Senior Manager| Threat Management – Singapore Regional Office


Job Number 20030623
Job Category Information Technology
Location Singapore Regional Office| 2 Harbourfront Place #06-08|
Singapore| Singapore| Singapore
Brand Corporate
Schedule Full-time
Relocation? No
Position Type Management

Start Your Journey With Us
Marriott International is the world’s largest hotel company| with more brands|
more hotels and more opportunities for associates to grow and succeed. We
believe a great career is a journey of discovery and exploration. So| we ask|
where will your journey take you?


As part of our new Cyber Fusion Center located in Singapore| assesses threats
and vulnerabilities| responds to immediate and potential threats| supports
investigation and analysis of cyber events. Works with Security Operations
Center resources to proactively identify threats and vulnerabilities| develop
mitigation plans to address potential threats| and respond to immediate
threats. Reports to the Director| Threat Management in the US and work closely
with the Cyber Incident Response and Security Operations Teams (US| Asia|


Education and Experience


Bachelor’s degree in Computer Sciences or related field or equivalent experience/certification

7+ years of information technology leadership experience

4+ years’ information security experience including implementing| managing or governing security technologies| including encryption| network security| intrusion detection and/or digital forensics


Current information security certification| including Certified Information Security Manager (CISM)| Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP)

Technical leadership experience in a sourced environment

Project management skills

Excellent communication skills and problem solving ability

Demonstrated ability to work independently and with others

Ability to manage the details and compliance with standards and expectations

Technical infrastructure operations| administration| or engineering background


Threat Management & Response

Manages and administers processes and tools that enable the organization to identify| document| and access intellectual capital and information content (e.g.| policies| standards| processes and procedures).

Utilize the corporate Endpoint Detection and Response tool and SIEM to identify anomalous activity and potential threats to the enterprise infrastructure.

Perform analysis of adversary tradecraft| malicious code| and capabilities for hunt pivoting purposes.

Assist with internal investigations as a technical resource for forensic artifact collection and forensic disk analysis.

Manage the analysis of intrusion artifacts to determine potential specific adversary and motives.

Uses defensive measures and information collected from a variety of sources to identify| analyze| and report events that occur or might occur within the network in order to protect information| information systems| and networks from threats. Identifies remediation activities and oversees efforts to implement them

Responds to crisis or urgent situations within the pertinent domain to mitigate immediate and potential threats and comply with relevant data breach laws. Uses mitigation| preparedness| and response and recovery approaches| as needed| to maximize safety and security of systems| preservation of intellectual property| and information security. Investigates and analyzes all relevant security and privacy response activities.

Tests| implements| deploys| maintains| reviews and administers the infrastructure hardware and software that are required to effectively manage the computer network defense (CND) service provider network and resources. Monitors network to actively remediate unauthorized activities.

Conducts assessments of threats and vulnerabilities| determines deviations from acceptable configurations or enterprise or local policy| assesses the level of risk| and develops and/or recommends and operationalizes appropriate mitigation countermeasures.

Identifies and assesses the capabilities and activities of cyber criminals or foreign intelligence entities; produces findings to help initialize or support law enforcement and counterintelligence investigations or activities.

Analyzes threat information from multiple sources| disciplines| and agencies across the regulatory and Intelligence Communities. Synthesizes and places regulatory and intelligence information in context; draws insights about the possible implications