U Mobile

Senior Specialist, Cybersecurity

Posted: 14 hours ago

Job Description

Life at U MobileWe are Passionate, Innovative, Trustworthy, Team-Oriented & Fun-Loving.At U Mobile, we are always on the lookout for great talents and passionate individuals to join our growing team.Let’s start your journey with an award-winning organization!#UnbeatableCareerAwaitsTop Reasons To Join Us! Awarded ForMost Preferred Employers in Telecommunication Industry (2022, 2023 & 2024)Bronze Winner in Cross-Generational Workforce Engagement (2024)Gold Winner for Excellence in Workplace Culture (2021) Comprehensive medical, dental, optical and insurance benefits Flexi working hours arrangements Staff Line & Device Subsidy Smart Casual Attire Child Parental Care Leave Convenient location with access to public transport (Imbi Monorail/Bukit Bintang MRT) Special employee discounts for selected F&B BrandsJob SummaryThis role is for a Cyber Security Operations leader who will be responsible for planning, managing, and executing the overall security strategy. Key activities involve supervising a team of security analysts, overseeing day-to-day security operations like monitoring, troubleshooting, and incident response/forensics. The position also supports security governance, compliance, threat intelligence, and involves performing technical evaluations (POCs), as well as developing and delivering security awareness training.The Day-To-Day Activities Security Operations and Troubleshooting:Assist the Cyber Security Operations Manager in planning, implementing, and managing the overall security operations strategy.Supervise a team of security analysts and engineers, providing guidance, support, and training as needed.Conduct regular security assessments, penetration testing, and vulnerability assessments to identify and mitigate risks.In-depth knowledge in Endpoint Detection & Response (EDR/XDR) solutions.Knowledgeable in IT networking, Network security solutions, WAF, Privilege Access Management (PAM), Virtualizations.Technically capable in conducting POCs and related to cybersecurity.Capable in plan and managed a multiple cybersecurity project simultaneously.Monitor security systems and tools, investigating and responding to security incidents in a timely manner.Coordinate with cross-functional teams, department and divisions to ensure compliance with established security policies, standards, and procedures. Cloud Security:Apply your knowledge of cloud platforms (e.g., AWS, Google Cloud, Azure, etc) to develop and implement robust security controls and measures.Work closely with the Cloud Operations team to ensure the security of cloud-based infrastructure, services, and applications.Identify and address cloud-specific security risks, such as misconfigurations, data breaches, and unauthorized access.Stay updated on the latest cloud security trends, emerging threats, and best practices to proactively address potential vulnerabilities. Incident Response Handling and Forensic:Assist or lead and participate in incident response activities, including containment, eradication, and recovery.Conduct digital forensics investigations to determine the root cause of security incidents and develop remediation plans.Collaborate with internal stakeholders and external partners, such as law enforcement agencies, to address complex security incidents. Support in Security Governance and Compliance:Assist in enforcing U Mobile security policies, standards, and procedures aligned with industry best practices and regulatory requirements.Assist in periodic security audits and assessments to evaluate compliance with internal and external security standards.Prepare and present reports or Root cause analysis (RCA) on security metrics, incidents, and risks to senior management and relevant stakeholders. Vulnerability Management & Threat IntelligenceIn-depth knowledge in VAPT assessment, scanning, identifying, assessing, reporting on, managing and remediating cyber vulnerabilities across endpoints, workloads, and systems.Knowledge in cyber threat intelligence system and able to discovered, corelate and take action on discovered threats to reduced company risks. Unauthorized Device HuntingPerform regular security scans to detect unauthorized devices on the network.Verify device identity and usage, escalating suspicious findings for further management action.Document and report unauthorized device incidents to senior management. Security Operations Ticket HandlingCapable on 24x7 standby (on rotational basis – if necessary) to handle security tickets.Ensure timely response and closure of tickets within agreed SLA.Escalate significant security events or incidents following established SOPs. Technical Evaluation and testing.In charge in performing prove of concept (poc) on any technology related to cybersecurity. Capable in creating test matrix suitable to U Mobile environment and writing details reportsWork closely with technology providers / vendors and ensure poc to be completed within the required timeline Security Awareness and Training.Assist in developing and delivering security awareness programs to educate employees about security best practices and potential threats.Conduct security training sessions for staff members to enhance their understanding of security protocols and procedures. Documentation and ReportingMaintain accurate records of security-related activities using internal system or equivalent tools.Prepare and submit reports with recommended actions on identified cybersecurity issues.Support in updating security policies, standards, and procedures.About You Education/ What people Know:Degree in Computer Science / IT / Cybersecurity or related Experience/ What people Have Done:Min 10 years’ experience in performing cybersecurity operation, engineering, analysis, events troubleshooting, trouble ticket handling. Experience in vulnerability assessment testing and remediation management. Exposure of threat intelligence with knowledge on dark web and threat hunting. Experience in operating EDR/XDR and performing hunting to remediate the detected alerts. Experience in report writing with presentation. Competencies/ What people Can Do:Able to detect and analyze threat information obtained from various resources with minimum supervision.Able to perform and conduct cybersecurity related testing activity as and when needed regardless of during or non-office hours. Able to understand the severity of an event or incident and perform 1st response to escalate within a timely manner. To properly document internal cybersecurity related information and organize in structured way for ease of team members to access and refer. To be able to conduct briefing and presentation related cybersecurity processes, approach and policy as and when necessary. Posses’ certification in EDR/XDR, Next-Gen Firewalls, WAF, Cloud security, or any cybersecurity related certification will be an advantage. Personal Attributes/ Who people Are:Analytical Thinking– Thinks critically and solves problems.Detail-Oriented – Spots small issues before they grow.Curious – Eager to learn and explore new threats.Trustworthy – Handles sensitive data responsibly.Calm Under Pressure – Stays focused during incidents.Clear Communicator – Explains tech to non-tech people.Team Player – Works well with others.Adaptable – Quick to adjust to new tools and threats.Organized – Manages time and tasks efficiently.Creative Thinking – Able to think creatively and out-side the box.What’s Next ?Once you have applied online, our team will review your application and due to a high volume of applications, only shortlisted candidates will be notified.

Job Application Tips

  • Tailor your resume to highlight relevant experience for this position
  • Write a compelling cover letter that addresses the specific requirements
  • Research the company culture and values before applying
  • Prepare examples of your work that demonstrate your skills
  • Follow up on your application after a reasonable time period

You May Also Be Interested In