About this role
Job Description This role covers both: Day 1 Security (Build / Project Implementation) Day 2 Security (Operations / Production Support) The Security Lead will work closely with Infra, System, and Software teams, InfoSec stakeholders, and external auditors to ensure the system complies with government security policies and standards. Key Responsibilities Day 1 – Project / Implementation Security 1. Security Architecture & Design • Define system security architecture aligned with Singapore Government security policies. • Review application, middleware, infrastructure, and platform designs for security compliance. • Conduct threat modelling and risk assessments; map risks to mitigating controls. • Translate policy requirements into actionable technical controls across the stack. 2. Compliance & Governance • Ensure compliance with: IM8 / Government security policies Whole‑of‑Government (WOG) security requirements PDPA (where applicable) • Establish and oversee cyber security governance across infrastructure, application, and project teams. • Prepare and maintain documentation for: • Security Risk Assessment (SRA)Vulnerability Assessment (VA)Penetration Testing (PT)Security hardening baselines and reports 3. Secure Development Oversight Partner with software teams to enforce secure coding standards and Dev SecOps practices. • Integrate and govern SAST/DAST, dependency/SCA scanning, and container image scanning in CI/CD. • Review and triage findings from tools (e.g., SonarQube, SCA, container scanners), drive remediation, and risk acceptance where needed. • Provide guidance on API security, token/secret management, and secure service-to-service communication. 4. Security Testing & Certification • Plan, coordinate, and manage VA/PT engagements and vendors. • Track findings through remediation to closure; document residual risk and risk acceptance. • Support all security clearances and go‑live certifications. • Security Hardening Review and approve: • OS and baseline hardening • Middleware hardening • Database security configurations • Kubernetes / container security (RBAC, network policies, admission controls, secrets, image provenance) • API gateway / WAF / rate‑limiting / mTLS / OAuth2/OIDC configurations Day 2 – Operations / Production Security 1. Incident Management • Lead security incident investigation, containment, and recovery. • Perform root cause analysis (RCA) and define corrective/preventive actions. • Coordinate with Gov SOC and stakeholders; contribute to and refine playbooks. • Provide clear, timely communications to both technical and non-technical audiences. 2. Vulnerability & Patch Management • Oversee continuous vulnerability monitoring and posture management. • Track patch and configuration compliance across infrastructure, middleware, applications, and containers. • Provide risk assessments and compensating controls for deferred patches. 3. Security Monitoring & Audit Review and tune alerts, detections, and dashboards in SIEM and related tools. • Ensure monitoring coverage for critical systems and high‑value assets. • Support internal/external audits and evidence collection; close audit findings. 4. Compliance & Reporting • Prepare and present security posture, metrics, and trend reports to management. • Maintain risk registers and mitigation plans; ensure up‑to‑date security documentation. • Communicate security assessments and findings effectively to varied stakeholders. 5. Access Control Governance • Oversee and periodically review RBAC, MFA, Privileged Access Management (PAM), and joiner/mover/leaver processes. • Ensure least privilege, SoD, and periodic access recertifications. 6. Security Operations Contribution • Support incident response handling, log analysis, and activity reviews. • Drive continuous improvement across identify → protect → detect → respond → recover functions. Requirements: Bachelor’s degree in computer science / Cybersecurity / Information Security or equivalent Preferred Certifications: CISSP, CISM, CISA, CEH, GIAC (e.g., GSEC, GCIA, GCIH, GCSA) Experience in: Kubernetes, Docker security, API security, Identity & Access Management (IAM), Security tools (SAST/DAST/SIEM) and CI/CD-integrated security • To Apply, please kindly email your updated resume ashwathy.pillai@tg-hr.com Regret to inform that only shortlisted candidates will be notified. CEI: R1988671 EA License: 14C7275
Also in Government Policy
ANRADUS PTE. LTD.
SINGAPORE EMERGENCY RESPONDER ACADEMY
UES HOLDINGS PTE. LTD.