About the job
Join Assurity Trusted Solutions (ATS), a proud subsidiary of the Government Technology Agency (GovTech), where we have been a trusted partner for over a decade. We provide a wide range of innovative products and services, including infrastructure and operational services, authentication services, governance and assurance services, and managed processes. In an ever-evolving digital landscape, we prioritize trust and collaboration, working alongside GovTech, government agencies, and commercial partners to effectively mitigate cyber risks and enhance security postures.
As a Cybersecurity Consultant, you will collaborate with application and infrastructure teams within a government agency to ensure business needs are satisfied, projects are delivered on time and within budget, and compliance is maintained within acceptable risk levels. You will also play a vital role in supporting security operations and incident management.
Key Responsibilities:
- Security Incident Management
- Assist with IT security incident management, responses, and reporting until resolution.
- Develop, review, and maintain operational SOPs and playbooks for IT security incident management.
- Coordinate with both internal and external teams to investigate and resolve IT security incidents.
- Document and submit IT security incident reports, including a timeline of events.
- Propose enhancements to prevent future IT security incidents.
- Security Operations & Reviews
- Monitor, review, and respond to security alerts and notifications promptly.
- Collaborate with teams to conduct comprehensive security reviews, assessments, tests, and remediations.
- Plan and schedule reviews, ensuring necessary information is provided by relevant teams.
- Support reviews with documented evidence and ensure timely submission to the agency's IT security team for closure.
- Security Audit & Vulnerability Assessment
- Assist in audit activities and security testing, including vulnerability assessments and penetration testing.
- Ensure all findings and remediations are addressed within stipulated timelines.
- Verify that system components are configured according to the agency’s security standards.
- Monthly Reporting and Vendor Management
- Generate comprehensive monthly reports and oversee vendor management processes.

