Talent.com
This job offer is not available in your country.
It Security Officer | Identity And Access Management

It Security Officer | Identity And Access Management

AboitizpowerNational Capital Region, Philippines
11 days ago
Job description

IT Security Officer | Identity and Access ManagementPosted 3 days ago and deadline of application is on 29 AugRecruiter was hiring 3 days agoPosted 3 days ago and deadline of application is on 29 AugRecruiter was hiring 3 days ago2025-06-26T05 : 52 : 18.294080+00 : 00 2025-08-29T16 : 00 : 00+00 : 00 Top 50 HybridAssists Head of IT security by leading the efforts of Identity and Access ManagementPlan, develop and implement an Identity and Access Management program with policies and procedures.Manage user access to systems, applications, and data.Monitor compliance with policies, regulations, and customer requirements.Train and educate users on their roles in establishing an effective Identity and Access Management program.Minimum QualificationsBachelor's Degree or any 4-year related courseMaster's degree in Business or Computer Science, an advantage.At least 5 years' experience in information security particularly in Identity and Access Management.

Previous experience with both on-premise and cloud security architecture.Previous experience as a team leader preferred but not required.Proven experience in the implementation of Identity and Access Management ProgramExpertise in the various Identity and Access Management solutions such as IGA and PAM.Experience in the rolling out the various IAM processes such as Access Control Reviews, Access provisioning / deprovisioning etcExperience in various types of IGA application integrationsProfessional security certifications like CISSP, CISA, CISM, preferred but not required.

AWS certifications are a plus.Feel secure when applying : look for the verified icon and always do your research on a company.

Avoid and report situations when employers require payment or work without compensation as part of their application process.About AboitizPowerAboitizPower is the holding company for the Aboitiz Group's investments in power generation, distribution, and retail electricity services.

We are among the largest power producers in the Philippines, with a balanced portfolio of assets located across the country.

We are also a major producer of renewable energy, with several hydroelectric, geothermal, and solar power generation facilities.Driven by our purpose of "Transforming Energy for a Better World," AboitizPower is a leading Philippine energy provider dedicated to building a sustainable and balanced fleet of generation capacities.

We prioritize responsible operations and investments that support the country's energy transition goals, focusing on renewable energy sources for a cleaner future while improving our traditional assets to ensure the nation continues to grow.We urge everyone to be vigilant against scams involving fraudulent employment offers with Aboitiz Power Corporation.

To ensure your security, please correspond and refer to the official channels only.1.

Aboitiz Power Corporation Website : .

Careers Website : .

LinkedIn : .

Facebook : .

Tiktok : in providing security systems and tools management related to the cloud technologies.

Manage and execute technologies and processes that affect assigned global Information Protection capability, such as issue identification and resolution, documentation, integration with other tools, gap resolution, gap assessment, and continuous improvement of the capability.

Keep the infrastructure current, making recommendations, and participating in the implementation and continuous improvement of technologies and services in assigned information security domains.

Logging, monitoring, and responding to detected incidents in the cloud environment.

Support on Incident Response on security incidents and participate in the development of business cases and presentations on information security technologies of interest to the company.

Collaborates in cross-functionally with analysts, engineers, and data scientists to achieve continuous improvement in cyber defense / resilience.

Responsible for the thorough documentations of implementations, via technical documentation and run-books.

Responsible for automating security controls, data and processes to provide improved metrics and operational support.

Spot and execute new security technologies and best practices into the company's Cloud offerings.

Establishes rapport with other IS teams to mature the Cloud Security Program.

Actively contributes and participates in team activities and planning regarding improving team skills, awareness, communication, reputation, and quality of work.

Effectively collaborates and communicates with Compliance, Internal Audit, the Business teams and others to identify, analyze, and communicate risk and provides support around Cloud Environment within their business requirements.

Understands compliance requirements that may impact security and effectively collaborates with business areas and project teams to develop security solutions that address these requirements.

Assumes role in advocating internally and externally for compliance to security measures to protect corporate applications and environments.

Works with information systems owners and administrators to understand their security needs and assists with implementing practices and procedures consistent with UBPs security policies.

