capability/coverage matrix together with the Threat Analyst.
Provide regular reports on threat detection engineering activities, including metrics and key performance indicators.
Collaborate with Regulators and Government Agencies in various cyber operations projects.
Detect, monitor, analyse and respond to cyber threats 24x7 using SIEM and other security tools.
Investigate security incidents involving malware infections, data breaches, and other cyber threats.
Collect, preserve, and analyze digital evidence from compromised systems and networks.
Collaborate with Threat Analyst to detect and analyse security events and alerts.
Skills for Success
Degree/Diploma or higher in Cyber Security, Computer Science, Computer Engineering, Electrical Engineering or other relevant field of study
Professional security management certifications such as Certified Information Systems Security professional (CISSP), specialised SANS certifications, or other similar credentials, is required.
Minimum 5 years of practical experience in a SOC or equivalent environment
Minimum 3 year of practical experience on threat detection engineering
Essential competence in the following :
Threat Detection Engineering
Security Monitoring Tools
Threat Analysis and Defence
Threat Detection and Response
Rewards that Go Beyond
Full suite of health and wellness benefits
Ongoing training and development programs
Internal mobility opportunities
Are you ready to say hello to BIG Possibilities?
Take the leap with Singtel to unlock new opportunities and accelerate your growth. Apply now and start your empowering career!
#J-18808-Ljbffr