Epicareer Might not Working Properly
Learn More

IT Security Consultant - 12 Months contract

$ 7,000 - $ 9,500 / month

Checking job availability...

Original
Simplified

Responsibilities:

  • Security Policy Development and Enforcement
  • Develop, implement, and maintain IT security policies, procedures, and protocols.
  • Ensure that security measures align with business needs, regulatory requirements, and industry standards.
  • Review and update policies regularly to address emerging threats.
  • Risk Management
  • Assess potential security risks and vulnerabilities within the IT infrastructure.
  • Perform risk analysis and recommend appropriate security controls.
  • Implement security measures to mitigate identified risks.
  • Incident Response and Management
  • Lead efforts in detecting, investigating, and responding to security breaches and incidents.
  • Establish incident response plans and procedures for handling security threats.
  • Work with other teams (e.g., legal, communications) to manage incident communications and post-incident analysis.
  • Security Monitoring and Auditing
  • Continuously monitor IT systems, networks, and applications for signs of security incidents or breaches.
  • Implement and maintain security tools, such as firewalls, antivirus software, and intrusion detection systems.
  • Regularly audit systems to ensure compliance with security standards and best practices.
  • Compliance and Regulatory Requirements
  • Ensure the organization complies with relevant security standards, such as GDPR, HIPAA, PCI-DSS, or other industry regulations.
  • Conduct regular compliance assessments and audits.
  • Collaborate with legal and regulatory bodies to ensure that security measures are in place.
  • Training and Awareness
  • Provide cybersecurity training and awareness programs to employees to promote safe practices.
  • Conduct simulations and drills (e.g., phishing exercises) to test employee preparedness.
  • Keep staff informed about current cybersecurity threats and best practices.
  • Network and System Security
  • Oversee the design and implementation of secure network architectures.
  • Ensure the proper configuration of firewalls, encryption protocols, VPNs, and other security mechanisms.
  • Conduct regular security assessments and penetration tests to identify weaknesses in systems.
  • Collaboration and Communication
  • Collaborate with other departments, such as IT operations, legal, and compliance teams, to ensure comprehensive security measures.
  • Act as a liaison between management and technical teams for cybersecurity matters.
  • Communicate security risks and threats to executive leadership in a clear and actionable manner.
  • Security Tool Selection and Implementation
  • Evaluate, select, and deploy security tools, software, and solutions to enhance system protection.
  • Stay up-to-date with emerging security technologies and trends.
  • Ensure that the tools are properly configured and maintained.
  • Disaster Recovery and Business Continuity Planning
  • Develop and implement disaster recovery and business continuity plans to ensure that the organization can continue to operate after a security incident or disaster.
  • Ensure backups are conducted regularly and can be restored in the event of a system failure or cyberattack.
  • Vendor and Third-Party Security
  • Assess the security practices of third-party vendors and partners to ensure they meet security requirements.
  • Develop and enforce security standards for external service providers and contractors.
  • Reporting and Documentation
  • Generate regular reports on the state of the organization's IT security.
  • Document security incidents, actions taken, and lessons learned.
  • Maintain records of security assessments, audits, and compliance activities.

