Job Description
7 days ago
A licensed virtual bank in Hong Kong
Location
Hong Kong
Report to
Chief Information Security Officer
Job Summary
• Improve cyber defence capability.
• Improve security monitoring capability.
• Improve security incident response capability.
Responsibilities
Anomalies activity and cyber incident detection
• Manage the anomalies activity detecting process.
• Assess the monitoring needs and define the monitoring scope and approach.
• Work closely with Security Operation Center to ensure that the monitoring process are effective.
• Oversight and monitor on the activities performed by the Security Operation Center.
• Monitor security events reported to ensure that all events are properly handled.
• Response to security events escalated from the Security Operation Center and work with the relevant parties to investigate and response when needed.
• Develop relevant information security metrics to monitor the banks information security posture and translate it into meaningful insights for the senior management.
Cyber incident response and management
• Manage security incident and develop response plan and playbooks for various attacks and security events.
• Oversight and monitor security incidents to ensure that all incidents identified are managed according to the incident management procedure and response plans.
• Ensure escalation and reporting process are in place and followed.
• Perform analysis to assess incident impact and determine whether the involvement of external investigators or forensic analysis are required to support incident investigation.
• Work with external investigators on forensic analysis during cyber and information security incidents.
• Drive the banks regular incident response drills exercise in responding to cyber and information security incidents.
Threat monitoring and analysis
• Monitor threat intelligence from various sources to discover emerging cyber threats affecting the bank and customers.
• Perform threat analysis and to identify potential security controls or remediation and other security improvement in response to the threats.
• Perform threat hunting, leveraging available indicators of compromise, to identify potential threats that are lurking undetected.
• Threat intelligence sharing and to collaborate with 3rd parties and industry peers.
• Manage the threat and vulnerability management program.
Requirements
• At least 7 years of experience in information & cyber security from either the banking and finance industry or security consulting with primary focus on Incident Response or Intrusion Detection.
• Solid understanding of incident response, threat modeling and common attack vectors, adversary tactics, techniques & procedure, MITRE ATT&CK framework.
• Hands on experience
in using Splunk Enterprise Security, analyzing security log & network traffic, identifying, and investigating security incidents.
• Prior experience in malware analysis, virus exploitation and mitigation techniques, and digital forensic.
• Understanding of network, desktop and server technologies, network intrusion methods, network containment, segregation techniques, IDS and IPS.
• Degree holder major in Computer Science or related field.
• Relevant certification in information security (e.g., CISSP, CISA or CISM etc.)
Location
Hong Kong
Report to
Chief Information Security Officer
Job Summary
• Improve cyber defence capability.
• Improve security monitoring capability.
• Improve security incident response capability.
Responsibilities
Anomalies activity and cyber incident detection
• Manage the anomalies activity detecting process.
• Assess the monitoring needs and define the monitoring scope and approach.
• Work closely with Security Operation Center to ensure that the monitoring process are effective.
• Oversight and monitor on the activities performed by the Security Operation Center.
• Monitor security events reported to ensure that all events are properly handled.
• Response to security events escalated from the Security Operation Center and work with the relevant parties to investigate and response when needed.
• Develop relevant information security metrics to monitor the banks information security posture and translate it into meaningful insights for the senior management.
Cyber incident response and management
• Manage security incident and develop response plan and playbooks for various attacks and security events.
• Oversight and monitor security incidents to ensure that all incidents identified are managed according to the incident management procedure and response plans.
• Ensure escalation and reporting process are in place and followed.
• Perform analysis to assess incident impact and determine whether the involvement of external investigators or forensic analysis are required to support incident investigation.
• Work with external investigators on forensic analysis during cyber and information security incidents.
• Drive the banks regular incident response drills exercise in responding to cyber and information security incidents.
Threat monitoring and analysis
• Monitor threat intelligence from various sources to discover emerging cyber threats affecting the bank and customers.
• Perform threat analysis and to identify potential security controls or remediation and other security improvement in response to the threats.
• Perform threat hunting, leveraging available indicators of compromise, to identify potential threats that are lurking undetected.
• Threat intelligence sharing and to collaborate with 3rd parties and industry peers.
• Manage the threat and vulnerability management program.
Requirements
• At least 7 years of experience in information & cyber security from either the banking and finance industry or security consulting with primary focus on Incident Response or Intrusion Detection.
• Solid understanding of incident response, threat modeling and common attack vectors, adversary tactics, techniques & procedure, MITRE ATT&CK framework.
• Hands on experience
in using Splunk Enterprise Security, analyzing security log & network traffic, identifying, and investigating security incidents.
• Prior experience in malware analysis, virus exploitation and mitigation techniques, and digital forensic.
• Understanding of network, desktop and server technologies, network intrusion methods, network containment, segregation techniques, IDS and IPS.
• Degree holder major in Computer Science or related field.
• Relevant certification in information security (e.g., CISSP, CISA or CISM etc.)
More jobs from Begin your journey
Key Account Manager, HK base
Begin your journey
Sales & Account Management
Central and Western, Hong Kong, China
7 days ago
Full Time
Onsite
Consumer Services
Lead of Digital Marketing, HK base
Begin your journey
Digital Marketing
Central and Western, Hong Kong, China
7 days ago
Full Time
Onsite
Consumer Services
Business Development Director, Apparel
Begin your journey
Business & Management
Central and Western, Hong Kong, China
7 days ago
Full Time
Onsite
Consumer Services
More jobs like this
Technical Manager, Cyber Incident Response
The Hong Kong Jockey Club
Central and Western, Hong Kong, China
Manager, Cybersecurity
Haitong International Management Services Company Limited
Central and Western, Hong Kong, China
🎉 Got an interview?