Collaborating with procurement, legal, and business units to evaluate the security implications of engaging with third-party vendors and providing guidance and recommendations to stakeholders on selecting, onboarding, and managing third-party vendors securely.
Reviewing and negotiating information security and data protection clauses in contracts and agreements with third-party vendors to establish security requirements and responsibilities.
Conducting risk assessments of third-party systems (including cloud), networks, and processes to identify gaps in information security controls.
...
As a Staff Information Security Analyst, you will help mature the security posture of the corporate environment. You will influence others with your security mindset and inspire change at all levels. You will have excellent communication skills, both oral and written. You will be a team player, organized, responsible and a highly detailed problem solver to the packet level!
KEY RESPONSIBILITIES
Create and maintain security infrastructure that follows industry best practices including a high level of availability and ease of user access.
...
Conduct regular security assessments and audits of the system infrastructure to identify vulnerabilities and ensure compliance with security standards, particularly in the context of data security.
Develop and implement security policies, procedures, and best practices to protect data and assets.
Setup and monitor security logs and alerts to detect and respond to security incidents, ensuring timely resolution and mitigation.
...
Become the go-to expert (SME) for our security systems: Leverage your deep understanding to unlock their full potential and ensure maximum protection.
Architect and execute comprehensive security strategies: Plan, assess, design, and deploy the latest security software and hardware solutions.
Champion innovative security initiatives: Identify and recommend solutions that strengthen our security posture and stay ahead of emerging threats.
...
Maintain and administer the SAP Security environment, including the development, implementation, and management of SAP Security Roles, to establish secure and compliant business processes, applying security administration tools in key SAP programs; work with internal team to maintain a secure, compliant environment; remain aware of available security tools.
Responsible for understanding, translating and communicating governance, risk, and compliance concepts, requirements and practices to collaborators.
Assist in the development, implementation and maintenance of programs, processes, and procedures used to support governance, risk, and compliance efforts
...
You will be part of the Security Operations Centre (SOC) Team who will be responsible for the following areas Tier 2 SOC Analyst responsible for investigating alerts and incidents escalated by Tier 1 Analysts, Develop and enhance SOC processes and procedures, ensuring effective operations, Coordinate with stakeholders to address, follow up and resolve security alerts. Operate and maintain security monitoring tools such SIEM, EDR and SOAR. Gather and analyse Cyber intel. Conduct Threat hunting. Lead the adoption of new technological advances and best practices in cybersecurity monitoring and response.
You will be a Great Fit if you:
- Demonstrable experience and in-depth knowledge in cyber security operations, cyber intelligence gathering, incident response and investigations.
...
Assisting the Head of Information Security Asia in implementing and maintaining the Group's information security strategy, policies, and procedures to manage cyber and Third-Party Information Security risk and ensure compliance with relevant laws and regulations.
Assessing the security posture of third-party vendors, partners, or service providers to ensure compliance with organizational standards and regulatory requirements.
Collaborating with procurement, legal, and business units to evaluate the security implications of engaging with third-party vendors and providing guidance and recommendations to stakeholders on selecting, onboarding, and managing third-party vendors securely.
...
Serving as the primary point of contact for authorities and stakeholders regarding compliance with Data Loss Prevention (DLP) regulations and the support to data protection (DP).
Maintaining data protection policies, procedures, and guidelines, monitoring compliance with data protection laws and regulations and data loss prevention related requirements and ensuring appropriate measures are in place.
...
Assisting the Head of Information Security Asia in implementing and maintaining the Group's information security strategy, policies, and procedures to manage cyber and Third-Party Information Security risk and ensure compliance with relevant laws and regulations.
Assessing the security posture of third-party vendors, partners, or service providers to ensure compliance with organizational standards and regulatory requirements.
...
Senior InfoSec Compliance Specialist required by highly successful global law firm offering interesting and varied role and long term career opportunities!
Registration No.
200007268E
EA No.
01C4394
Your application will include the following questions:
Which of the following statements best describes your right to work in Singapore?
What's your expected monthly basic salary?
Report this job advert
Don’t provide your bank or credit card details when applying for jobs.
Researching careers? Find all the information and tips you need on career advice.
...
Our Client is an established company. With rapid expansion plan, they are now looking for a Cyber Security Analyst / IT Security Specialist to join their team.
Become the go-to expert (SME) for our security systems: Leverage your deep understanding to unlock their full potential and ensure maximum protection.
Architect and execute comprehensive security strategies: Plan, assess, design, and deploy the latest security software and hardware solutions.
Champion innovative security initiatives: Identify and recommend solutions that strengthen our security posture and stay ahead of emerging threats.
...