×
Register Here to Apply for Jobs or Post Jobs. X

Security Engineer

Job in Singapore, Singapore
Listing for: User Experience Researchers Pte Ltd (Singapore)
Full Time position
Listed on 2025-11-02
Job specializations:
  • IT/Tech
    Cybersecurity, Information Security
Salary/Wage Range or Industry Benchmark: 100000 - 125000 SGD Yearly SGD 100000.00 125000.00 YEAR
Job Description & How to Apply Below

About The Security Engineer Role

We’re looking for a Security Engineer to manage identity and access controls, conduct audits, and oversee privileged access to ensure compliance and protect enterprise systems. The role involves coordinating user access reviews, supporting IAM operations, and driving process improvements to strengthen security and regulatory compliance.

Key Responsibilities
  • User Access Review (UAR) Management
    • Orchestrate and manage comprehensive user access review cycles, including monthly, quarterly, and annual certification processes to ensure compliance with organisational security policies and regulatory requirements.
    • Oversee the complete UAR lifecycle from initial data extraction through to final certification, ensuring accuracy and timeliness of all access review activities.
    • Compile and validate access data from multiple enterprise systems, cross‑referencing user permissions and validating accuracy of access rights across all applications and platforms.
    • Coordinate extensively with stakeholders across the organisation to obtain timely responses and certifications, managing relationships to ensure review completion within required time frames.
    • Track and follow up on access exceptions, working closely with system owners to ensure prompt remediation of identified compliance issues and security risks.
    • Maintain comprehensive documentation of UAR processes, findings, and remediation activities to support audit requirements and continuous improvement initiatives.
  • Privileged Access Management
    • Manage privileged access reviews within Cyber Ark environment, ensuring appropriate oversight of high‑risk access permissions and maintaining security of critical systems.
    • Conduct regular assessments of privileged accounts to ensure principle of least privilege is maintained and access remains appropriate for business requirements.
  • IAM Audit and Compliance
    • Conduct comprehensive IAM audits to assess the effectiveness of identity governance controls and identify gaps in access management processes.
    • Perform detailed analysis of user access patterns, identifying anomalies, orphaned accounts, and potential security risks through systematic audit procedures.
    • Prepare detailed audit reports documenting findings, risk assessments, and recommended remediation actions for management and external auditors.
    • Support internal and external audit activities by providing evidence of IAM controls, access logs, and compliance documentation.
    • Maintain audit trails for all identity management activities, ensuring comprehensive documentation for regulatory compliance and forensic analysis.
  • Identity Management Operations
    • Support identity management cleanup initiatives including process review, requirement documentation, user acceptance testing (UAT), and ongoing Day 2 IAM operations.
    • Collaborate with technical teams to implement identity governance improvements and automation opportunities to enhance operational efficiency.
    • Participate in the design and implementation of identity management solutions that align with enterprise security architecture and compliance requirements.
  • Compliance and Risk Management
    • Ensure all identity and access management activities comply with internal policies, regulatory requirements, and industry best practices.
    • Identify and assess identity‑related risks, developing mitigation strategies and working with stakeholders to implement appropriate controls.
    • Support internal and external audits by providing comprehensive documentation and evidence of access management controls and processes.
    • Conduct risk‑based access assessments to prioritise remediation efforts and resource allocation.
  • Process Improvement and Documentation
    • Continuously evaluate existing IAM processes to identify opportunities for automation, streamlining, and efficiency improvements.
    • Develop and maintain detailed process documentation, standard operating procedures, and training materials for IAM activities.
    • Collaborate with cross‑functional teams to implement process improvements and technology solutions that reduce manual effort whilst maintaining security and compliance standards.
Requirements
  • Technical Experience
    • Proven experience in Identity and…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary