Apply now »
31 Jul 2025

Senior Officer, Information Security (40001098)

Category:  Technology Division
Job Type: 
Facility:  Technology

Job Purpose

The job holder is responsible for building, managing, participating in the development of one of the following areas:

a. IS Practice: Evaluate deployment, develop security solutions/Design, test information security/Ensure compliance with security standards (of Vietnam and International)
b. IS Administration: Manage and directly participate in administrative activities on identity and access security/network security/endpoint services and data security
c. IS Engieering: Manage and directly control the implementation of information security policies and standards for applications, infrastructure of Techcombank and its partners and suppliers, ensure compliance with the Bank's information security requirements.
d. IS Red team: Manage and directly perform testing attack activities for technology systems to detect vulnerabilities/weaknesses and provide solution guidance.
e. IS Monitoring: Monitor detecting all attack events/incidents as quickly as possible (realtime) based on events aggregated from security systems as well as other technology components.Then alert relevant departments to investigate and react to that event/incident.

Key Accountabilities (1)

1. Security Development

             •            Propose strategic and operational plans for secure system development.

             •            Research and design security solutions covering network, application, endpoint, and data security.

             •            Develop secure programming standards based on CWE/SANS Top 25, OWASP.

             •            Perform security risk modeling and source code reviews.

             •            Assess emerging vulnerabilities and implement proactive defenses.

             •            Collaborate with monitoring and incident response teams to address attack events.

2. Security Management

             •            Develop and maintain security governance frameworks, policies, and control matrices.

             •            Define and manage access controls and identity management systems (IAM, PAM).

             •            Administer and fine-tune security technologies: firewalls, endpoint protection, DLP, and more.

             •            Optimize configurations for networks, data, and terminal security tools.

             •            Ensure regulatory and internal compliance across systems.

Key Accountabilities (2)

3. Security Engineering

             •            Support strategic planning and execution of the bank’s information security roadmap.

             •            Advise on the design and implementation of cross-domain security solutions.

             •            Lead complex incident response operations and post-incident analysis.

             •            Conduct cybersecurity research to anticipate threats and inform architecture design.

             •            Provide technical mentorship and training to staff.

 

4. Security Testing

             •            Plan and conduct vulnerability assessments and penetration tests.

             •            Develop and automate attack scenarios using international standards (e.g., OWASP, OSSTMM, SANS).

             •            Evaluate both technical and non-technical (human, process, physical) vulnerabilities.

             •            Coordinate red team activities and collaborate on incident simulation drills.

             •            Analyze findings and report risks to CISO and other stakeholders.

             •            Maintain threat intelligence and vulnerability management databases.

Key Accountabilities (3)

5. Security Monitoring

             •            Design and manage centralized log collection and SIEM systems.

             •            Monitor and detect security breaches in real-time across all tech environments.

             •            Create detection rules, alert logic, and response playbooks.

             •            Investigate root causes of incidents and ensure lessons learned are integrated into defenses.

             •            Automate workflows for incident response and maintain threat monitoring tools.

             •            Keep internal teams informed of relevant global threat intelligence.

 

Other Responsibilities

             •            Support cross-functional tech projects.

             •            Conduct training and mentoring programs to build internal capabilities.

             •            Assist in career development planning within the security function.

             •            Perform other tasks as assigned by management.

Key Relationships - Direct Manager

Director, Information Security

Key Relationships - Direct Reports

No

Key Relationships - Internal Stakeholders

Departments in the divisions

Key Relationships - External Stakeholders

Information security solutions/services companies, quick incident response organizations…etc.

Success Profile - Qualification and Experiences

Qualification:
- Graduated in IT, Computer Science, or Telecommunications
- Foreign language: English: Level 1 – TOEIC under 550
- Certificates in information security, such as OSCP, PCI DSS assessment implementation certificate, and ISO
- Having ISC2 SSCP security certificates is an advantage
- Having certificates of companies providing security solutions such as Microsoft/Cisco/PaloAlto/Checkpoint/Cyberark/Sailpoint…”
- Having certificates in information security such as - SANS SEC660, SEC760, SANS SEC642, SANS SEC575, OSCE, OSCP
Experience:
- Experience in performing security testing in financial / service/telecommunications organizations for 5 years. The experience includes the following aspects:
+ Research, design, implement, and evaluate Information security for systems and applications
+ Implement PCI-DSS, ISO, Swift CSP... Participate in the development and control of compliance with security standards for IT systems
- Experience in performing security testing in financial / service/telecommunications organizations. The experience includes the following aspects:
+ Experience in researching security holes, developing attack techniques/tools, performing attack testing of technology systems by technical and non-technical measures.
- Having experience in implementing, managing, and operating in-depth in terms of policies, a set of rules, and configuration of information security at least one of the following areas at financial/service/telecommunications organizations (5 years):
- Security solutions for access identity management (PAM, IAM...);
- Network security solutions (Firewall, NAC, APT, NetIPS, DDOS...);
- Security solutions for terminals (AD GPO, HIPS/HFW, Appcontrol, Web/mail filtering, DB security...);
- Data security solutions (DLP, FAM...).
- Experience in information security assessment according to the Agile method"

Apply now »