Our partner, a leading company specializing in logistics and cross-border solutions, is seeking an IT Security Specialist with hands-on expertise in information security consultancy and a strong understanding of security architecture concepts. You will join their Information Security team, responsible for ensuring the security of IT services across Asia region.
Working days: Mon - Fri (Hybrid working)
What You'll Do:
Lead the Charge: Coordinate and oversee security testing for company's IT services, ensuring top-notch protection.
Collaborate & Innovate: Work closely with the Regional IT Security team to implement cutting-edge security measures.
Be the Expert: Act as a Subject Matter Expert (SME) for new applications and projects, providing invaluable security insights.
Drive Discussions: Facilitate post-test discussions and lead triages with testing and IT project teams.
Vendor Security: Assist in assessing vendors from a security perspective.
Represent teams: Weekly change review meetings.
Maintain Excellence: Keep meticulous records of security activities and support audits.
Manage & Secure: Oversee security processes, standards, and procedures, and collaborate with external vendor to secure our cloud environment.
Report & Support: Provide timely status updates to the regional team and management, and support security awareness initiatives in the APAC region.
What We Need:
Experience: More than 10+ years in IT Security and GRC.
Expertise: Strong background in Application Securuty and System Development, Cloud Security, and Security Project Management.
Skills: Proficiency in risk management, excellent English communication skills, and familiarity with Business Continuity, Disaster Recovery, Security Operations, and Incident Management.
Certifications: Industry-recognized certifications (e.g., CompTIA Security+, CISSP, etc.).
Mindset: A self-starter who can manage end-to-end assignments with minimal supervision.
Knowledge: Familiarity with cybersecurity best practices and frameworks (e.g., ISO27000) and experience with cloud security configurations.
Understanding: Knowledge of security breach protocols and attack vectors.