    Requirements
  • Typically, 5+ years of experience in IT security or a related role (such as network security or cybersecurity analyst) is required.
  • Proven experience in handling and resolving security incidents, breaches, and vulnerabilities
  • Experience with security audits and ensuring compliance with standards like IM8, AGO etc
  • Deep understanding of cybersecurity principles: Knowledge of encryption, access control, firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and other security technologies.
  • Risk Management: Proficiency in identifying, assessing, and mitigating cybersecurity risks.
  • Networking knowledge: Understanding of network protocols (TCP/IP, DNS, HTTP/S, etc.), network security practices, and technologies (e.g., firewalls, routers, VPNs).
  • Operating Systems: Strong familiarity with various operating systems (Linux, Windows, Unix, etc.) and their security configurations.
  • Incident Response: Expertise in managing and responding to security incidents, including identifying, mitigating, and reporting breaches or attacks.
  • Vulnerability Assessment & Penetration Testing: Ability to assess vulnerabilities and conduct penetration tests to identify weaknesses in systems.
  • Security Tools: Proficiency in security software and tools such as SIEM (Security Information and Event Management), antivirus programs, firewalls, encryption tools, and network monitoring solutions.
  • Handle security incidents and alerts from GCSOC, GICS and security devices
  • Leadership and Management Skills: Ability to lead teams and manage cross-functional collaboration, especially during incidents or implementation of security measures.
  • Strong Analytical Skills: Ability to analyze security incidents, logs, and vulnerabilities and make informed decisions to mitigate risks.
  • Problem-Solving: Strong problem-solving ability, especially in high-pressure situations, such as security incidents or breaches.
  • Communication Skills: Ability to clearly communicate complex technical issues to non-technical stakeholders, including senior leadership, staff, and external partners.
  • Having experience in WOG environment is a plus
  • Having experience in GCC Cloudscape and Glasspanel is a plus
  • Preferably with CISA for Governance, Comptia Security +, CEH and ITIL certification.

Interested parties, please click the "Apply Now" below.

We regret that only shortlisted applicants would be notified.

Evonne Png Wen Xuan | REG No : R22105531

PERSOLKELLY SINGAPORE PTE LTD | EA License No : 01C4394

This is in partnership with Employment and Employability Institute Pte Ltd (“e2i”). e2i is the empowering network for workers and employers seeking employment and employability solutions. e2i serves as a bridge between workers and employers, connecting with workers to offer job security through job-matching, career guidance and skills upgrading services, and partnering employers to address their manpower needs through recruitment, training and job redesign solutions. e2i is a tripartite initiative of the National Trades Union Congress set up to support nation-wide manpower and skills upgrading initiatives. By applying for this role, you consent to e2i’s PDPA.

By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at https://www.persolkelly.com.sg/policies. You acknowledge that you have read, understood, and agree with the Privacy Policy.

Responsibilities:

  • Security Policy Development and Enforcement
  • Develop, implement, and maintain IT security policies, procedures, and protocols.
  • Ensure that security measures align with business needs, regulatory requirements, and industry standards.
  • Review and update policies regularly to address emerging threats.
  • Risk Management
  • Assess potential security risks and vulnerabilities within the IT infrastructure.
  • Perform risk analysis and recommend appropriate security controls.
  • Implement security measures to mitigate identified risks.
  • Incident Response and Management
  • Lead efforts in detecting, investigating, and responding to security breaches and incidents.
  • Establish incident response plans and procedures for handling security threats.
  • Work with other teams (e.g., legal, communications) to manage incident communications and post-incident analysis.
  • Security Monitoring and Auditing
  • Continuously monitor IT systems, networks, and applications for signs of security incidents or breaches.
  • Implement and maintain security tools, such as firewalls, antivirus software, and intrusion detection systems.
  • Regularly audit systems to ensure compliance with security standards and best practices.
  • Compliance and Regulatory Requirements
  • Ensure the organization complies with relevant security standards, such as GDPR, HIPAA, PCI-DSS, or other industry regulations.
  • Conduct regular compliance assessments and audits.
  • Collaborate with legal and regulatory bodies to ensure that security measures are in place.
  • Training and Awareness
  • Provide cybersecurity training and awareness programs to employees to promote safe practices.
  • Conduct simulations and drills (e.g., phishing exercises) to test employee preparedness.
  • Keep staff informed about current cybersecurity threats and best practices.
  • Network and System Security
  • Oversee the design and implementation of secure network architectures.
  • Ensure the proper configuration of firewalls, encryption protocols, VPNs, and other security mechanisms.
  • Conduct regular security assessments and penetration tests to identify weaknesses in systems.
  • Collaboration and Communication
  • Collaborate with other departments, such as IT operations, legal, and compliance teams, to ensure comprehensive security measures.
  • Act as a liaison between management and technical teams for cybersecurity matters.
  • Communicate security risks and threats to executive leadership in a clear and actionable manner.
  • Security Tool Selection and Implementation
  • Evaluate, select, and deploy security tools, software, and solutions to enhance system protection.
  • Stay up-to-date with emerging security technologies and trends.
  • Ensure that the tools are properly configured and maintained.
  • Disaster Recovery and Business Continuity Planning
  • Develop and implement disaster recovery and business continuity plans to ensure that the organization can continue to operate after a security incident or disaster.
  • Ensure backups are conducted regularly and can be restored in the event of a system failure or cyberattack.
  • Vendor and Third-Party Security
  • Assess the security practices of third-party vendors and partners to ensure they meet security requirements.
  • Develop and enforce security standards for external service providers and contractors.
  • Reporting and Documentation
  • Generate regular reports on the state of the organization's IT security.
  • Document security incidents, actions taken, and lessons learned.
  • Maintain records of security assessments, audits, and compliance activities.