Maintains current knowledge of industry trends and standards.Posted 4 days ago

  • Apply before 24 Jul Recruiter was hiring 2 days agoServe as the primary cybersecurity expert for the organization, responsible for installing, administering, and troubleshooting security solutions.

Develop and maintain security policies and training documents to educate users on security procedures.

Install, configure, and troubleshoot security solutions, ensuring optimal functionality.

Troubleshoot access problems and enforce network security policies, application security measures, and corporate data safeguards.

Monitor patch management processes to protect network equipment and operating systems against vulnerabilities.

Ensure the network's security, safeguarding against unauthorized access, modifications, or destruction.

Configure and manage security tools such as anti-virus software and patch management systems.

Conduct vulnerability scans and assessments of the network.

Monitor network traffic for unusual activity and take corrective measures as needed.

Implement and maintain email security standards and infrastructure to ensure a stable and secure environment.

Develop tools, policies, processes, and procedures to provide operational stability and manage risks effectively.

Create automated metrics reporting capabilities to monitor and improve security performance.

Collaborate with colleagues to establish consistent security processes and solutions.

Investigate and troubleshoot root causes of security incidents escalated from operations.

Perform additional tasks as assigned by the immediate superior or Senior IT Manager.Posted a month ago

  • Apply before 24 Sep Recruiter was hiring 2 days agoSupport the PwC Identity offering by providing L2 support related to ForgeRock OpenAM, OpenDJ, and Entrust.
  • This includes working on incidents and SC Tasks and providing support over call and / or chat to fix them in a timely manner.

    Almost monitoring and ensuring the availability of the environment.

    Support the PwC Identity offering by providing L3 support related to ForgeRock OpenAM, OpenDJ, and Entrust.

    Implement changes that include Minor functional and performance enhancement within the Product, remediation of security vulnerabilities, patching / upgrade of IAM products.Posted a month ago

  • Apply before 29 Jul Recruiter was hiring 2 days agoCloud Security Engineer and SupportSpecialize in providing security systems and tools management related to the cloud technologies.
  • Manage and execute technologies and processes that affect assigned global Information Protection capability, such as issue identification and resolution, documentation, integration with other tools, gap resolution, gap assessment, and continuous improvement of the capability.

    Keep the infrastructure current, making recommendations, and participating in the implementation and continuous improvement of technologies and services in assigned information security domains.

    Logging, monitoring, and responding to detected incidents in the cloud environment.

    Support on Incident Response on security incidents and participate in the development of business cases and presentations on information security technologies of interest to the company.

    Collaborates in cross-functionally with analysts, engineers, and data scientists to achieve continuous improvement in cyber defense / resilience.

    Responsible for the thorough documentations of implementations, via technical documentation and run-books.

    Responsible for automating security controls, data and processes to provide improved metrics and operational support.

    Spot and execute new security technologies and best practices into the company's Cloud offerings.

    Establishes rapport with other IS teams to mature the Cloud Security Program.

    Actively contributes and participates in team activities and planning regarding improving team skills, awareness, communication, reputation, and quality of work.

    Effectively collaborates and communicates with Compliance, Internal Audit, the Business teams and others to identify, analyze, and communicate risk and provides support around Cloud Environment within their business requirements.

    Understands compliance requirements that may impact security and effectively collaborates with business areas and project teams to develop security solutions that address these requirements.

    Assumes role in advocating internally and externally for compliance to security measures to protect corporate applications and environments.

    Works with information systems owners and administrators to understand their security needs and assists with implementing practices and procedures consistent with UBPs security policies.

    Maintains current knowledge of industry trends and standards.

    Questronix Corporation Makati, Philippines Posted 4 days ago

  • Apply before 24 Jul Recruiter was hiring 2 days ago 1 / c / questronix-corporation / jobs / 208245 / cloud-security-engineer-and-supportSecurity Infrastructure AdministratorServe as the primary cybersecurity expert for the organization, responsible for installing, administering, and troubleshooting security solutions.
  • Develop and maintain security policies and training documents to educate users on security procedures.

    Install, configure, and troubleshoot security solutions, ensuring optimal functionality.

    Troubleshoot access problems and enforce network security policies, application security measures, and corporate data safeguards.

