Talent.com
Cyber Security Consultant
Cyber Security ConsultantCLPS Global • Kuala Lumpur, Kuala Lumpur, Malaysia
Cyber Security Consultant

Cyber Security Consultant

CLPS Global • Kuala Lumpur, Kuala Lumpur, Malaysia
7 days ago
Job description

Talent Acquisition Specialist at RiDiK (a Subsidiary of CLPS. Nasdaq : CLPS) || Connecting Top Talent with Leading Companies !!!

Cybersecurity Specialist

CTS Malaysia

KL Malaysia

Payroll : Ridik Clps

Firewall Management (Fortigate, Sangfor)

Scope of Works

  • Administer, monitor, and optimize firewall policies and rules.
  • Perform regular policy reviews and cleanup of unused / obsolete rules.
  • Monitor logs for intrusion attempts, anomalies, and policy violations.
  • Manage VPN configurations (site-to-site and remote access).
  • Conduct firmware updates, backups, and health checks.
  • Coordinate with network teams on connectivity and segmentation improvements.
  • Liaise with NOC (vendor) on firewalls monthly report, change request or technical changes as required.

Microsoft 365 Security & Compliance (Intune MDM, Exchange Online, Security)

Scope of Works

  • Manage and enforce endpoint (endpoint, mobile device) compliance policies via Intune MDM.
  • Implement and maintain Conditional Access, device encryption, and application protection policies.
  • Monitor and remediate Exchange Online threats (phishing, spoofing, spam) and configure policies or rules (if applicable).
  • Review and optimize Microsoft 365 security posture using Secure Score and compliance reports.
  • Nessus Scanning (On-Prem Tenable)

    Scope of Works

  • Administer and maintain the on-premises Tenable Nessus scanning platform.
  • Schedule and perform regular vulnerability scans across all designated network segments and critical assets.
  • Analyze scan results, prioritize vulnerabilities, and coordinate remediation efforts with relevant teams.
  • Update scan policies, plugins, and credentials to ensure comprehensive coverage and up-to-date detection capabilities.
  • Generate and distribute vulnerability assessment reports to stakeholders and management.
  • Ensure compliance with internal security standards and regulatory requirements through ongoing scanning and reporting.
  • Collaborate with Digital teams to address scan findings and improve overall security posture.
  • Scope of Works

  • Monitor, triage, and respond to security alerts generated by CrowdStrike Falcon platform.
  • Coordinate with Falcon Complete Team for incident validation, containment, and remediation.
  • Review Identity Threat Protection and Exposure Management dashboards to identify vulnerabilities and misconfigurations.
  • Maintain, improve cybersecurity platform / appliances logs and alerts into NextGen SIEM and Fusion SOAR platforms for automated correlation and response.
  • Perform periodic health checks to ensure endpoint coverage, sensor version consistency, and policy compliance.
  • Track and remediate endpoints that are offline, unprotected, or misconfigured.
  • Conduct threat hunting activities using Falcon Insight to detect potential compromises.
  • Generate, review, and consolidate weekly and monthly reports covering :
  • Threat types (malware, behavioral detections, identity-based attacks)
  • Detection trends, endpoint status, and incident summary
  • Endpoint coverage metrics and remediation timeline
  • False positive analysis and tuning recommendations
  • Present consolidated reports to Section Head, ITInfrastructure & Security summarizing threat posture, incident trends, and improvement actions.
  • Network Access Control (EasyNAC)

    Scope of Works

  • Manage onboarding and enforcement policies for endpoints connecting to the corporate network.
  • Monitor unauthorized devices and enforce access control rules.
  • Coordinate with IT operations for exception handling and remediation.
  • Generate compliance reports and maintain NAC inventory integrity.
  • Secure Email Gateway (Mimecast)

    Scope of Works

  • Administer and optimize email security policies, including spam filtering, malware detection, and impersonation protection.
  • Maintain and update allow / block lists, URL protection, and attachment management rules.
  • Review and release quarantined messages in accordance with established security policies.
  • Analyze email security alerts and trends to identify emerging threats or policy gaps.
  • Work closely with the Digital Governance & Compliance team to plan and execute cybersecurity awareness and phishing simulation campaigns.
  • Enhance user protection by reviewing and improving the CyberGraph AI feature, ensuring better detection of targeted phishing attempts.
  • Raise and track support tickets with Mimecast Support and coordinate with local partner / vendor for troubleshooting, configuration changes, or feature enhancements.
  • Generate and consolidate monthly reports summarizing :
  • Phishing and spam trends
  • Users click-rate statistics from awareness campaigns
  • Policy performance and false positive rates
  • Improvement actions or configuration changes implemented
  • Conduct periodic policy reviews to align with evolving email threat landscapes and compliance requirements.
  • Scope of Works

