Associate Security Engineer

Malaysia

Ensign InfoSecurity

Ensign InfoSecurity is Asia's premier cybersecurity provider. Our Threat-informed Defence approach offers tailored insights on regional cyber risks.

View all jobs at Ensign InfoSecurity

Apply now Apply later

Ensign is hiring !

Evaluates, tests, monitors and maintains information systems (IS) and cyber security policies, procedures and systems I Creates, implements and oversees identity management systems to meet specific security needs and complex compliance standards | Ensures that IS and cyber security plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security | Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security | Develops techniques and procedures for conducting IS, cyber security and access and identity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks |
Performs routine assignments in the entry level. Typically requires a college or university degree or the equivalent work experience and has conceptual knowledge of fundamental theories, principles and practices. Has no discretion to vary from established procedures by performing structured work assignments. Uses existing procedures to solve routine or standard problems. Receives instruction, guidance and direction from more senior level roles

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0

Tags: Audits Compliance Risk assessment

Region: Asia/Pacific
Country: Malaysia

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.