Job Openings Cyber Defence Lead

About the job Cyber Defence Lead

A licensed virtual bank in Hong Kong

Location

Hong Kong

Report to

Chief Information Security Officer

Job Summary

  • Improve cyber defence capability.
  • Improve security monitoring capability.
  • Improve security incident response capability.

Responsibilities

Anomalies activity and cyber incident detection

  • Manage the anomalies activity detecting process.
  • Assess the monitoring needs and define the monitoring scope and approach.
  • Work closely with Security Operation Center to ensure that the monitoring process are effective.
  • Oversight and monitor on the activities performed by the Security Operation Center.
  • Monitor security events reported to ensure that all events are properly handled.
  • Response to security events escalated from the Security Operation Center and work with the relevant parties to investigate and response when needed.
  • Develop relevant information security metrics to monitor the banks information security posture and translate it into meaningful insights for the senior management.

Cyber incident response and management

  • Manage security incident and develop response plan and playbooks for various attacks and security events.
  • Oversight and monitor security incidents to ensure that all incidents identified are managed according to the incident management procedure and response plans.
  • Ensure escalation and reporting process are in place and followed.
  • Perform analysis to assess incident impact and determine whether the involvement of external investigators or forensic analysis are required to support incident investigation.
  • Work with external investigators on forensic analysis during cyber and information security incidents.
  • Drive the banks regular incident response drills exercise in responding to cyber and information security incidents.

Threat monitoring and analysis

  • Monitor threat intelligence from various sources to discover emerging cyber threats affecting the bank and customers.
  • Perform threat analysis and to identify potential security controls or remediation and other security improvement in response to the threats.
  • Perform threat hunting, leveraging available indicators of compromise, to identify potential threats that are lurking undetected.
  • Threat intelligence sharing and to collaborate with 3rd parties and industry peers.
  • Manage the threat and vulnerability management program.

Requirements

  • At least 7 years of experience in information & cyber security from either the banking and finance industry or security consulting with primary focus on Incident Response or Intrusion Detection.
  • Solid understanding of incident response, threat modeling and common attack vectors, adversary tactics, techniques & procedure, MITRE ATT&CK framework.
  • Hands on experience in using Splunk Enterprise Security, analyzing security log & network traffic, identifying, and investigating security incidents.
  • Prior experience in malware analysis, virus exploitation and mitigation techniques, and digital forensic.
  • Understanding of network, desktop and server technologies, network intrusion methods, network containment, segregation techniques, IDS and IPS.
  • Degree holder major in Computer Science or related field.
  • Relevant certification in information security (e.g., CISSP, CISA or CISM etc.)