Senior Executive - IT (Cyber Security IT - Perimeter Defense)

apartmentMalaysia Airports placeKuala Lumpur scheduleFull-time calendar_month 

Senior Executive - IT (Cyber Security IT - Perimeter Defense)

Apply now »

Apply for Job

Date: 18 Jun 2025
Location: Sepang, 10, MY, 64000

Company: Malaysia Airports Holdings Berhad

Job Description

POSITION GENERAL SUMMARY

Responsible for all perimeter defense covering web applicationand API protection (WAAP), Intrusion Prevention System (IPS), Trusted Access Control (TAC), Microsegmentation (MS), External Domain Name System (DNS) administration, management, configuration, testing, and integration tasks related to the system.

ESSENTIAL POSITION FUNCTIONS

Perimeter Defense Management
  • Manage the operation, optimization, and integration of security tools including Web Application and API b. Protection (WAAP), Intrusion Prevention System (IPS), Trusted Access Control (TAC), Microsegmentation (MS) and other defense technology adopted in the near future. Promptly act on alerts by examining potential security and data issues.
  • Oversee the administration, configuration, management, and security of the organization’s external Domain Name System (DNS), ensuring high availability, integrity, and protection from DNS-based attacks.
  • Continuously monitor the threat landscape and ensure that perimeter and endpoint defense tools are properly tuned, updated, and configured to detect and prevent evolving threats.
  • Integration, testing, and validation of defense technologies and controls across various platforms to ensure seamless operation, threat detection, and defense-in-depth effectiveness.
  • Ensure enforcement of technical security controls aligned with internal policies and regulatory frameworks such as NIST, ISO 27001, and local/global compliance requirements
  • Assist in initial investigation and triage of potential incidents/ operational issues and escalate or close events as applicable
  • Manage and maintain the security operations process, such as Change Management, Incident Management, Problem Management, etc. pertaining to the security system.
  • Identify potential vulnerabilities in system parameters and assess associated risks; develop and implement security strategies—such as input validation, parameterized queries, and other protective techniques—to safeguard against attacks; continuously monitor for threats and respond promptly to prevent damage.
Vendor Management
  • Manage third-party vendors and security products related to perimeter and endpoint defense, ensuring optimal performance through regular technical and service reviews.
  • Monitor vendor adherence to SLAs, KPIs, and quality expectations to ensure contractual compliance and maintain service excellence.
  • Ensure clear documentation, knowledge transfer, and operational transparency between outsourced service providers and internal security teams.
  • Facilitate joint tabletop exercises and incident simulations with vendors to evaluate their responsiveness and integration in incident response scenarios.
Team Development & Collaboration
  • Conduct structured knowledge-sharing sessions, internal workshops, and post-mortem reviews to promote continuous learning, retain organizational knowledge, and stay updated on the latest security trends.
  • Work closely with infrastructure, endpoint, and application teams to ensure seamless integration of security measures, optimize system performance, and maintain strong defenses; collaborate with cybersecurity units (e.g., Strategy, GRC) and external stakeholders to align with broader security strategies.
  • Participate in cybersecurity simulation exercises, incident response drills, threat hunting activities, and Red/Blue/Purple teaming efforts to enhance detection, response, and proactive defense capabilities.
  • Carry out responsibilities with due diligence and professional care, adhering to established standards and industry best practices.
Key Challenges
  • To ensure understanding and involvement from all level of management and employees
  • To get top management commitment in compliance activities
  • To get all staff and management to adhere to policies, procedures and internal control
  • Keeping up with constantly evolving threat landscape
Skills
  • Strong foundational knowledge in network protocols (TCP/IP, HTTP/S, DNS, etc.) and cybersecurity principles.
  • Experience in microsegmentation, Trusted Access Controls (TAC), Intrusion Prevention System (IPS), Secure DNS and Web Application & API Protection (WAAP).
  • Expertise in implementing and security architectures that integrate various security solutions (e.g., WAF, IPS, EDR) into an organization's overall infrastructure.
  • Experience in network/firewall configuration.
  • Knowledge in system, infrastructure and application architecture.
  • Expertise in Perimeter Defense Technologies
  • Familiar with Network Security Architecture
  • Ability to analyze logs and respond to real-time threats
  • Understanding of common attack vectors and TTPs (MITRE ATT&CK)
  • Leading perimeter-related incident response
  • Root cause analysis and threat containment

Education

External
  • Degree preferably with specialization in Information Technology, Computer Science, Cybersecurity or equivalent.

Certification / License Requirement:

  • Industry certification such as Certified Ethical Hacker (CEH), CompTIA Security+ and Certifications related to specific security technologies (e.g., WAF, IPS, EDR) are preferred.

Relevant Industries

External
  • Degree holder with minimum 3.0 CGPA with minimum of 3 years relevant experience.
Unique Requirement
  • Strong foundational knowledge in network protocols (TCP/IP, HTTP/S, DNS, etc.) and cybersecurity principles.
  • Experience in microsegmentation, Trusted Access Controls (TAC), Intrusion Prevention System (IPS), Secure DNS and Web Application & API Protection (WAAP).
  • Expertise in implementing and security architectures that integrate various security solutions (e.g., WAF, IPS, EDR) into an organization's overall infrastructure.
  • Experience in network/firewall configuration
  • Knowledge in system, infrastructure and application architecture.
  • Travelling, extra work (After office hour)

Additional Information

Open for Malaysian citizens only.

Please be reminded that only online applications will be entertained.

Applications should reach us by 25 June 2025.

Only the shortlisted candidate will be notified.

Job Segment: Network Security, Cyber Security, Compliance, Computer Science, Change Management, Security, Legal, Technology, Management

Apply now »

Apply for Job

apartmentTaylor's CollegeplaceKuala Lumpur
JOB PURPOSE  •  Reporting directly to the Experiential and Engagement Marketing Manager, Senior Executive assists in building Taylor’s brand to be the preferred choice of institution for tertiary education through strategic marketing activities...
thumb_up_altRecommended

Senior it executive

placeKuala Lumpur
job details  •  Job title : Senior IT Executive  •  Location : KL  •  Salary : RM7,000 - RM10,000  •  Employment : Permanent  •  Benefits :  •  High performance bonuses  •  High annual leaves  •  Medical outpatient and inpatient coverage for employees about...
apartmentRobert WaltersplaceKuala Lumpur
An exciting Senior Executive, Risk Reporting and Monitoring role has just become available at one of the top local banks based in Kuala Lumpur. What you'll do: Market Risk Reporting and Monitoring  •  Prepare periodic and ad-hoc reports related...