Skip to main content
NEUN
Back to Careers

Explore

System Engineer and Information Security Officer

NEW
49, Jalan Dungun, Bukit Damansara, ...Full-timeGlobal
šŸ“Š MidšŸ  On-site
ActivePosted within the last 30 days

Job Description

[AI-summarized by JobStash]

You will manage and maintain internal IT infrastructure, including device security, VPN configurations, and communication tools. You will define, implement, and maintain the organisation's information security strategy, policies, and standards. You will lead vulnerability management initiatives, perform regular scanning, track remediation and risk acceptance, and monitor system logs to identify intrusions or breaches. You will collaborate with developers, product managers, and QA to integrate security into the product development lifecycle, identify and implement quality and security process improvements, maintain thorough security documentation, and keep up to date with security threats and technologies.

Requirements

  • ā—Minimum 3 years of proven work experience in system engineering or information security
  • ā—Excellent documentation, communication, and stakeholder management skills
  • ā—Strong knowledge of security methodologies, vulnerability management tools, and IT infrastructure best practices
  • ā—Solid understanding of networking, VPNs, and device management security
  • ā—Analytical mindset and proactive problem solving aptitude
  • ā—Strong organizational skills and meticulous attention to detail
  • ā—Familiarity with Agile frameworks
  • ā—Understanding of SQL and databases is a plus
  • ā—Bachelor's degree in Computer Science, Cyber Security, Engineering, or related field
  • ā—Relevant professional certifications (e.g., CISSP, CISM, CompTIA Security+) are highly regarded

Responsibilities

  • ā—Manage and maintain internal IT infrastructure
  • ā—Secure devices and configure VPNs and communication tools
  • ā—Define and implement information security strategy, policies, and standards
  • ā—Lead vulnerability management, including scanning and remediation tracking
  • ā—Monitor and review system logs for intrusions or breaches
  • ā—Integrate security into the product development lifecycle with cross functional teams
  • ā—Identify and implement quality and security process improvements
  • ā—Maintain documentation of security protocols, test results, and infrastructure changes
  • ā—Keep updated with industry security trends and technologies

Tech Stack

networkingdocumentationdatabasestakeholder managementdevice managementvulnerability scanningsystem engineeringinformation securityagilelog monitoringproject:Hata
Expired
Search