Sr Operation Mgmt Specialist

S00, SG, Singapore

Job Description

General Information



Req #

WD00093385

Career Area:

Information Technology

Country/Region:

Singapore

State:

Central Singapore

City:

SINGAPORE

Date:

Friday, January 2, 2026

Working Time:

Full-time

Additional Locations

:
Singapore - Central Singapore - Singapore Singapore - Central Singapore - SINGAPORE

Why Work at Lenovo



We are Lenovo. We do what we say. We own what we do. We WOW our customers.

Lenovo is a US$69 billion revenue global technology powerhouse, ranked #196 in the Fortune Global 500, and serving millions of customers every day in 180 markets. Focused on a bold vision to deliver Smarter Technology for All, Lenovo has built on its success as the world's largest PC company with a full-stack portfolio of AI-enabled, AI-ready, and AI-optimized devices (PCs, workstations, smartphones, tablets), infrastructure (server, storage, edge, high performance computing and software defined infrastructure), software, solutions, and services. Lenovo's continued investment in world-changing innovation is building a more equitable, trustworthy, and smarter future for everyone, everywhere. Lenovo is listed on the Hong Kong stock exchange under Lenovo Group Limited (HKSE: 992) (ADR: LNVGY).



This transformation together with Lenovo's world-changing innovation is building a more inclusive, trustworthy, and smarter future for everyone, everywhere. To find out more visit

www.lenovo.com

, and read about the latest news via our

StoryHub

.

Description and Requirements



Key Responsibilities



1. Threat Emulation & Toolkit Development



Plan, coordinate, and execute authorized adversary-emulation exercises and full-scope red team engagements against networks, systems, applications, and cloud environments. Emulate threat actors using validated tactics, techniques, and procedures (TTPs) in a controlled, ethical manner and ensure all activities are authorized, scheduled, and documented. Perform reconnaissance, vulnerability validation, privilege escalation verification, lateral movement testing, and persistence scenarios consistent with engagement rules of engagement. Maintain and expand a toolkit for safe, repeatable testing, including automation, scripting, custom tooling, and legitimate open-source tools. Ensure strict conformance to legal, policy and ethical requirements for red teaming with any activity outside approved scope being strictly prohibited.

2. Threat Modelling



Stay current with emerging adversary tactics, vulnerabilities, attack frameworks, and defensive countermeasures. Contribute to threat modelling, adversary profiles, and red team playbooks used to inform defensive control improvements and detection engineering.

3. Delivery & Stakeholder Management



Produce high-quality technical findings, evidence, and reproducible proof-of-concepts (within agreed scope), and translate technical results into clear, risk-based recommendations for business and system owners. Develop and deliver executive briefings, technical reports, remediation plans, and after-action reviews, support remediation validation and retesting. Excellent communication and presentation skills and able to brief executives, technical teams, and stakeholders. Collaborate with SOC on incident response, and engineering teams to run purple-team exercises, share threat intelligence and co-develop detection and response playbooks. Support training and knowledge transfer across teams.

4. Core Competencies & Soft Skills



Prior critical infrastructure security operations experience. High ethical standards, sound judgment, and strict adherence to legal and policy constraints. Analytical mindset, attention to detail, and a strong bias for documentation and reproducibility. Able to remain calm under pressure, resourceful, and adaptable to changing priorities. Ability to work both independently and collaboratively in cross-functional teams under strict rules of engagement. Familiarity with federal cybersecurity frameworks and guidance and incident response processes.

5. Required Qualifications



Bachelor's degree in computer science, Information Technology, Cybersecurity, or a related discipline. Minimum 2 years of hands-on offensive security experience (penetration testing, red teaming, adversary emulation).

6. Technical Skills



Experienced in threat intelligence, TTP development (ATT&CK mapping), or detection engineering. Experienced with cloud offensive/defensive tooling and adversary emulation in cloud environments. Demonstrated experience producing clear, evidence-based technical reports and executive summaries for non-technical stakeholders. Strong scripting and automation skills (Python, PowerShell, Bash, or similar). Experienced with using STRIDE and Process for Attack Simulation and Threat Analysis (PASTA) for threat modelling.

7. Preferred Qualifications



Professional certifications such as OSCP, GCIH, CISSP or CISM are preferred. Cloud certifications such as CCSP, AWS Certified Security, Azure Security Engineer Associate or equivalent would be advantageous.

#LPS


Additional Locations

:
Singapore - Central Singapore - Singapore * Singapore - Central Singapore - SINGAPORE

Beware of fraud agents! do not pay money to get a job

MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Related Jobs

Job Detail

  • Job Id
    JD1715091
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    S00, SG, Singapore
  • Education
    Not mentioned