    Requirements
  • Typically, 5+ years of experience in IT security or a related role (such as network security or cybersecurity analyst) is required.
  • Proven experience in handling and resolving security incidents, breaches, and vulnerabilities
  • Experience with security audits and ensuring compliance with standards like IM8, AGO etc
  • Deep understanding of cybersecurity principles: Knowledge of encryption, access control, firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and other security technologies.
  • Risk Management: Proficiency in identifying, assessing, and mitigating cybersecurity risks.
  • Networking knowledge: Understanding of network protocols (TCP/IP, DNS, HTTP/S, etc.), network security practices, and technologies (e.g., firewalls, routers, VPNs).
  • Operating Systems: Strong familiarity with various operating systems (Linux, Windows, Unix, etc.) and their security configurations.
  • Incident Response: Expertise in managing and responding to security incidents, including identifying, mitigating, and reporting breaches or attacks.
  • Vulnerability Assessment & Penetration Testing: Ability to assess vulnerabilities and conduct penetration tests to identify weaknesses in systems.
  • Security Tools: Proficiency in security software and tools such as SIEM (Security Information and Event Management), antivirus programs, firewalls, encryption tools, and network monitoring solutions.
  • Handle security incidents and alerts from GCSOC, GICS and security devices
  • Leadership and Management Skills: Ability to lead teams and manage cross-functional collaboration, especially during incidents or implementation of security measures.
  • Strong Analytical Skills: Ability to analyze security incidents, logs, and vulnerabilities and make informed decisions to mitigate risks.
  • Problem-Solving: Strong problem-solving ability, especially in high-pressure situations, such as security incidents or breaches.
  • Communication Skills: Ability to clearly communicate complex technical issues to non-technical stakeholders, including senior leadership, staff, and external partners.
  • Having experience in WOG environment is a plus
  • Having experience in GCC Cloudscape and Glasspanel is a plus
  • Preferably with CISA for Governance, Comptia Security +, CEH and ITIL certification.

Interested parties, please click the "Apply Now" below.

We regret that only shortlisted applicants would be notified.

Evonne Png Wen Xuan | REG No : R22105531

PERSOLKELLY SINGAPORE PTE LTD | EA License No : 01C4394

This is in partnership with Employment and Employability Institute Pte Ltd (“e2i”). e2i is the empowering network for workers and employers seeking employment and employability solutions. e2i serves as a bridge between workers and employers, connecting with workers to offer job security through job-matching, career guidance and skills upgrading services, and partnering employers to address their manpower needs through recruitment, training and job redesign solutions. e2i is a tripartite initiative of the National Trades Union Congress set up to support nation-wide manpower and skills upgrading initiatives. By applying for this role, you consent to e2i’s PDPA.

By sending us your personal data and curriculum vitae (CV), you are deemed to consent to PERSOLKELLY Singapore Pte Ltd and its affiliates to collect, use and disclose your personal data for the purposes set out in the Privacy Policy available at https://www.persolkelly.com.sg/policies. You acknowledge that you have read, understood, and agree with the Privacy Policy.