Apply now

Apply for Job

Cybersecurity Operations Specialist

Date:  4 Jun 2024

Kuala Lumpur

Company:  StarHub Ltd

Job Description

The role is responsible to design, develop and implement secured system architecture. The design for secured system architecture will embed with security principles to protect StarHub's infrastructures and information assets from cyber threats that are constantly evolving.   

This role will be working with a team of cyber security enthusiasts to safeguard our systems against cyber-attacks and threats.  The candidate requires technical knowledge and experience in implementing and supporting enterprise Identity Access Management (IAM), Identity Governance and Administration (IGA) and Privileged Access Management (PAM) platforms and systems.  

1. Develop architecture requirements and maintain oversight 

  • Strong understanding of Identity & Access Management (IAM) and Identity Governance and Administration (IGA) User Lifecycle Processes including User Activity Monitoring, Access Re-Certification, SOD, Reporting etc. and SSO, MFA. 
  • Design security controls and systems in alignment with security guidelines 
  • Assist in the testing and evaluation of new security technologies and controls 
  • Recommend security products, services and procedures to enhance system architecture designs 
  • Document the design, operation, use, and expected outputs of new systems  
  • Conduct research on modern security software architectures and network architecture design best practices 
  • Drive continuous process improvement for the security services 

2. Implement security systems     

  • Hands-on experience on implementing, and deploying IAM, IGA and PAM solutions in an enterprise environment (e.g., SailPoint, ForgeRock, Okta etc.) 
  • Ability to on-board third party and cloud applications using various federation protocols using the IAM platform as well as outside of the IAM platform. 
  • Ability to Implement/Customize IAM Workflows, Forms, Rules and Provisioning 
  • Implemented IGA solution to streamline Identity Lifecycle Management, Access Request, SOD, Certification, Governance and Reporting 
  • Establish access governance across the organization systems and across the identity personas. 
  • Implement new enterprise security architecture, technologies and enhancements  
  • Identify techniques to scale up and automate security infrastructure and processes 
  • Resolve issues that arise in implementation of new security systems 
  • Monitor security systems for strengths and weaknesses and propose improvements to address weaknesses 

3. Manage security systems      

  • Ability to drive identity management strategically across the enterprise as a critical security pillar aligning where possible with IAM standard practices. 
  • Identify data and process improvement ideas; contribute to the transformation of the Identity Access Governance function. 
  • Managing joiner, mover, leaver (JML) process and provide access to business applications and enterprise resource. 
  • Maintain security governance and policies for business, groups, products & security access types ensuring we can pass audit reviews. 
  • Responsible for the maintenance of security systems, platforms and associated software 
  • Develop and implement custom disaster recovery drills and simulation tests on existing systems 
  • Monitors, tracks and manages service faults till resolution and change requests. 
  • Manages lifecycle of security solutions, ensuring that the solution is up-to-date and relevant to changing business needs and security landscape 
  • Provide oversight and drive quality assurance over third party service providers 


Bachelor’s degree in computer science or related field with 6-10 years’ experience in the domain of IAM/IGA/PAM. 

Ideally, you have completed or are about to complete a Security certification (e.g. CISSP, CISM) 

To APPLY NOW, click on Skye!

Apply now

Apply for Job