  • Monitor network traffic for behavioral anomalies and lateral movement attempts.
  • Investigate alerts and collaborate with NDR MDR Team and local Digital Team for incident response.
  • Maintain and improve CrowdStrike integration for unified threat correlation.
  • Perform tuning of detection rules and exclusions to reduce false positives.
  • Conduct regular threat hunting based on AI-driven insights.
  • Privileged Access Management (PAM)

    Scope of Works

  • Administer and maintain the PAM platform, ensuring secure management of privileged accounts across systems, servers, and network devices.
  • Enforce least-privilege access policies and maintain proper account lifecycle management for all privileged identities.
  • Configure and monitor session recording, credential vaulting, and automatic password rotation features.
  • Review access logs, privileged session activities, and alerts for suspicious or unauthorized behavior.
  • Conduct periodic access reviews with system owners to validate privilege appropriateness and compliance.
  • Oversee integration of PAM with key systems such as Active Directory, critical servers, firewalls, and network devices.
  • Ensure system health, backups, and high availability configurations are functioning correctly.
  • Coordinate with internal IT and cybersecurity teams for onboarding new systems or applications into PAM.
  • Manage and communicate with assigned local partner (Managed Service Provider) responsible for day-to-day PAM operations, including :
  • Overseeing service delivery and ensuring adherence to SLAs
  • Reviewing MSP performance reports, incident logs, and maintenance activities
  • Approving configuration changes and enhancements proposed by the MSP
  • Escalating and tracking technical issues or service gaps until resolution
  • Conducting periodic service review meetings to ensure continuous improvement and compliance with security standards
  • Generate and consolidate monthly management reports summarizing :
  • Privileged account activities and usage trends
  • Access anomalies or violations detected
  • Password rotation compliance and policy status
  • MSP performance metrics and support issues
  • Recommend improvements to PAM configuration, policies, and operational processes to strengthen overall identity and access security posture.
  • Vulnerability Assessment and Penetration Testing (VAPT)

    Scope of Works

  • Coordinate with external vendors for annual VAPT exercises.
  • Facilitate scope definition, testing schedule, and access provisioning.
  • Review VAPT reports and track remediation with system owners.
  • Validate closure of identified vulnerabilities and maintain audit trail.
  • Update to Section Head, IT Infrastructure & Security reports summarizing findings and remediation progress.
  • Project Management for Cybersecurity Initiatives

    Scope of Works

  • Plan, coordinate, and manage cybersecurity projects from initiation to completion.
  • Define project scope, objectives, deliverables, and timelines aligned with organizational goals.
  • Work with internal stakeholders and external vendors to ensure smooth implementation.
  • Monitor progress, manage risks, and resolve issues to keep projects on track.
  • Oversee procurement, budget, and resource allocation for security initiatives.
  • Ensure all project activities follow change management and compliance requirements.
  • Prepare regular status updates and post-implementation reports for management.
  • Private Cloud Security & Compliance Oversight

    Scope of Works

  • Act as the primary cybersecurity liaison between client and the private cloud service provider.
  • Review and validate the provider’s security posture, including patching cadence, access management, and vulnerability remediation.
  • Ensure network segmentation, firewall, and VPN configurations between client and the provider align with internal policies.
  • Coordinate and validate backup integrity, data encryption, and incident response readiness with the provider.
  • Participate in monthly or quarterly service review meetings to discuss performance, incidents, and improvement actions.
  • Review and track security SLA metrics (e.g., uptime, incident response time, patching timelines).
  • Ensure the provider complies with contractual security obligations, including data protection, PDPA compliance, and ISO 27001 or SOC 2 standards (if applicable).
  • Validate that log forwarding and security event integration (from the cloud workloads) are properly feeding into CrowdStrike SIEM or relevant monitoring tools.
  • Coordinate with the provider to support vulnerability scanning, VAPT, or audit evidence collection when required.
  • Document and elevate any security gaps, exceptions, or non-compliance findings to the Section Head, IT Infrastructure & Security, and track remediation progress.
  • Review and approve the provider’s change management or maintenance activities impacting security controls or system availability.
  • Others

    Scope of Works

  • Recommend enhancements to security controls and architecture.
  • Keep abreast of emerging threats and technology updates.
  • Participate in security projects and proof-of-concepts (POC) for new tools or integrations.
  • Seniority level

    Mid-Senior level

    Employment type

    Full-time

    Job function

    Information Technology

    Industries

    IT Services and IT Consulting

    Referrals increase your chances of interviewing at CLPS Global by 2x

    #J-18808-Ljbffr

    Create a job alert for this search

    Security Consultant • Kuala Lumpur, Kuala Lumpur, Malaysia