Position
Service Manager, Data Security Services
The Service Manager for Data Security Services manages the RUN team and the related activities to data and endpoint security. He/She is the main point of contact for the service provider and the internal clients in the bank. He/She manages the budget for the scope. He/She is also responsible for the transition of the new services from other regions to Singapore and manages the project/transition. The role is a techno-managerial role and will have to be involved in DLP policy/rule modifications as well. He/She works with continuous improvement principles. He/She is equivalent to the Subject Matter Expert on the technologies within data and endpoint security.
Data Security Services team in Singapore is responsible for day-to-day operational services on the infrastructure of Europe (mainly France, UK, and Russia) remotely from Singapore. France infrastructure represents approximately 90% of the worldwide production activities of CA-CIB.
Team works in Asia and Europe time zones and flexible rotational shift is based on the nature of duties.
The operational support of the team covers the following technical scope:
- Endpoint Security technologies – Anti-virus management, Host Intrusion Prevention System etc.
- Data Leak Prevention systems. - Email Prevent, Web Prevent, Endpoint Protect.
- Encryption Solutions: Disk Encryption, File and Folder encryption.
- Database Audit Monitoring solutions.
- Email and Web Phishing Prevention solutions.
- Vulnerability Management Services.
- Access Management.
Detailed Job Responsibilities
The Team Manager has a wide spectrum of responsibilities and actions.
As the manager of his/her team, he/she:
- Assigns the tasks and manages delegation.
- Sets and reviews the work organization according to activity’s requirements and people’s needs and validates the schedules.
- Animates the team to encourage collaboration and sharing of practices.
- Has a role in supporting people development.
- Participates to recruitment process for the team.
- Vendor relation management.
As the manager of his/her scope of activity, he/she:
- Meets stakeholders on a regular basis to discuss improvement plans, action plans, evolving threats and changing risks, and provide feedback on policies, standards, procedures, guidelines. ISS leads security for GIT and is the main entry point for internal clients outside of GIT (Business Lines, BCP, LGL, and Compliance for security topics).
- The service includes, but is not limited to, incident management (fault investigation, resolution escalations of all monitoring alerts and user initiated problem calls/tickets) and request management, but also global projects like End of Life, New Builds, migrations and upgrades etc., participation in global Infra events (like Power down and DR Tests).
- Ensures activity is performed in compliance with norms, standards, processes and procedures.
- Gathering required evidence using multiple forensic tools to investigate any data leak incident, conducting interrogation if required, case closure and reporting.
- Reporting and auditing.
- Monitors operational KPI and ensure tickets are losed within SLA.
- Ensures documentation is up to date and relevant for use.
- Implements cross-functions activities including continuous improvement initiatives.
- Estimates the yearly budget, sets monthly forecasts and follows up BAU/Project monthly balance.
As an experienced professional in Security domain, he/she:
- Supports his/her team or experts’ diagnosis when technical issues raise in his/her scope of expertise.
- Is aware of the global IT structure so that he/she anticipates interrelationships within the organization.
- Manage L0/L1/L2/L3 activities which involve direct relationships with end users and L3 activities (architecture, design, project management, etc.).
- Provide oversight to all Data Security activities to ensure adequate performance, efficiency, and availability.
- Engage with technical peer, Service managers, Architect and project teams on technology roadmap and projects, especially with GIT architecture security team.
- Ensures the IT Production activities regarding his/her perimeter are performed correctly by the team, complying with defined norms, standards, processes and procedures.
- Has to make sure that the defined KPI is met on a day-to-day basis for Incident, request, problem, change management etc.
- Has to monitor and push for improvements in the team’s productivity.
- Be available and able to drive/manage any complex or high severity incidents that occur within the scope of their role.
- Engage in Projects and project deliveries.
- Drive and deliver root cause for any high severity issues.
- Has to be responsible for providing direction, proactive and reactive support services to maintain the availability and reliability of systems infrastructure in accordance to the SLA.
- Is involved in security incident diagnosis or investigations to help provide evidence or facts during diagnosis or investigation.
- Manage requests from stakeholders on data security tools to provide extracts, reports or information when required.
As the first point of contact for the Service Provider, he/she:
- Manages the daily relationship with the Service Provider and escalates when needed.
- Follows up Provider KPI and related actions.
- Coach and develop partner resources to meet the objectives.
As the first point of contact for internal Clients, he/she:
- Manages the daily relationship with internal Clients including planning, requests clarification, risks mitigation and service quality.
- Prepares client feedback for the monthly review.
- Serve as point of escalation on major incidents.
- Have to maintain a smooth relation with partners, vendors and global clients/teams.
As a member of ISAP/ITS, he/she:
- Facilitates collaboration and spread of information from and to the team.
- Participates to the department’s activities including brainstorming, team building and other team or transversal actions.
- Fosters innovation mindset.
- Contributes to ISAP/ITS global branding and communication.
- Manage budget (once a year) and forecast (monthly)
- Focus on automation and optimum use of the team to improve efficiency.
- Maintain appropriate knowledge to ensure to be fully qualified to undertake the role.
- Complete all mandatory training as required to attain and maintain competence.
- Comply with all applicable legal, regulatory and internal Compliance requirements, including, but not limited to, the Singapore Compliance manual and Compliance policies and procedures as issued from time to time; Financial Security requirements, including, but not limited to, the prevention of Financial Crime and Fraud including reporting obligations to the Money Laundering Reporting Officer.
Work Schedule
v Work Timing is flexible and is scheduled to manage the operations within business hours of Asia and Emea timezone.
v Role may have to attend and lead any critical issues escalated outside of working hours, when operational needs.
Qualifications Requirements
Ø Minimum 12 years of IT Security experience and with 3-4 years of team management experience.
Ø Must be a bachelors/masters/engineering graduate or equivalent technical degree in Information Technology or Computer Science.
Ø Must have knowledge of different domains of IT Security.
Ø Must have managed a team size of 8 or more Security Specialists in an enterprise level environment;
Ø Must have prior hands-on experience in managing the IT Security Solutions.
Ø Must have experience in working in Production setup in Run (Operations) mode.
Ø Must have working experience in managing the endpoint and data security solutions for a Large enterprise level environment, working experience in financial organization is preferred.
Ø Ability to apply risk based approach while working on assigned responsibilities.
Ø Experience in defining, implementing, and enforcing enterprise-level IT security policies for endpoint and data security solutions.
Ø Excellent in analytical, communication and documentation skills.
Ø Ability to organize work and be able to priories work as per the needs of Production Operation’s needs.
Ø Must have strong understanding of ITIL processes and comfortable working in process oriented environment.
Ø Ability to work independently and as well as a part of team and is able to work under minimal supervision.
Ø Should have time management skills and able to manage work in fast moving environment.
Ø Should have hands-on technical exposure on wide spectrum of endpoint and data security technologies e.g. Symantec Data Loss Prevention (DLP), Symantec Endpoint Protection, Phishing Prevention and other IT Security technologies.
Ø Must have experience in defining, designing and configuring DLP Policies as per the business requirements.
Ø Professional Certifications:
- CISSP, CISM certified is highly preferred.
Interested applicants, please email your resume to Shaun Quek Yew Meng.
Email: shaunquek@recruitexpress.com.sg
CEI Reg No: R1660732
EA Licence No: 99C4599