Cyber Security Manager (Intelligence-Led)
Opening Code : 1505/MH57
Posted on 15 May 2025
$70,000 – $85,000 per month
Job Highlights
- Competitive salary and performance-based bonuses
- Comprehensive health and wellness benefits
- Stable enterprise with good prospect
Job Description
Key Responsibilities
- Threat Intelligence Gathering: Collect data from internal and external sources to identify emerging threats; Utilize threat feeds, reports, and OSINT to stay informed about the threat landscape.
- Analysis and Investigation: Perform investigations to uncover indicators of compromise (IoCs) and indicators of attack (IoAs).
- Threat Hunting: Actively search for vulnerabilities and threats within the organization’s environment
- Incident Response Planning: Develop and implement incident response plans based on intelligence findings; Prepare teams to respond efficiently to incidents, minimizing damage and recovery time.
- Monitoring and Detection: Continuously monitor security indicators and system anomalies; Ensure that security operations centers (SOCs) are equipped to detect and respond to threats in real time.
- Collaboration: Work with internal teams and external partners (e.g., law enforcement, security vendors) to share intelligence and improve response strategies; Foster relationships that enhance information sharing and collaboration on security initiatives.
- Vulnerability Management: Integrate threat intelligence into the vulnerability management process; Prioritize vulnerabilities based on the potential impact of threats.
- Compliance and Risk Management: Ensure adherence to regulatory requirements and industry standards; Identify risks and implement controls to reduce exposure and maintain stakeholder trust.
Qualifications:
- Bachelor’s degree in Computer Science, Information Technology, or a related field.
- At least 5 years in cybersecurity, with 1 year in operations focused on Intelligence-Led Security Operations.
- Familiarity with frameworks like MITRE ATT&CK, Lockheed Martin Cyber Kill Chain, and Cybersecurity Framework (CSF).
- Proven experience in incident response and forensic analysis, with knowledge of tools like OSINT.
- Hands-on experience with vulnerability scanning and assessment methodologies.
- Relevant certifications (e.g., CISSP, CISM, CISA) are preferred.
- Strong analytical and problem-solving skills with attention to detail.
- Good Command in both written and spoken English and Cantonese.