Overview
The IT Security Analyst is responsible to support and protect the business, deliver security services across APAC, minimize the number of security and compliance issues and to optimize IT risk management for a more robust business operations.
How you will contribute and grow
- Assist with performing application / project security risk assessments, developing good practice recommendations and pragmatic remediation strategies.
- Review security-related events, assessing risk and validity, as well as reporting.
- Assist in managing vulnerability assessments across all digital assets in APAC.
- Analyze the design of security controls around the underlying system architecture in the context of information technology controls such as security, availability and integrity.
- Manage and track security controls compliance on all crown jewel applications within APAC.
- Assist security officer to design and implement security awareness programme within APAC.
- Assist in coordinating security audits and 3rd party pen-tests on critical applications.
- Stakeholder collaboration with various departments, including IT, legal, and compliance, to integrate security requirements into business processes.
- Identify, assess, and mitigate security risks, including conducting vulnerability assessments and coordinating penetration testing with external vendors.
- Bachelor's degree in relevant field.
5 years of experience in information security, compliance, audit and / or risk management in a technology environment.
Demonstrate understanding of business processes, risk management, IT controls and related standards.Experience facilitating external assessments, such as security audits or regulatory inquiries.Excellent written and verbal communication skills, as demonstrated by prior experience writing.Knowledge of security control frameworks and standards such as SOC2, ISO 27001, NIST, etc.Security-related certifications, e.g. CISA, CISSP, CRISC is preferred.Application security architecture and authorization approaches (role-based access control, tier controls, etc).Security architecture best practices, standards and frameworks.#J-18808-Ljbffr