Section Head, Cybersecurity Architecture
Apply on
Life at U Mobile
We are Passionate, Innovative, Trustworthy, Team-Oriented & Fun-Loving.
At U Mobile, we are always on the lookout for great talents and passionate individuals to join our growing team.
Let’s start your journey with an award-winning organization! #UnlimitingYourPotential
Top Reasons To Join Us
• Awarded as the Most Preferred Graduate Employers (2022& 2023) & Gold Winner for Excellence in Workplace Culture (2021)
• Comprehensive medical, dental, optical and insurance benefits
• Flexi working hours arrangements
• Staff Line & Device Subsidy
• Smart Casual Attire
• Child Parental Care Leave
• Convenient location with access to public transport (Imbi Monorail/Bukit Bintang MRT)
• Special employee discounts for selected F&B Brands
The Day-To-Day Activities
- Security architects must assess risks associated with various systems and applications. This involves understanding potential threats, vulnerabilities, and their impact on the organization.
- They develop risk management strategies, balancing security needs with business requirements.
- Proficiency in designing robust security architectures is essential. This includes creating blueprints for secure systems, networks, and applications.
- Architects must consider factors like scalability, performance, and compliance while designing security solutions.
- Security architects design and implement network security measures to protect data in transit.
- Architects must secure cloud environments, configure access controls, and address shared responsibility models.
- IAM ensures authorized users have appropriate access while preventing unauthorized access.
- Security architects design IAM solutions, including single sign-on (SSO), multi-factor authentication (MFA), and role-based access control (RBAC).
- Understanding encryption algorithms, key management, and secure communication protocols is essential.
- Architects apply encryption to protect data at rest and in transit.
- Architects collaborate with developers to build secure applications.
- Staying informed about industry standards (e.g., ISO 27001, NIST, GDPR) and ensuring compliance is vital.
- Architects align security practices with legal and regulatory requirements.
- Proven track record putting together and delivering on the plan to improve security posture.
- Ability to strategically assess the cybersecurity landscape, including regulatory and compliance aspects, technological trends, and apply deep insights to anticipate future challenges and opportunities, to develop the long-term plan while driving initiatives to enhance the organization's cybersecurity.
- Ability to strategically drive cybersecurity advisory initiatives, providing expert guidance and leadership in implementing solutions across different 'as-a-service' models, while proactively mitigating cybersecurity risks and fostering a culture of continuous improvement.
- Effective communication skills are essential. Architects collaborate with stakeholders, management, and technical teams.
- Leadership qualities help drive security initiatives and influence decision-making.
- Ability to analyze complex security challenges, devise solutions and adapt to evolving threats.
- Ability to formulate plans that are practical and executable.
- Must be goal oriented and outcome driven.
- Increase in cybersecurity risk and the listing of companies require higher level of maturity and adherence to standards. Malaysia is also passing the cybersecurity bill.
About You
- Bachelor's degree in Computer Science, Information Technology, or related field. Preferable cybersecurity certifications include CISM or CISSP, or equivalent.
- More than 5 years of experience in cybersecurity, specifically in architecture and leading large-scale projects or teams.
- Proven track record in developing and executing plans to enhance security posture.
- Knowledge of cloud security principles (e.g., AWS, Azure, Google Cloud) is essential as organizations adopt cloud services.
- A solid understanding of network protocols, firewalls, intrusion detection/prevention systems (IDPS), and virtual private networks (VPNs) is crucial.
- Familiarity with secure coding practices, common vulnerabilities (e.g., OWASP Top Ten), and the secure software development lifecycle (SDLC).
- Strong technical abilities in frameworks, architectures, solutions & engineering, and managing R&D using TOGAF.
- Experience in project planning and implementation across data centers, clouds, networks, and security domains.
- Hands-on capabilities for maintaining technical systems and troubleshooting issues.
- Understanding of governance and risk management frameworks within Malaysian standards & best practices.
What’s Next ?
Once you have applied online, our team will review your application and due to a high volume of applications, only shortlisted candidates will be notified.