Back to job search

Deputy Executive Manager, Information Security - SOC

  • Location:

    Hong Kong

  • Sector:


  • Job type:


  • Salary:


  • Contact:

    Marno Meyer

  • Contact email:

  • Job ref:


  • Published:

    10 months ago

  • Expiry date:


Great opportunity and senior position for a very strong SOC candidate working in a very strong cyber security team with a good budget and exciting projects. Candidate will have to be proficient in English, Chinese and Cantonese. As well as have a strong technical and hands on background in enterprise security infrastructure and SOC.

Job duties:

  • Maintain the operational effectiveness of the services offered by the Company's Cyber Defence Platform and advise on changes affecting the Company's cybersecurity posture
  • Lead and develop the capabilities of the Company's information security analysts to ensure the Cyber Defence Platform is adequately staffed and fit for purpose, within the approved budget and timeline
  • Manage IT Security's response to breaches an assist with containing any adverse situations
  • Develop and maintain and cybersecurity investigation capacity in order to understand and reduce the recurrence of similar incidents
  • Produce monthly reports on Key Risk Indicators (KRIs) within the available monitoring capability relating to the Company's Cyber Defences and work with the Executive Manager for Cyber Operations and Defence to prioritise improvements in the Club's Cyber Defence posture.
  • Maintain and good understanding new cyber defence technology and work with the Executive Manager for Cyber Operations and Defence to determine how it can integrated into the Cyber Defence Platform
  • Evaluate the security properties new technologies to ensure they are technically viable within the Club's business operations environment
  • Participate and contribute positively to create a diverse and inclusive culture with trust and respect. Play an active role to support cross team/division/department efforts and model collaborative behaviours


  • A university degree with strong technical background, particularly in Information Technology, security, application development and/or networking
  • At least 10 to 15 years of work experience in technical IT roles, with at least 5 years' hands-on experience in enterprise security infrastructure and security operations centres.
  • Experience managing the necessary resources, including leadership support and key security personnel, to support the goals and objectives of a cyber defence capability
  • Experience with vulnerability assessments - scanning the environment, generating reports and engaging with system owners and stakeholders to make certain that any observed vulnerabilities or security concerns are addressed/remediated.
  • Experience with collecting and maintaining data needed to meet system cybersecurity reporting requirements
  • Proficient in English, Chinese and Cantonese, in both spoken and written. Working knowledge in Putonghua will have an advantage
  • Strong writing, communication and presentation skills
  • Well organised and is able closely follow up per check point on implementation time line
  • Ability to work in cross teams
  • Experience performing analysis with Security Data Analytic technology such as SIEM, UEBA, ELK, SOAR
  • Ability to determine how security systems should work and how changes in conditions, operations, or the environment will affect these outcomes.
  • Ability to evaluate the trustworthiness of the supplier and/or product.
  • Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
  • Ability to integrate information security capability into the transition to operations process; using applicable controls defined by security architecture and risk process
  • Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
  • Able to implement and manage vulnerabilities scanning regimes on different network segment.
  • Able to identify gaps/weaknesses in SOC monitoring capability by mapping detection rules, e.g. SIEM use cases, Carbon Black watch lists, Darktrace models, AD monitoring and Firewall policy
  • Knowledge of incident response methodologies, security issues, vulnerabilities, exploits and security standards that may impact information security
  • Hands-on experiences to PC endpoint whitelisting, Web Isolation and/or MSS handling would be advantageous
  • Strong understanding of networking protocols, operating systems and cyber security concepts and technologies

Banner Default Image

We are Oliver James

We received an average rating of 9.1 from feedback by our clients and candidates.