Senior IT Security (Techcom Life)
Mô tả công việc
Job Purpose
The job holder is responsible for building, managing, participating in the development of one of the following areas:
IS Practice: Evaluate deployment, develop security solutions/Design, test information security/Ensure compliance with security standards (of Vietnam and International)
IS Red team: Manage and directly perform testing attack activities for technology systems to detect vulnerabilities/weaknesses and provide solution guidance.
IS Administration: Manage and directly participate in administrative activities on identity and access security/network security/endpoint services and data security
IS Engieering: Manage and directly control the implementation of information security policies and standards for applications, infrastructure of Techcombank and its partners and suppliers, ensure compliance with the Business&039;s information security requirements.
IS Monitoring: Monitor detecting all attack events/incidents as quickly as possible (realtime) based on events aggregated from security systems as well as other technology components.Then alert relevant departments to investigate and react to that event/incident.
Key Accountabilities (1)
Information Security Assurance
- Set up and monitor the implementation of TCB&039;s information security process, regulations, standards, guidelines and policies in accordance with the regulations of the government and international organizations
- Regularly perform compliance and integrity checks
- Participate in projects, developing and deploying technology to ensure Information Security for systems to be built, including stages: analysis, building requirements Information security, design Information security, threat modeling, source code review, testing and building controls to ensure Information Security.
- Coordinate with the Information Security supervisory department in handling information security incidents.
- Implement and maintain compliance with international standards PCI- DSS, ISO, SWIFT CSP.
- Implement and maintain compliance with TCB&039;s policies, circulars and regulations of the State Bank.
- Research and develop necessary information security solutions to prevent attacks and incidents Information security, ensure security and safety for the entire information system of the Business.
f the security policy configuration in the internal system TCB detects violations or insider attacks.
- Coordinate with Compliance Assessment and Risk Management units to assess the compliance of technology systems according to policies, regulations, standards, processes, checklists.
Key Accountabilities (2)
Information Security Red team:
- Implement the strategy to ensure information security:
+ Develop new techniques, exploit scripts and programs for automated penetration testing
+ Develop penetration testing methods, information security scanning scripts and security checks according to international standards such as OSSTMM, Sans and OWASP.
+ Participate in the implementation of the annual information security implementation plan, meet the business and operational needs of the bank through the implementation of information security testing programs for the technology activities of the Business.
+ Participate in the implementation of the Information Security strategy by providing input data on attack trends, forms of exploitation and risks arising in each period.
- Perform test attack activities:
+ Directly perform vulnerability detection review, vulnerability assessment, and conduct penetration/exploit testing periodically or at the request of the Block leader for all systems/applications ; Penetration testing for system/application after live detection or whenever undergoing a major change. Testing methods must ensure practicality including both technical (technology) and non- technical (people, processes, physical assets). From there, provide CISO as well as other Information Security departments to have programs to deal with the problems of system weaknesses that can be exploited.
+ Perform regular vulnerability scans, information security checks to find vulnerabilities in the system and provide remedial / remedial solutions; supports maintaining compliance with world security standards such as PCI- DSS, ISO27001, SCP (swift).
+ Directly participate in the experimental plan of responding to an Information Security incident as an attack unit and in the case of an actual Information Security incident as the response team. Coordinate and provide expert cyber defense engineering skills to resolve cyber attack incidents
+ Actively research / find new vulnerabilities, exploitation techniques and cyber threats; Identify trends in cybersecurity involving tactics, techniques, and processes, targeting for malware development and deployment.
+ Develop and manage vulnerability management program, threat intelligence database. Collect, track metrics, and analyze trends on cyber defenses, threats, detected attacks, vulnerabilities, and countermeasures/preventions.
Key Accountabilities (3)
Information Security Administration
- Building/adjusting and implementing MTPQ of systems.
- Develop, maintain and optimize information security policy/rule/configuration for solutions to ensure information security such as: Information security solutions on access identity management (PAM, IAM…); Network information security solutions (Firewall, NAC, APT, NetIPS, DDOS...); Information Security solutions on endpoints (AD GPO, HIPS/HFW, Appcontrol, Web/mail filtering, DB security…); Information security solutions on data (DLP, FAM...).
- Develop requirements and measures to control access and protect the Business&039;s data.
- Assess, evaluate, review:
+ The issue and withdrawal of privileged accounts and digital certificates on technology systems.
+ Decentralization enforcement ensures compliance with the decentralized matrix.
+ Change requirements on information security assurance solutions.
+ Exception requirements related to identity, access rights on technology systems
- Risk management and compliance
+ Perform risk treatment activities according to reports of internal/external audit departments.
+ Identify risks of the department in the process of operation, ensuring compliance with the processes and regulations of the Business. Coordinate with relevant units to handle risks.
Yêu cầu công việc
Success Profile- Qualification and Experiences
Qualification:
- Having ISC2 SSCP security certificates is an advantage
- Having certificates in information security such as- SANS SEC660, SEC760, SANS SEC642, SANS SEC575, OSCE, OSCP
- Certificates in information security such as OSCP, PCI DSS assessment implementation certificate, ISO
- Graduated in IT, Computer Science or Telecommunications
- Foreign language: English: Level 1 – TOEIC under 550
- Having certificates of companies providing security solutions such as Microsoft/Cisco/PaloAlto/Checkpoint/Cyberark/Sailpoint…”
Experience:
- Experience in performing security testing in financial / service / telecommunications organizations from 5 years. The experience includes the following aspects:
+ Implement PCI- DSS, ISO, Swift CSP... Participate in the development and control of compliance with security standards for IT systems
+ Research, design, implement and evaluate Information security for systems and applications
- Experience in performing security testing in financial / service / telecommunications organizations. The experience includes the following aspects:
+ Experience in researching security holes, developing attack techniques/tools, performing attack testing of technology systems by technical and non- technical measures)
- Having experience in implementing, managing, and operating in- depth in terms of policies, set of rules, configuration of information security at least one of the following areas at financial/service/telecommunications organizations (5 years):
- Network security solutions (Firewall, NAC, APT, NetIPS, DDOS...);
- Experience in information security assessment according to Agile method"
- Security solutions for terminals (AD GPO, HIPS/HFW, Appcontrol, Web/mail filtering, DB security...);
- Security solutions for access identity management (PAM, IAM...);
- Data security solutions (DLP, FAM...).
Quyền lợi
Chế độ bảo hiểm, Du Lịch, Đồng phục, Chế độ thưởng, Chăm sóc sức khỏe, Đào tạo, Tăng lương
Cập nhật gần nhất lúc: 2026-01-24 16:50:03











