Search by job, company or skills

china telecom asia pacific

Security Engineer

3-5 Years
Save
new job description bg glownew job description bg glow
  • Posted 22 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Job Description

  1. Security Monitoring & Threat Analysis
  • Monitor and analyze security events across networks, systems, applications, and cloud platforms.
  • Operate SIEM, IDS/IPS, EDR and related security tools.
  • Identify potential security incidents, anomalies, and suspicious behaviors.

  1. Incident Response
  • Perform incident triage, containment support, investigation and remediation coordination.
  • Assist with incident communication and escalation according to company procedures.
  • Conduct root cause analysis and prepare detailed IR reports.

  1. Threat Hunting & Forensic Analysis
  • Conduct proactive threat hunting based on threat intelligence, behavioral patterns, and MITRE ATT&CK.
  • Perform basic to advanced forensic analysis as required.
  • Provide technical assessments of sophisticated attacks.

  1. Security Policies, Standards & Compliance
  • Assist in developing, implementing, and reviewing security policies, standards, and procedures.
  • Support compliance with MAS TRM, PDPA, Cyber Hygiene, and industry security frameworks (NIST, ISO 27001, CIS Controls).
  • Ensure documentation and security controls align with regulatory and audit requirements.

  1. Cross‑Department Collaboration
  • Work with IT, compliance, risk, and business units to support security-related initiatives.
  • Translate technical findings into clear business impacts where required.

  1. Security Tools & Technology Support
  • Assist in evaluating and recommending new security tools, technologies, and processes.
  • Support cloud security operations (AWS, Azure).
  • Support automation and orchestration using SOAR tools if applicable.

  1. Reporting Outsourced personnel are required to prepare the following reports:
  • Daily/weekly incident analysis summaries
  • Monthly security posture and trend reports
  • Threat intelligence insights
  • Incident RCA reports · Vulnerability and risk reports

  1. Audit & Assessment Support
  • Assist with internal and external security audits.
  • Provide technical support for security assessments and follow-up remediation activities.

Job Requirements

  • Bachelor's degree or above in Computer Science, Information Technology, Cybersecurity, or a related field.
  • At least 3 years of relevant experience in IT technical support or presales consulting, with expertise in security solutions.
  • Familiarity with network security technologies such as firewalls, intrusion detection systems, VAPT, MSSP, and practical experience in design and implementation.
  • Strong solution design skills with the ability to translate customer requirements into technical solutions.
  • Excellent communication and collaboration skills, able to work effectively with customers, sales teams, and technical teams.
  • Proficient in Microsoft Office and technical documentation tools.
  • Able to work under pressure, with a collaborative team spirit and the ability to work independently.

More Info

Job Type:
Industry:
Function:
Employment Type:

Job ID: 147381747

Similar Jobs

Singapore

Skills:

KibanaRedHatJavapythonElkLogstashUbuntuLinuxSiemBashScriptingElasticSecOPS-DevOPSsecurity use case design developmentthreat modelsinterpret security logs

Singapore

Skills:

url filtering policy administration ServicenowDlpSamlOktaSiemPythonQradarPowerShellIntuneAdfsSsoAzure AdSplunkcloud app controlEntra IDauthentication issuesSSL inspectionMFAJamfsandboxZero Trust conceptsPAC forwardingDNS securitypolicy troubleshooting

Singapore

Skills:

FortigateFirewall AdministrationroutingPalo AltoVpnNetwork security principleshybrid cloud networking architecturesSecurity policy implementationVNetsComplianceExpressRouteNSGsSegmentationAzure networking

Singapore

Skills:

threat modeling API securitySamlNetworking ConceptsTopologiesSqlEncryptionJavascriptPythonAuthenticationGofederated AuthenticationSecurity AssessmentsSCIMsecurity engineeringsecurity design reviewsAuthorization technologiesSecurity ProtocolsAccess Controlprotocolscomputer and network securityOIDC

Singapore

Skills:

mimecast Data ProtectionIncident ResponseIamSiemnetwork security protocolsvulnerability management solutionsEASM toolsthreat intelligence platformsbrand protectionSentinelOnevulnerability scanning toolsTenable