More jobs:
Assistant Lead, Workforce & Identity Security
Remote / Online - Candidates ideally in
Singapore
Listed on 2026-01-22
Singapore
Listing for:
Mediacorp Pte Ltd
Remote/Work from Home
position Listed on 2026-01-22
Job specializations:
-
IT/Tech
Cybersecurity, Data Security, Systems Engineer
Job Description & How to Apply Below
Purpose of the role
You are the person who ensures the right workforce has the right access to the right resources.
Scope of the role
- Identities & Accounts - Employees, contractors, vendors, service accounts and application identities across multiple directories and HR systems
- Access Control - Role-based access (RBAC), attribute-based access (ABAC), segregation of duties (SoD), and entitlements for business and privileged users
- IAM Platforms - Enterprise IAM solutions (e.g. SailPoint, Saviynt, Oracle IAM, Azure AD / Entra , Okta or similar) covering identity lifecycle, SSO and federation
- PAM Platforms - Cyber Ark or equivalent vaulting and session‑monitoring solutions for privileged and sensitive accounts
- Processes & Governance - Joiner‑mover‑leaver (JML), recertification, access reviews, break‑glass processes and exception handling
- Zero Trust & Workforce Security - MFA, adaptive authentication, conditional access, device and contextual signals that underpin an identity‑centric security model
You will work closely with
- HR, IT Operations, Application Owners, Cloud Engineering and Enterprise Architecture
- Cyber Fusion / SOC (for identity‑related monitoring & response) and Exposure & Vulnerability Management
- Internal Audit, Risk & Compliance and external regulators in demonstrating effective access governance
- Strategy & Target Operating Model
- Define and maintain the Workforce & Identity Security strategy and roadmap, aligned with Cyber Defence & Resilience, Zero Trust and CSA Cyber Trust Mark requirements
- Design the target operating model for IAM & PAM: roles and responsibilities, RACI, processes, tooling and integration patterns
- Translate business and regulatory requirements into clear identity control objectives and practical implementation plans
- Architecture, Design & Technology Ownership
- Own the end‑to‑end IAM & PAM architecture, including directories, identity stores, SSO, federation, MFA, just‑in‑time provisioning and password‑less / adaptive authentication
- Set architectural standards for integration of applications and systems into IAM/PAM platforms (e.g. connectors, APIs, SCIM, SAML/OIDC/OAuth, RADIUS)
- Lead design and deployment of role and attribute models (RBAC/ABAC) that support least privilege while remaining maintainable and understandable
- Ensure IAM/PAM designs support hybrid and multi‑cloud environments, remote work, and third‑party access scenarios
- Delivery of IAM/PAM & Zero Trust Programmes
- Lead multi‑year IAM/PAM and identity‑first security uplift programmes, including re‑platforming or major expansion of IAM and PAM solutions
- Manage full lifecycle of these programmes: requirements, design, build, test, migration, stabilisation and handover to BAU, using Agile or hybrid methodologies
- Coordinate cross‑functional squads (security engineers, IAM developers, infra/AD teams, application owners, HR and business stakeholders) to deliver on time and within budget
- Drive application onboarding at scale, including bulk integrations of business systems and cloud apps to SSO, MFA and PAM platforms
- Governance, Operations & Continuous Improvement
- Own and continuously improve JML, access request/approval, recertification and SoD processes, ensuring efficiency and strong control
- Oversee access governance reporting and dashboards – who has access to what, where risk hotspots exist, and progress against remediation
- Define and monitor KPIs/KRIs (e.g. orphan accounts, dormant privileged accounts, recertification completion, policy violations, number of manual exceptions)
- Ensure operating procedures, runbooks, and playbooks are in place for identity lifecycle, privileged account management and emergency access
- Incident Management & Assurance
- Serve as the senior escalation point for identity‑related incidents, including compromised credentials, abuse of privilege or IAM/PAM platform outages
- Coordinate with the SOC and other teams to detect and respond to credential theft, lateral movement and anomalous access behaviour
- Provide detailed evidence and explanations for internal and external audits, red‑team exercises, and regulatory inspections focused on access governance
- Regularly validate that IAM/PAM controls meet or…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×