Threat and Vulnerability Management Engineer
MY012 - Petaling Jaya,Malaysia(MY012)
DXC Technology
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds.Job Description:
DXC Technology helps global companies run their mission-critical systems and operations while modernizing IT, optimizing data architectures, and ensuring security and scalability across public, private and hybrid clouds. The world's largest companies and public sector organizations trust DXC to deploy services to drive new levels of performance, competitiveness, and customer experience across their IT estates.
Job Summary:
We are looking for a Security Engineer with a strong background in leading and delivering enterprise-scale security projects, aligned with DXC Security’s core service offerings. The role demands architectural depth and hands-on implementation knowledge across various security technologies.
As a member of the Malaysia Threat and Vulnerability Management team, you will provide high-impact Infrastructure Security Advisory Services to DXC clients and internal stakeholders, delivering secure and scalable solutions that meet enterprise risk, compliance, and business objectives.
Key Responsibilities:
Deliver technical consulting services to both external customers and internal project teams.
Lead or support the design, implementation, and optimization of security technologies aligned with DXC’s portfolio.
Serve as a trusted advisor to clients, maintaining strong, consultative relationships focused on long-term outcomes.
Stay current with emerging security trends, technologies, and threat landscapes to provide forward-thinking guidance.
Contribute to the evolution of DXC Security’s solution portfolio with technical insights and reusable methodologies.
Influence architectural direction and technical strategies for client environments and DXC solutions.
Support business development activities through opportunity identification and proposal input.
Ensure high-quality service delivery that supports revenue growth and customer satisfaction metrics.
Role expectations:
Security Consultant (Senior Individual Contributor)
Applies advanced subject matter expertise to resolve complex business and technical challenges in cybersecurity.
Frequently contributes to the creation of new tools, processes, and best practices derived from field experience and market intelligence.
Works on complex, high-impact projects that require cross-domain analysis and tailored security recommendations.
Exercises independent judgment within broadly defined frameworks, ensuring technical excellence and client value.
Provides mentorship and technical leadership within project teams, though not in a formal people management role.
Actively participates in cross-functional security initiatives with stakeholders across infrastructure, applications, and compliance.
Drives continuous improvement by recommending and influencing enhancements in security operations, architecture, and governance.
Represents DXC Security in customer engagements as a subject matter expert and technical authority.
Technical Skills and Experience Required:
Essential Requirements:
3–5 years of proven experience implementing and configuring products aligned with the DXC Security portfolio.
Strong networking knowledge and hands-on experience deploying solutions in complex enterprise environments.
Experience in at least 2 of the following technologies is required:
Tenable VM (via Vulcan Platform)
Experience with Tenable.io and Tenable.sc integrated through Vulcan Cyber for vulnerability lifecycle management
Risk-based prioritization and remediation orchestration
Integration with ITSM platforms (e.g., ServiceNow) for automated ticketing and SLA tracking
Custom dashboards and compliance reporting
Armis
Deployment for agentless visibility into unmanaged, IoT, and OT assets
Integration with SIEM and ITSM platforms
Risk scoring, threat detection, and segmentation recommendations
Real-time alerting and policy enforcement
ITSM Integration
Workflow automation for vulnerability triage and remediation
Closed-loop feedback between detection and resolution
Experience with ServiceNow and similar platforms
Check Point
Palo Alto
Blue Coat
Fortinet
FireEye
AV Solutions (e.g., Symantec, McAfee)
DLP
Advantageous:
Professional certifications such as CISSP, CISM, CEH, CCSP, or vendor-specific accreditations (e.g., Tenable, Palo Alto, Armis).
Experience in regulated industries or environments with stringent compliance requirements.
Additional Information:
Travel: Required for client site visits, project implementations, or stakeholder engagements
Learn more about DXC's Security team - Security
Instagram: https://www.instagram.com/dxctechnology
Youtube: https://www.youtube.com/DXCTechnology
TikTok: https://www.tiktok.com/@dxc_technology
Website http://www.dxc.com
At DXC Technology, we believe strong connections and community are key to our success. Our work model prioritizes in-person collaboration while offering flexibility to support wellbeing, productivity, individual work styles, and life circumstances. We’re committed to fostering an inclusive environment where everyone can thrive.
Recruitment fraud is a scheme in which fictitious job opportunities are offered to job seekers typically through online services, such as false websites, or through unsolicited emails claiming to be from the company. These emails may request recipients to provide personal information or to make payments as part of their illegitimate recruiting process. DXC does not make offers of employment via social media networks and DXC never asks for any money or payments from applicants at any point in the recruitment process, nor ask a job seeker to purchase IT or other equipment on our behalf. More information on employment scams is available here.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Automation CCSP CEH CISM CISSP Compliance Governance IoT SIEM Threat detection Vulnerability management
Perks/benefits: Career development Startup environment
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.