x
Get our mobile app
Fast & easy access to Jobstore
Use App
Congratulations!
You just received a job recommendation!
check it out now
Browse Jobs
Companies
Campus Hiring
Download App
Jobs in Singapore   »   Jobs in Singapore   »   F&B / Tourism / Hospitality Job   »   Lead, Information & Cyber Security
 banner picture 1  banner picture 2  banner picture 3

Lead, Information & Cyber Security

Audax Financial Technology Pte. Ltd.

Audax Financial Technology Pte. Ltd. company logo

Audax is looking for a highly talented professional to join our Information & Cyber Security (ICS) practice. The candidate must be comfortable with working on ICS at both the abstract and detailed levels. The candidate will be someone who has strong background in ICS operations management.


What you will be doing:

1. Risk Governance:

  • Develop and maintain the enterprise-wide information security governance framework.
  • Define and implement risk management strategies to mitigate risks to an acceptable level.
  • Ensure compliance with regulatory requirements and internal policies.
  • Advise senior management on information security risks and best practices.
  • Develop and maintain key control indicators (KCIs) and key risk indicators (KRIs) to monitor and report on the effectiveness of security controls.
  • Prepare and deliver regular reports on the status of information security risks and controls to senior management and the board of directors.
  • Use data-driven insights to inform risk management decisions and improve the security posture of the organization.
  • Ensure transparent and clear communication of risk levels and control effectiveness across the organization
  • Maintain a risk tracking system to monitor and manage identified risks.
  • Ensure all identified risks are documented, tracked, and updated regularly.
  • Prioritize risks based on their potential impact and likelihood.
  • Work with relevant stakeholders to ensure timely mitigation and closure of identified risks.

2. Risk Assessment:

  • Conduct regular risk assessments and vulnerability assessments.
  • Identify and evaluate risks and implement appropriate measures to manage and mitigate them.
  • Coordinate with internal departments to ensure risk assessments are integrated into business processes.
  • Perform risk review of systems and application architecture to ensure the required security controls are designed and implemented in both enterprise systems and audax software product.

3. Firewall, Network Proxy, and EDR Management:

  • Firewall Management: Oversee the configuration, maintenance, and monitoring of firewall systems to enforce security policies and control network traffic effectively.
  • Network Proxy Management: Manage proxy servers to secure internet traffic, optimize performance, and troubleshoot issues as needed.
  • Endpoint Detection and Response (EDR) Management: Manage EDR tools across endpoints, configure policies for threat detection and response, and analyze endpoint data for security anomalies.

4. Threat Detection and Content Creation:

  • Write and refine rules, signatures, and queries to detect security threats effectively.
  • Develop and update security detection content for SIEM (Security Information and Event Management) systems.

5. Vulnerability and Threat Management:

  • Manage vulnerability assessment and remediation programs, prioritizing and mitigating security vulnerabilities.
  • Coordinate with technology operations teams to apply patches and updates to systems and applications.
  • Monitor and respond to emerging threats, implementing proactive measures to protect systems and data.

6. Incident Response:

  • Perform security monitoring and triaging for potential threats and SIEM alerts.
  • Develop and maintain incident response plans and procedures, coordinating responses during security incidents or breaches.
  • Lead incident response teams, ensuring timely resolution and post-incident analysis to prevent future occurrences.

7. Access Review and Security Exceptions:

  • Establish and maintain access review processes to ensure appropriate access rights and permissions.
  • Manage and review user requests for security exceptions, balancing business needs with security requirements.
  • Implement controls and monitor activities to detect unauthorized access attempts and policy violations.

8. Collaboration with Engineering Teams:

  • Work closely with engineering teams to integrate security best practices into the development lifecycle.
  • Conduct security reviews of infrastructure, applications, and new technologies, providing recommendations for security enhancements.
  • Collaborate on the design and implementation of secure architecture and solutions.

9. Service Management:

  • Provide oversight of security service delivery, ensuring SLAs (Service Level Agreements) are met.
  • Manage relationships with security service providers and vendors, evaluating services and negotiating contracts.

10. Compliance and Reporting:

  • Ensure compliance with relevant security standards, regulations, and best practices.
  • Generate regular reports on security metrics, incidents, vulnerabilities, and operational status.
  • Participate in audits and assessments related to security operations.

11. Security Awareness:

  • Develop and implement a comprehensive security awareness program.
  • Conduct regular training sessions and awareness campaigns to educate employees on security best practices, policies, and procedures.
  • Ensure all staff are aware of their roles and responsibilities in protecting the organization’s information assets.

12. Table-Top Exercises:

  • Plan and conduct regular table-top exercises to test the organization’s incident response and crisis management capabilities.
  • Simulate various security incident scenarios to evaluate the effectiveness of the incident response plan.
  • Identify areas for improvement and update response plans accordingly based on the outcomes of the exercises.

13. Audit Management:

  • Manage and coordinate security audits conducted internally or by external auditors.
  • Prepare audit responses and action plans, implementing corrective measures and tracking progress.


What you need to be successful in this role:

  • Bachelor’s degree in Computer Science, Information Technology, or related field; advanced degree or certifications (e.g., CISSP, CISM) preferred.
  • Proven experience in a security operations role with hands-on experience in firewall management, network proxy, EDR, incident response, and threat detection.
  • Strong understanding of security principles, protocols, and technologies.
  • Experience with access control, vulnerability management, audit management, and compliance frameworks (e.g., PCI-DSS, GDPR).
  • Excellent communication skills and ability to collaborate effectively across teams and stakeholders.
  • 5-10 years of relevant ICS experience in security operations / management.
  • At least 2 years managing security operations team.
  • Strong acumen in setting up risk frameworks, policies, standards, baselines and procedures.
  • Good hands-on experience reviewing cloud, application, information and cyber security.
  • Good understanding of technology (e.g. cloud and containers) and Agile development concepts.
  • Ability to explain theoretical concepts to team members with varying ICS backgrounds.
  • Good knowledge of retail banking products and processes with a focus on digital products, functions, features and processes.
  • Good understanding of industry trends and developments including impact on the business.
  • People leader.
  • Strong communication skills -oral and written.


We are also looking for:

  • A hustler who is highly adaptable and able to perform in a fast-paced dynamic environment.
  • A team player who champions ownership and upholds a collaborative work environment.
  • An inquisitive learner who has the appetite for continuously improving and streamlining processes and the way we work.


Sharing is Caring

Know others who would be interested in this job?

Similar Jobs
Harriann's Pte. Ltd.
Quick Apply
Social & Emotional Learning Instructor/Coach
Ministry Of Football Private Limited
Quick Apply
GEAR-UP (Guiding & Empowering students for Affiliation & Resilience to Unlock their Potential) Programme Instructors wanted to work
Ministry Of Football Private Limited
Quick Apply
Assistant Football & Soccer Coach (trial development program)
Ministry Of Football Private Limited
Quick Apply
PROGRAM & GAMES MANAGER
Ministry Of Football Private Limited
Quick Apply
Harriann's Pte. Ltd.
Quick Apply
Purchaser & HR Admin
Curtain Suite Pte. Ltd.
Quick Apply
F&B Servers - $2k Joining Bonus
Ginza Sushi Ichi Pte. Ltd.
Quick Apply
Western Kitchen HEAD chef
Bakers & Brewers Private Limited
Quick Apply
IT Manager (Network & Server, MNC Manufacturing Plant)
Triton AI Pte Ltd
Quick Apply