Network Security Engineer

Singapore

Trend Micro

Cybersicherheitsplattform für Unternehmen auf Basis von KI und globalen Bedrohungsinformationen. Angriffsflächenmanagement, XDR, Cloud-Sicherheit, Netzwerksicherheit, Managed Services

View company page

When you join Trend, you become part of a unique and diverse global family and you get to work towards a world safe for exchanging digital information.

ABOUT TREND MICRO

Trend Micro, a global cybersecurity leader, helps make the world safe for exchanging digital information. Fueled by decades of security expertise, global threat research, and continuous innovation, Trend Micro's cybersecurity platform protects hundreds of thousands of organizations and millions of individuals across clouds, networks, devices, and endpoints. As a leader in cloud and enterprise cybersecurity, the platform delivers a powerful range of advanced threat defense techniques optimized for environments like AWS, Microsoft, and Google, and central visibility for better, faster detection and response. With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world. For additional information, visit www.trendmicro.com

POSITION OVERVIEW

This is a 2-year renewable contract with our client. You will be managing our client internal security related matters, work with client’s internal and external stakeholders, and act as a Network Security Engineer, to act as a Network advisor to fully make use of TM solutions.

PRIMARY RESPONSIBILITIES

  • Provide security consultancy and operational support for ICT Security Services, including reviewing Vulnerability Assessment & Penetration Testing (VAPT) and Source Code Review (SCR) reports, as well as assessing operating system, network architecture, and Application Infrastructure Architecture Security (AIAS).
  • Offer technical consultancy, report vulnerabilities, and propose solutions to address security threats within internal ICT environments.
  • Possess in-depth knowledge of Privileged Access Management tool (e.g., PAM - CyberArk), Data Loss Prevention tool (DLP), Security Information and Event Management tool (SIEM), and intrusion detection and prevention systems for securing and monitoring ICT System.
  • Safeguard ICT System against unintended or unauthorized access using identity & access management systems or other automation tools, and perform malware or cyber threats analysis, as well as penetration & vulnerability assessment testing using tools like Nexpose or Nessus.
  • Conduct regular security analysis on operating system and network security.
  • Investigate and analyze security threats reported from Government Security Incident Response, or TrendMicro SOC team.
  • Define and enforce security policies, SOP, and compliance monitoring.
  • Understand the key operating concerns of stakeholders and conduct safe attack simulations on ICT environments to provide cybersecurity assurance.
  • Direct support to premium/key customers on technical issues
  • Account Management by providing technical updates, monthly/quarterly case reviews, threat assessment/advisories for pro-active protection, train customers on product & threat, provide notifications from corporate on enhancements/bug-fixes, customer relationship for account retention
  • Provide assistance to nominated backup customers when other team members are absent
  • Conduct presentation to potential customers to drive growth in Premium Support Program enrolments.
  • Provide guidance, consultancy, technical support, and problem resolution to key customers/channel partners in implementation projects
  • Perform Back pre-sales role as requires

EXPERIENCE

  • Bachelor in IT or Computer Engineering. ICT Security background with at least 3 years specialising in in ICT cybersecurity, risk or governance.
  • Good knowledge of industry best practices and frameworks pertaining to Data and Cybersecurity (IM8, ISO27001/2 etc)
  • Possess one or more IT Security Certifications (i.e.CREST, CISSP, CEH, CISM etc)
  • Broad knowledge working on administration of IT infrastructure, network and applications. Exposure in configuration and administration of security technologies like security information and event management (SIEM), TrendMicro solution such as CloudOne, access control, privileged identity management (PIM) solution, analysing next generation firewall and web, application for anomalies, vulnerability assessment and remediation in close coordination with IT Business units.
  • Experience in adopting security guidelines and best practices to advise on processes and procedures that align with IM8 Polices and Standards.
  • Possess in-depth hands-on experience in one or more of the following areas: source code review, penetration testing or vulnerability assessment testing.
  • Possess strong analytical, communication, presentation, and stakeholder engagement skills.
  • Good time, project management skills, able to work independently and a good team player.

#LI-ZA1
#LI-Hybrid

Trend Micro strive to build an environment of equity and inclusion, which reflects diverse points of view. We welcome, value, promote, and celebrate diversity - the very experiences and attributes that make us who we are, including but not limited to race, ethnicity, nationality, gender, gender identification, sexual orientation, level of ability, age, religion, veteran status, socio-economic status, and political philosophy.

We embrace change, empower people, and encourage innovation. Join Trend Micro and Thrive with us.

Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: Automation AWS CEH CISM CISSP Cloud Compliance CREST Cyberark Firewalls Governance Incident response Intrusion detection ISO 27001 IT infrastructure Malware Monitoring Nessus Network security Pentesting Security analysis SIEM SOC Threat Research Vulnerabilities

Region: Asia/Pacific
Country: Singapore
Job stats:  9  1  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.