Search by job, company or skills

CIMB Group

Assistant Vice President, GT-TSS, Security Operations Centre MY (Senior Specialist)

new job description bg glownew job description bg glownew job description bg svg
  • Posted 7 hours ago
  • Be among the first 10 applicants
Early Applicant

Job Description

Job Description

Job Purpose *

The Bank has established Cyber Security Incident Response Process to detect and response to security incidents, and drive timely containment and remediation of the incident.

Key Responsibilities *

  • Support cyber incident response actions to ensure proper assessment, containment, mitigation and documentation.
  • Support cyber investigations and contribution to large and small scale computer security breaches.
  • Handle escalated security incident investigation and response from Tier-2: SOC Analyst.
  • Oversight on security incident response activities performed by Tier-2: SOC Analyst.
  • Proactive service improvements of incident response playbooks to include lessons learnt from past incidents and perform deep-dive analysis on identified/known Tools, Techniques and Procedures (TTPs) of the cyber-attacks.
  • Keep abreast on latest cyber security threats and vulnerabilities, in line with the changing Threat Landscape, Regulatory and Compliance requirements.
  • Validates and evergreen the cyber security incident response plans, playbooks and other relevant Standard Operating Procedures within Cyber Defence Centre.
  • Work closely with Service Management: Incident Management for collective response and situational awareness.
  • Participate in the cyber Drill simulation and Table Top Exercises (TTXs).
  • Utilizes and adheres to defined workflow and processes driving the Incident Response and mitigation efforts.
  • Collects supporting information and/or relevant artifacts in support of Incident Response activities.
  • Escalates and hands off to team members and leadership based on defined threat and priority determination.
  • Conducts technical analysis on impacted systems to determine impact, scope, and recovery from active and potential cyber incidents.
  • Leverages Forensics tools, techniques, and capacities to support Cyber Incident Response activities.
  • Documents results of cyber threat analysis and subsequent remediation and recovery in an effective and consistent manner.
  • Executes the Incident Response lifecycle and coordinating remediation activities throughout the Verizon organization and its lines of business as a part of Cyber Incident Handling.
  • Recommends solutions to optimize both technical and process/procedure aspects of the end to end incident lifecycle.
  • Produce security incident report.
  • This position involves an on-call rostering component for escalated incidents.

Job Specification *

Qualifications

(Basic Degree/Diploma, etc.)

  • Bachelor's Degree or Professional Qualification in the relevant discipline (IT / Cybersecurity / Computer Science). Professional Qualification and/or Regulatory, Licensing requirements
  • Security certifications e.g. CompTIA Security+, CISM, ECIH, etc. are preferred.
  • Network certifications e.g. CCNA, CCNP, etc are added advantages

Relevant Work Experience

  • Minimum 7 years of experience in IT security, preferably in cyber incident response role of a banking environment. Leadership in cyber incident response and crisis management are added advantages.
  • Demonstrated experience in an enterprise-level incident response team or security operations center. Direct experience handling advanced cyber security incidents and associated incident response toolset.
  • Strong working knowledge of common security tools, such as a SIEM, AV, scanners, proxies, WAF, netflow, IDS or forensics tools.
  • Advanced technical knowledge associated with various operating systems, network services and applications. A keen understanding of logging components and capabilities.
  • Strong interpersonal and leadership skills to influence and build credibility as a peer.
  • Possess a demonstrated sense of urgency with the ability to perform well under significant enterprise-wide pressure.
  • Excellent communication and presentation skills with demonstrated skill in presenting analytical data effectively to varied (including executive) audiences.

Required Competencies and Skills *

Competencies/Skills

(Essential to succeed in this job)

Technical/Functional skills

  • 7+ years of work experience in one or more of the following roles: SOC Analyst, Security Incident Response, Cyber Threat Hunter, Cyber Crime investigations, Cyber Threat Analysis, Cyber Threat Campaign Tracking.
  • Understanding of common operating systems and IT Infrastructure such as Windows, Unix/Linux, Active Directory, firewalls, proxies, etc.
  • Familiarity with automation concepts and proficiency in scripting languages such as Python, Perl, JavaScript, Powershell, etc.
  • Strong analytical skills and critical thinking skills.
  • Effective communication skills (both written and verbal)
  • Strong organization, prioritization, and rationalization skills.

Personal skills (Soft Competencies [Core/Leadership])

  • Highly results-oriented and can work independently.
  • Ability to build relationships and interact effectively with internal and external parties.
  • Ability to plan, organize and prioritize tasks.
  • Ability to work effectively as a team.
  • Good analytical, technical, written and verbal communication skills.

More Info

Job Type:
Industry:
Employment Type:

About Company

Job ID: 145204955