Closing Date : 31/12/2024

Section Head, Cybersecurity Architecture  

** For registered candidates, please login to apply

Life at U Mobile
We are Passionate, Innovative, Trustworthy, Team-Oriented & Fun-Loving.

At U Mobile, we are always on the lookout for great talents and passionate individuals to join our growing team.
Let’s start your journey with an award-winning organization! #UnlimitingYourPotential

Top Reasons To Join Us
• Awarded as the Most Preferred Graduate Employers (2022& 2023) & Gold Winner for Excellence in Workplace Culture (2021)
• Comprehensive medical, dental, optical and insurance benefits
• Flexi working hours arrangements
• Staff Line & Device Subsidy
• Smart Casual Attire
• Child Parental Care Leave
• Convenient location with access to public transport (Imbi Monorail/Bukit Bintang MRT)
• Special employee discounts for selected F&B Brands

Role


The Day-To-Day Activities

  • Security architects must assess risks associated with various systems and applications. This involves understanding potential threats, vulnerabilities, and their impact on the organization.
  • They develop risk management strategies, balancing security needs with business requirements.
  • Proficiency in designing robust security architectures is essential. This includes creating blueprints for secure systems, networks, and applications.
  • Architects must consider factors like scalability, performance, and compliance while designing security solutions.
  • Security architects design and implement network security measures to protect data in transit.
  • Architects must secure cloud environments, configure access controls, and address shared responsibility models.
  • IAM ensures authorized users have appropriate access while preventing unauthorized access.
  • Security architects design IAM solutions, including single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC).
  • Understanding encryption algorithms, key management, and secure communication protocols is essential.
  • Architects apply encryption to protect data at rest and in transit.
  • Architects collaborate with developers to build secure applications.
  • Staying informed about industry standards (e.g., ISO 27001, NIST, GDPR) and ensuring compliance is vital.
  • Architects align security practices with legal and regulatory requirements.
  • Proven track record putting together and delivering on the plan to improve security posture.
  • Ability to strategically assess the cybersecurity landscape, including regulatory and compliance aspects, technological trends, and apply deep insights to anticipate future challenges and opportunities, to develop the long-term plan while driving initiatives to enhance the organization's cybersecurity.
  • Ability to strategically drive cybersecurity advisory initiatives, providing expert guidance and leadership in implementing solutions across different 'as-a-service' models, while proactively mitigating cybersecurity risks and fostering a culture of continuous improvement.
  • Effective communication skills are essential. Architects collaborate with stakeholders, management, and technical teams.
  • Leadership qualities help drive security initiatives and influence decision-making.
  • Ability to analyze complex security challenges, devise solutions and adapt to evolving threats.
  • Ability to formulate plans that are practical and executable.
  • Must be goal oriented and outcome driven.
  • Increase in cybersecurity risk and the listing of companies require higher level of maturity and adherence to standards. Malaysia is also passing the cybersecurity bill.

About You

  • Bachelor's degree in Computer Science, Information Technology, or related field. Preferable cybersecurity certifications include CISM or CISSP, or equivalent.
  • More than 5 years of experience in cybersecurity, specifically in architecture and leading large-scale projects or teams.
  • Proven track record in developing and executing plans to enhance security posture.
  • Knowledge of cloud security principles (e.g., AWS, Azure, Google Cloud) is essential as organizations adopt cloud services.
  • A solid understanding of network protocols, firewalls, intrusion detection/prevention systems (IDPS), and virtual private networks (VPNs) is crucial.
  • Familiarity with secure coding practices, common vulnerabilities (e.g., OWASP Top Ten), and the secure software development lifecycle (SDLC).
  • Strong technical abilities in frameworks, architectures, solutions & engineering, and managing R&D using TOGAF.
  • Experience in project planning and implementation across data centers, clouds, networks, and security domains.
  • Hands-on capabilities for maintaining technical systems and troubleshooting issues.
  • Understanding of governance and risk management frameworks within Malaysian standards & best practices.

What’s Next ?
Once you have applied online, our team will review your application and due to a high volume of applications, only shortlisted candidates will be notified.