Job Description
Lavu Tech Solutions is seeking a highly skilled and analytical SAP ETD (Enterprise Threat Detection) Designer to join our expanding cybersecurity team in Kuala Lumpur. In this critical role, you will be the first line of defense, responsible for architecting and maintaining robust security monitoring patterns within the SAP ecosystem.
As an expert in SAP security, you will play a pivotal role in identifying vulnerabilities, mitigating potential threats, and ensuring the integrity of our enterprise data landscapes. You will collaborate closely with security operations teams to transform technical logs into actionable intelligence, ensuring proactive protection against sophisticated cyber threats. If you are passionate about SAP security architecture and possess a deep understanding of threat modeling, we invite you to help us build a more secure future.
Responsibilities
- Design, implement, and maintain advanced threat detection patterns within the SAP Enterprise Threat Detection (ETD) environment.
- Perform regular SAP vulnerability assessments and execute remediation strategies to address identified security gaps.
- Monitor and analyze real-time security alerts to identify potential data breaches or unauthorized access attempts.
- Develop and document security configurations and standard operating procedures (SOPs) for SAP security monitoring.
- Conduct forensic analysis on security incidents and provide detailed technical reports for remediation.
- Collaborate with cross-functional IT and security teams to integrate SAP ETD logs with the broader Enterprise SIEM solutions.
- Continuously refine detection logic to minimize false positives and enhance the accuracy of security monitoring.
Qualifications
- Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or a related field.
- Minimum of 3-5 years of dedicated experience in SAP Security, specifically focusing on SAP ETD and vulnerability management.
- Strong technical proficiency in SAP NetWeaver security, HANA security, and system audit logs.
- Proven ability to write and maintain complex custom patterns and rules for SAP security events.
- Deep understanding of SAP authorizations, profile generation, and threat landscape analysis.
- Excellent analytical, problem-solving, and communication skills, with the ability to translate technical threats into business risks.
- Relevant certifications such as SAP Certified Technology Associate or recognized Cybersecurity certifications (CISSP, CISM, GSEC) are highly preferred.