This role will be responsible for implementing, operating, and maintaining security and inventory management tools, processes and procedures employed for securing and reducing the security risk to the manufacturing environment.
To be successful, this position requires significant understanding of the manufacturing processes across all the product lines in Penang and directly connected Contract Manufacturers (CMs) to identify and mitigate or correct any issues that impact manufacturing production.
The job role covers the following:
Implement Security Measures:Deploy, operate, and maintain security tools, processes, and procedures to safeguard the manufacturing environment, reducing security risks. Global Cross-Functional Collaboration:Collaborate with Keysight partners, including Information Technology (IT), Information Security and Compliance (ISC), and OF partners, as well as directly connected contract manufacturers, to strengthen security in the current manufacturing environment. This encompasses legacy systems, applications, and the next generation of manufacturing systems and solutions. Security Incident Response and coordination:Provide local support for security incidents, breaches, and compromises, coordinating with the Security Operations Center (ISC SOC) to detect and respond promptly. Solution Implementation and Testing:Collaborate with partners to implement and test new solutions, addressing any compatibility or performance issues by establishing operational support processes. Compliance and Assurance:Ensure compliance with security policies and standards, contributing solutions that enhance security assurance for Keysight insurers and customers. Aligning Manufacturing Systems Strategy with Security Objectives:Collaborate on annual planning, budgeting, and strategy for existing and prospective manufacturing systems, ensuring alignment with security objectives. Lead Business Continuity Plan and Documentation:Lead the development of the manufacturing business continuity and recovery plan in collaboration with the manufacturing team, including the establishment of guidelines and documentation templates. Bridging Project Teams and Stakeholders for SuccessEnsures effective communication of progress and status to both the project teams, management, partners, and key stakeholders. Conduct Training and Offer Guidance:Offer training and guidance to backup personnel to ensure a proficient response to security issues. Job Qualifications: Bachelor's or Master's Degree or University Degree or equivalent in Computer Science/Information Technology.Proficiency in a variety of cybersecurity tools and technologies, including but not limited to firewalls, intrusion detection/prevention systems, antivirus software, encryption methods, and network protocols. Familiarity with ethical hacking and penetration testing is also valuable.Proficiency in programming languages such as Python, Java, C++, C#, or scripting languages like PowerShell.A strong understanding of system architecture includes knowledge of operating systems, network architecture, and the interaction between different components in a complex system.Excellent written and verbal communication skills.Ability to work with cross-functional and cross-geographical team.Good organizational skills, and a demonstrated ability to multi-task.Strong analytical, project management skills and problem-solving abilities are added advantage.