Mô Tả Công Việc
The job holder is responsible for building, managing, participating in the development of one of the followingareas:a. IS Practice: Evaluate deployment, develop security solutions/Design, test information security/Ensurecompliance with security standards (of Vietnam and International)b. IS Administration: Manage and directly participate in administrative activities on identity and accesssecurity/network security/endpoint services and data securityc. IS Engieering: Manage and directly control the implementation of information security policies and standards forapplications, infrastructure of Techcombank and its partners and suppliers, ensure compliance with the Business'sinformation security requirements.d. IS Red team: Manage and directly perform testing attack activities for technology systems to detectvulnerabilities/weaknesses and provide solution guidance.e. IS Monitoring: Monitor detecting all attack events/incidents as quickly as possible (realtime) based on eventsaggregated from security systems as well as other technology components.Then alert relevant departments toinvestigate and react to that event/incident.1. Information Security Assurance- Participate in projects, developing and deploying technology to ensure Information Security for systems to bebuilt, including stages: analysis, building requirements Information security, design Information security, threatmodeling, source code review, testing and building controls to ensure Information Security.- Research and develop necessary information security solutions to prevent attacks and incidents Informationsecurity, ensure security and safety for the entire information system of the Business.- Coordinate with the Information Security supervisory department in handling information security incidents.- Set up and monitor the implementation of TCB's information security process, regulations, standards, guidelinesand policies in accordance with the regulations of the government and international organizations- Implement and maintain compliance with international standards PCI-DSS, ISO, SWIFT CSP.- Implement and maintain compliance with TCB's policies, circulars and regulations of the State Bank.- Regularly perform compliance and integrity checksof the security policy configuration in the internal system TCB detects violations or insider attacks.- Coordinate with Compliance Assessment and Risk Management units to assess the compliance of technologysystems according to policies, regulations, standards, processes, checklists.2. Information Security Red team:- Implement the strategy to ensure information security:+ Participate in the implementation of the Information Security strategy by providing input data on attack trends,forms of exploitation and risks arising in each period.+ Participate in the implementation of the annual information security implementation plan, meet the business andoperational needs of the bank through the implementation of information security testing programs for thetechnology activities of the Business.+ Develop penetration testing methods, information security scanning scripts and security checks according tointernational standards such as OSSTMM, Sans and OWASP.+ Develop new techniques, exploit scripts and programs for automated penetration testing- Perform test attack activities:+ Directly perform vulnerability detection review, vulnerability assessment, and conduct penetration/exploit testingperiodically or at the request of the Block leader for all systems/applications ; Penetration testing forsystem/application after live detection or whenever undergoing a major change. Testing methods must ensurepracticality including both technical (technology) and non-technical (people, processes, physical assets). Fromthere, provide CISO as well as other Information Security departments to have programs to deal with the problemsof system weaknesses that can be exploited.8/11/25, 3:40 PM Job Description Print Previewhttps://hcm44.sapsf.com/xi/ui/rcmcommon/pages/jobReqPrintPreview.xhtml?drawButtons=true&jobID=42179&isExternal=true&jobReqPreviewSecKey… 1/3+ Perform regular vulnerability scans, information security checks to find vulnerabilities in the system and provideremedial / remedial solutions; supports maintaining compliance with world security standards such as PCI-DSS,ISO27001, SCP (swift).+ Develop and manage vulnerability management program, threat intelligence database. Collect, track metrics,and analyze trends on cyber defenses, threats, detected attacks, vulnerabilities, andcountermeasures/preventions.+ Actively research / find new vulnerabilities, exploitation techniques and cyber threats; Identify trends incybersecurity involving tactics, techniques, and processes, targeting for malware development and deployment.+ Directly participate in the experimental plan of responding to an Information Security incident as an attack unitand in the case of an actual Information Security incident as the response team. Coordinate and provide expertcyber defense engineering skills to resolve cyber attack incidents3. Information Security Administration- Building/adjusting and implementing MTPQ of systems.- Develop requirements and measures to control access and protect the Business's data.- Develop, maintain and optimize information security policy/rule/configuration for solutions to ensure informationsecurity such as: Information security solutions on access identity management (PAM, IAM…); Network informationsecurity solutions (Firewall, NAC, APT, NetIPS, DDOS...); Information Security solutions on endpoints (AD GPO,HIPS/HFW, Appcontrol, Web/mail filtering, DB security…); Information security solutions on data (DLP, FAM...).- Assess, evaluate, review:+ Decentralization enforcement ensures compliance with the decentralized matrix.+ The issue and withdrawal of privileged accounts and digital certificates on technology systems.+ Exception requirements related to identity, access rights on technology systems+ Change requirements on information security assurance solutions.- Risk management and compliance+ Identify risks of the department in the process of operation, ensuring compliance with the processes andregulations of the Business. Coordinate with relevant units to handle risks.+ Perform risk treatment activities according to reports of internal/external audit departments.
Xem toàn bộ Mô Tả Công Việc
Yêu Cầu Công Việc
Qualification:- Graduated in IT, Computer Science or Telecommunications- Foreign language: English: Level 1 – TOEIC under 550- Certificates in information security such as OSCP, PCI DSS assessment implementation certificate, ISO- Having ISC2 SSCP security certificates is an advantage- Having certificates of companies providing security solutions such asMicrosoft/Cisco/PaloAlto/Checkpoint/Cyberark/Sailpoint…”- Having certificates in information security such as - SANS SEC660, SEC760, SANS SEC642, SANS SEC575,OSCE, OSCPExperience:- Experience in performing security testing in financial / service / telecommunications organizations from 5 years.The experience includes the following aspects:+ Research, design, implement and evaluate Information security for systems and applications+ Implement PCI-DSS, ISO, Swift CSP... Participate in the development and control of compliance with securitystandards for IT systems- Experience in performing security testing in financial / service / telecommunications organizations. Theexperience includes the following aspects:+ Experience in researching security holes, developing attack techniques/tools, performing attack testing oftechnology systems by technical and non-technical measures)- Having experience in implementing, managing, and operating in-depth in terms of policies, set of rules,configuration of information security at least one of the following areas atfinancial/service/telecommunicationsorganizations (5 years):- Security solutions for access identity management (PAM, IAM...);- Network security solutions (Firewall, NAC, APT, NetIPS, DDOS...);- Security solutions for terminals (AD GPO, HIPS/HFW, Appcontrol, Web/mail filtering, DB security...);- Data security solutions (DLP, FAM...).- Experience in information security assessment according to Agile method
Xem toàn bộ Yêu Cầu Công Việc
Hình thức
Full-time
Mức lương
Thỏa thuận
Báo cáo tin tuyển dụng: Nếu bạn thấy rằng tin tuyển dụng này không đúng hoặc có dấu hiệu lừa đảo,
hãy phản ánh với chúng tôi.
Tham khảo: 10 Dấu hiệu nhận biết hành vi lừa đảo qua tin tuyển dụng.
Tham khảo: 10 Dấu hiệu nhận biết hành vi lừa đảo qua tin tuyển dụng.