IT Security Manager

Hong Kong

Chubb

Chubb insurance products and services in Germany

View company page

  • Lead the security officer role, define and maintain security strategy and direction of all application and infrastructure and IT process.
  • Lead IT security projects in building up and maintaining a secure IT environment to support business development and establishing corresponding security control process/procedures.
  • Manage and coordinate application enhancements with application teams for security remediation.
  • Provide advice for localization of security implementations that meet local business and technology requirements.
  • Evaluates the feasibility of new security technology for business use and provides advice for the acquisition of new security technology.
  • Manage IT Security Policy, Procedure, Standard and Process (GISP Annual Review, Coordination etc.).
  • Responsible to security issue and vulnerability management (scanning, identification, notification etc.).
  • Responsible to implement company’s security standards and assist in managing the change management and segregation of duties.
  • Provides support in BCP/DRP.
  • University graduate or above major in Computer Science or Information Security related field.
  • At Lease 8 years of working experience in information security management, preferably in CISP, CISSP certifications.
  • Good knowledge of network communication, Internet & Intranet, and project management.
  • Participating in a group of application administrators, developers, network & hardware administrators, global/regional security team, consultants and vendors. 
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  5  0  0
Category: Leadership Jobs

Tags: CISSP Computer Science Security strategy Strategy Vulnerability management

Region: Asia/Pacific
Country: Hong Kong

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.