Middleware Vulnerability Consultant

3 days ago


Singapur, Singapore ITCAN PTE. LIMITED Full time

Overview Competencies (Technical / Behavioral): At least 10 - 15 years of technical experience in following middleware technologies listed below: Open-source Apache HTTP Server (2.4.x) Open-source Tomcat application Server (9.x, 10.x, 11.x) Microsoft IIS server (IIS 10.x) REDHAT Jboss EWS (Apache / Tomcat 5.x, 6.x) REDHAT EAP application server (EAP 7.x) Wildfly application server (35.x, 36.x) IBM WebSphere Application server BASE & ND (8.x, 9.x) IBM WebSphere MQ server (8.x, 9.0, 9.1, 9.2) Oracle WebLogic server (12.x, 14.x) Remediation and vulnerability management responsibilities span across these technologies, including identification, remediation planning, and validation. Key Responsibilities Technical Management Responsible for the overall Middleware Vulnerability Management of Core Middleware systems in APAC (infrastructure in Singapore, Hong Kong, Japan and China) and regional oversight of the rest of APAC countries. Must have a mindset to provide continuous team and service improvements, be risk adverse in change management, focus on mitigating middleware vulnerabilities and be eager to improve the monitoring, efficiency, reliability, capacity and quality of all IT services. Strive to ensure 100% uptime for all Core Middleware systems infrastructure in APAC, taking into account business requirements. Able to plan, test and execute Production changes successfully following a robust Change Management process. Responsible for updating all live production documentation under their scope. Has direct hands on experience managing to reduce hardware and software obsolescence across IT. Additional activities Analysis, remediation planning and execution for all overdue Vulnerabilities for IBM MQ, IBM WAS, Apache, Tomcat, Jboss EAP/EWS products. Analysis, remediation planning and execution for all Critical Compliance deviations on Digital Platform assets, and ideally on High deviations for IBM MQ, IBM WAS, Apache, Tomcat, Jboss EAP/EWS. Assess and implement Middleware technologies in line with compliance baseline and best practices, avoiding any disruptions to the business. Understand the principles of vulnerability scoring, including CVE, to accurately assess and prioritize tasks according to potential impact. Work with owners (system, network, application define realistic remediation timelines and verify patch applicability. Draft remediation tickets, track progress in the ticketing system (e.g., ServiceNow) and close the loop with validation testing. Ability to extract key details from large documents and take necessary action. Should be good with Excel built-in automation features. Re‑scan remediated assets to confirm vulnerability closure. Generate weekly, monthly, and quarterly dashboards (KPI: Mean Time to Remediate, % of assets compliant, open critical findings) using Tableau, PowerBI, or Excel macros. Present status and trend analysis to senior leadership and cross‑functional committees (e.g., Security Steering, Streeco, IT Governance). Develop Ansible playbooks (Linux & Windows) and scripts (PowerShell, Python, Bash) to automate patch deployment, configuration hardening, and reporting. Enhancement of the current processes for remediation for all APAC assets where the remediation owner is Digital Platform (including assets provided to and supported for CIB, WM, Cardif entities), on the vulnerability management and compliance management remits. Continuous improvement of the security watch process for the products under APAC Digital Platform management, to proactively plan for patching. Experience in creating and producing Weekly/Monthly reports and Dashboard KPI. Obtain skill for reporting: Tableau / Power query / Excel Micro programing / Power BI / SQL query / Python / API. Optional skill set: Prometheus / Grafana / Kibana / ELK Obtain skill for automation: Ansible scripting + Ansible tower Middleware Skill: IBM MQ, IBM WAS, Apache, Tomcat, Jboss EAP/EWS To apply security vulnerability fixes on timely manner as per business needs. To apply security hardening policies for middleware products on timely manner as per business needs. Must have excellent written and verbal communication skills. #J-18808-Ljbffr



  • Singapur, Singapore NEWTONE CONSULTING PTE. LTD. Full time

    We are seeking an experienced Middleware Vulnerability Consultant to oversee vulnerability and compliance management for core middleware systems. This role involves planning and executing remediation for security vulnerabilities, ensuring compliance with industry standards, and developing automated processes for reporting and dashboard creation....


  • Singapur, Singapore Newtone consulting Full time

    We’re looking for a Middleware Vulnerability Consultant to lead vulnerability and compliance management for core middleware systems. You’ll plan and execute remediation for security vulnerabilities, automate reporting, and ensure compliance with industry standards. If you have a hands‑on approach, strong technical expertise in middleware, and enjoy...


  • Singapur, Singapore ITCAN Pte Ltd Full time

    Get AI-powered advice on this job and more exclusive features. Essential Technical Knowledge/Skills At least 5 - 10 years of technical experience in middleware technologies listed below: Open-source Tomcat application Server (9.x, 10.x, 11.x) REDHAT EAP application server (EAP 7.x) Wildfly application server (35.x, 36.x) IBM WebSphere Application server BASE...


  • Singapur, Singapore MALTEM ASIA PTE. LTD. Full time

    Maltem Asia is seeking a Middleware Vulnerability Consultant for an Investment Banking Client based in Singapore. This role is for a technical support position and he/she will be responsible to oversees Middleware Vulnerability & compliance Management. They must plan and rectify middleware products security vulnerabilities and compliance deviation. He/she...


  • Singapur, Singapore Neurones IT Asia Full time

    Direct message the job poster from Neurones IT Asia Job Title: Middleware Vulnerability Consultant Position Purpose This role is for a technical support position and he/she will be responsible to oversee Middleware Vulnerability & compliance Management . They must plan and rectify middleware products security vulnerabilities and compliance deviation. He/she...


  • Singapur, Singapore Argyll Scott Singapore Full time

    Company / Role Overview This position offers an opportunity to join a high-performing regional IT operations team responsible for securing and maintaining critical middleware infrastructure across multiple APAC locations. The Middleware Vulnerability Consultant will play a central role in managing security compliance, patching, and remediation across a range...


  • Singapur, Singapore GIC Private Limited Full time

    SVP, Engineering Lead of Database, Data Platforms, Middleware and Web, Technology Group Location: Singapore, SG Job Function: Technology Group Job Type: Permanent GIC is one of the world’s largest sovereign wealth funds. With over 2,000 employees across 11 locations around the world, we invest in more than 40 countries globally across asset classes and...


  • Singapur, Singapore Centre for Strategic Infocomm Technologies (CSIT) Full time

    Cyber Security Vulnerability Researcher (Web Applications) Join to apply for the Cyber Security Vulnerability Researcher (Web Applications) role at Centre for Strategic Infocomm Technologies (CSIT) . Get AI-powered advice on this job and more exclusive features. Conduct research and analysis to understand web application architectures, discovering...

  • Network Engineer

    3 weeks ago


    Singapur, Singapore Abhidi Solution Full time

    Main purpose of the role To be responsible for the patching and vulnerability management of all network, firewall devices. Responsibilities Network Administration of Cisco, Fortinet, F5 environment. Perform Patch assessment and recommend/plan deployment. Experience on Automation of Pre and Post patching tasks. Bios upgrades and firmware upgrades. Skills...


  • Singapur, Singapore DACTA SG PTE. LTD. Full time

    Requirements: Conduct end-to-end Vulnerability Assessment and Penetration Testing (VAPT) on a wide range of systems, networks, and applications, spanning from SME to Enterprise level. Perform thorough source code reviews to identify potential security vulnerabilities and weaknesses. Conduct host configuration reviews to ensure systems are configured in...