IT Security Operation Lead_1017 at Allianz Global Corporate & Specialty SE
Kuala Lumpur, Kuala Lumpur, Malaysia -
Full Time


Start Date

Immediate

Expiry Date

02 Jan, 26

Salary

0.0

Posted On

04 Oct, 25

Experience

10 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Leadership, Information Security, Identity Access Management, Cybersecurity, Incident Response, Threat Management, Vulnerability Management, Access Control, Policy Compliance, Team Management, Technology Management, Stakeholder Engagement, Risk Assessment, Regulatory Compliance, User Identity Lifecycle, Security Operations

Industry

Financial Services

Description
Job Summary The Information Security Operations Manager is responsible for leading the security & identity access management (IAM) operations team to protect the organization's systems, application and network in security operation perspective (across multiple locations within the region) and in responsible for the development, implementation, and management of the regional IAM program (this includes ensuring proper access controls are in place for all systems and data, managing the IAM team, and working with various stakeholders to support the organization's objectives) in IAM perspective. Key Responsbilities 1.Leadership and Strategy Provide leadership to the regional security & IAM operations team. Develop and execute the information security operations strategy in alignment with the company's objectives. Develop and execute the IAM strategy and roadmap in alignment with organizational goals. And, following by oversee the lifecycle of user identities from onboarding to offboarding. Ensure that IAM policies support compliance with legal and regulatory requirements. 2.Security Operations Collaborate closely with Allianz Cyber Defense Center (ACDC) and manage the day-to-day activities of the security operations team. Ensure continuous monitoring and protection of IT assets and infrastructure. Manage the response to security incidents and coordinate with other teams for incident resolution. 3.Threat Management Monitor emerging threat patterns and cybersecurity intelligence for proactive defence. Ensure the implementation of threat detection, prevention, and response strategies. Oversee vulnerability management, including scanning, analysis, and remediation processes. 4.Vulnerability Identification, Assessment and Remediation Oversee regular vulnerability scans and assessments across the network, systems, and applications. Prioritize vulnerabilities based on severity, exploitability, and impact on the organization. Work with IT and business units to facilitate the timely remediation of identified vulnerabilities, toxicity & forward-looking toxic. Develop and monitor remediation plans and timelines, ensuring accountability and progress of identified vulnerabilities, toxicity & forward-looking toxic. 5.Access Control Management Manage the processes for access request, provisioning, deprovisioning, and access recertification. Oversee the implementation of role-based access controls (RBAC), single sign-on (SSO), multi-factor authentication (MFA), and privileged access management (PAM). 6.Stakeholder Engagement Collaborate with senior management to define security metrics and performance goals. Collaborate with IT, HR, legal, compliance, and business units to ensure IAM policies align with business processes. Communicate effectively with stakeholders about IAM policies, standards, and practices. 7.Policy and Compliance Ensure compliance with regulatory requirements and internal security policies. Coordinate with compliance and audit teams to support security assessments and audits. Develop, maintain, and enforce information security policies and procedures. 8.Team Management and Development Recruit, train, and mentor security & IAM operations staff. Manage performance reviews and professional development plans for team members. 9.Technology Management Evaluate and recommend security & IAM technologies to enhance the security & IAM infrastructure. Oversee the implementation and integration of security & IAM solution (tools and systems). Ensure proper configuration and maintenance of security & IAM solution (systems and software). Key requirements Candidate must possess at least a Bachelor's Degree in Computer Science/Information Technology or equivalent. At lease 10 years experience in security & IAM technologies and Team management experience.
Responsibilities
The IT Security Operation Lead is responsible for leading the security and identity access management operations team to protect the organization's systems, applications, and networks. This role includes developing and managing the IAM program and ensuring compliance with legal and regulatory requirements.
Loading...