    Monitor patch management processes to protect network equipment and operating systems against vulnerabilities.

    Ensure the network's security, safeguarding against unauthorized access, modifications, or destruction.

    Configure and manage security tools such as anti-virus software and patch management systems.

    Conduct vulnerability scans and assessments of the network.

    Monitor network traffic for unusual activity and take corrective measures as needed.

    Implement and maintain email security standards and infrastructure to ensure a stable and secure environment.

    Develop tools, policies, processes, and procedures to provide operational stability and manage risks effectively.

    Create automated metrics reporting capabilities to monitor and improve security performance.

    Collaborate with colleagues to establish consistent security processes and solutions.

    Investigate and troubleshoot root causes of security incidents escalated from operations.

    Perform additional tasks as assigned by the immediate superior or Senior IT Manager.

    Gardenia Bakeries Phils., Inc. Biñan, Philippines Posted a month ago

  • Apply before 24 Sep Recruiter was hiring 2 days ago 2 / c / gardenia / jobs / 255453 / security-infrastructure-administratorIdentity Access ManagementSupport the PwC Identity offering by providing L2 support related to ForgeRock OpenAM, OpenDJ, and Entrust.
  • This includes working on incidents and SC Tasks and providing support over call and / or chat to fix them in a timely manner.

    Almost monitoring and ensuring the availability of the environment.

    Support the PwC Identity offering by providing L3 support related to ForgeRock OpenAM, OpenDJ, and Entrust.

    Implement changes that include Minor functional and performance enhancement within the Product, remediation of security vulnerabilities, patching / upgrade of IAM products.

    PwC Philippines Makati, Philippines Top 50 Hybrid Posted a month ago

  • Apply before 29 Jul Recruiter was hiring 2 days ago 3 / c / pwc-philippines / jobs / 255617 / identity-access-managementChief Information Security Officer CISODefine and own a multi-year cybersecurity roadmap and key performance indicators focused on reducing cyber risk Build and inspire a highly skilled and diverse Cybersecurity team.
  • Foster a culture of trusted cross-functional partnership, service, and continuous improvement Create quarterly, annual, and long-term cyber security and cyber risk management goals, articulate strategies, define metrics and provide necessary updates to executive leadership Partner with leadership for the development, planning, and execution of major security initiatives.

    Support Yondu's Secure Software Development Lifecycle Lead the SOC team and ISO 27001 Core team to establish appropriate security standards and provide an effective governance structure to ensure cyber compliance and accountability Lead Security Incident Response, Third Party Information Security Assessment, Data Protection and Encryption, Identity & Access Management and Privileged User Access to protect customer and employee data Define cyber security governance and control strategies for emerging technologies such as cloud & containerization, blockchain, etc.

    Keep well informed of developing security threats, and proactively create strategies to understand and mitigate potential security problems that might arise from acquisitions or other big business moves YONDU INC. Taguig, Philippines Hybrid Posted a month ago

  • Apply before 29 Jul Recruiter was hiring 21 hours ago 4 / c / yondu-inc / jobs / 255190 / chief-information-security-officer-cisoIT Infrastructure EngineerTo support the successful deployment, maintenance, development, integration, and use of the infrastructure environment and its services Provides input into and supports the execution of operations management, service management, environment management, security, and project management methodologies & processes, incident and change control processes, release management, testing, documentation development and maintenance, monitoring, data management, environment maintenance, solution enhancements, and solution development.
  • Identifies, understands, and plans for organizational and human impacts of systems, and ensures business requirements are properly documented and integrated with existing processes, services, solutions, and skill sets.

    Develops, documents, and revises environment or solution operations procedures, tests, and quality standards and functions.

    Creates and updates communications and incident management activities to streamline ticket resolution.

    Assists or leads the troubleshooting and resolution of issues, such as application, data synchronization, system integration, and performance incidents.

    Questronix Corporation Makati, Philippines Hybrid Posted 4 days ago

  • Apply before 24 Jul Recruiter was hiring 2 days ago 5 / c / questronix-corporation / jobs / 247410 / it-infrastructure-engineer-2
  • J-18808-Ljbffr

    Create a job alert for this search

    Security Officer • National Capital Region, Philippines