About this role
ROLESUMMARY The IT Security Officer is responsible for ensuring the security, integrity, and compliance of enterprise IT systems and data. The role focuses on implementing security controls, monitoring threats, managing risks, and ensuring adherence to regulatory and governance standards in mission-critical and regulated environments. KEYRESPONSIBILITIES · Implement and manageenterprise security controls across infrastructure, applications, and networks. · Monitor security events,logs, and alerts; identify and respond to potential threats and incidents. · Conduct vulnerabilityassessments, risk analysis, and security reviews. · Manage identity and accesscontrols, including user provisioning and privileged access. · Ensure timely patching,system hardening, and remediation of security vulnerabilities. · Develop and enforce securitypolicies, standards, and procedures. · Support incident response,investigation, and root cause analysis (RCA). · Ensure compliance withregulatory, audit, and governance requirements. · Collaborate withinfrastructure, network, and application teams to embed security bestpractices. · Conduct security awarenessand advisory for internal teams. · Maintain securitydocumentation, reports, and audit artifacts. · Support third-party/vendorsecurity assessments and risk management. TECHNICALSKILLS & TOOLS · Security Domains: Networksecurity, application security, endpoint security, IAM · Tools: SIEM (Splunk,QRadar), EDR/XDR, vulnerability scanners (Nessus, Qualys) · Access Management: ActiveDirectory, Azure AD, IAM tools · Cloud Security: AWS/Azuresecurity services, cloud posture management · Networking & Systems: Firewalls, VPNs, Linux/Windows security fundamentals · Standards & Frameworks: ISO 27001, NIST, CIS Benchmarks SECURITY& COMPLIANCE · Ensure implementation ofsecurity controls aligned with ISO 27001, NIST, and CIS. · Perform audits, riskassessments, and compliance reporting. · Support incident managementand regulatory requirements. · Ensure data protection andsecure handling of sensitive information. QUALIFICATIONS& EXPERIENCE · Degree in IT, Cybersecurity,Computer Science, or related field. · 4–8 years of experience inIT security or cybersecurity roles. · Experience in enterprise orregulated environments preferred. · Strong analytical, incidentresponse, and communication skills. PREFERRED(GOOD TO HAVE) · Certifications such asCISSP, CISM, CEH, or equivalent. · Experience with Security Operations Center (SOC) environments. · Exposure to Zero Trust architecture and cloud security practices. · Experience in government or compliance-driven projects.
Also in Government Policy
PERSOL SINGAPORE PTE. LTD.
ALEC LANCE.
SCIENTEC CONSULTING PTE. LTD.