Jobiglo

No results.

Information Technology Security Engineer

Sedha Consulting · Singapour

New
🇬🇧 English
Security architecture Secure system design Threat modelling Vulnerability validation Agentic AI workflows Coding assistants SIEM platforms EDR tools Cloud-native security monitoring Incident response IAM role review

Job description

About the role

This role focuses on applying foundational security principles to real‑world engineering challenges within government systems. You will work closely with security and product teams to embed security controls, support threat modelling, and automate security processes.

Key responsibilities

  • Perform routine reporting, dashboarding and automation to improve security operational efficiency.
  • Review VAPT findings, validate vulnerabilities and contribute to remediation planning.
  • Maintain and refine incident‑response playbooks and support incident‑response activities.
  • Apply security standards across CI/CD pipelines, Kubernetes platforms and cloud environments.
  • Support alert triage, investigations and the development of detection rules, playbooks and runbooks.
  • Deliver proof‑of‑concepts or features that balance security, performance and maintainability.
  • Test emerging security tools in lab environments and summarise findings for POC initiatives.
  • Collaborate with peers and stakeholders, share knowledge and suggest process improvements.

Required profile

  • Foundational knowledge in security architecture, secure system design and threat modelling.
  • Ability to perform guided vulnerability validation and support remediation efforts.
  • Familiarity with securing CI/CD platforms, Kubernetes environments and cloud‑native services.
  • Experience with developer‑centric tools such as agentic AI workflows and coding assistants.
  • Knowledge of SIEM platforms, EDR tools and cloud‑native security monitoring.
  • Capability to contribute to detection logic and incident‑response playbooks.

Required skills

  • Security architecture
  • Secure system design
  • Threat modelling
  • Vulnerability validation
  • CI/CD platform security
  • Kubernetes security
  • Cloud environment security
  • Agentic AI workflows
  • Coding assistants
  • SIEM platforms
  • EDR tools
  • Cloud‑native security monitoring
  • Incident response
  • VAPT remediation
  • IAM role review

Questions fréquentes

Le salaire n'est pas communiqué publiquement par le recruteur. Vous pouvez postuler et négocier directement avec Sedha Consulting.
Cliquez sur "Postuler maintenant" en haut de la page. Vous pouvez importer votre CV en 1 clic — Jobiglo extrait automatiquement vos informations et postule pour vous.

Why are you reporting this job?

Thank you for your report. We will review this job.

Apply in 30 seconds

Enter your email to apply. An account will be created automatically.

By continuing, you accept our terms of use.

Already have an account? Login

Published 5 hours ago

Expires 1 month from now

2 views · 0 applications

Boost your chances

Upload your CV — we will match you with relevant openings.

Analyzing your CV...

Sedha Consulting

Singapour