2020 job opportunities at iDealogic

Cyber Security Consultant

About us

iDealogic CS is originally founded in the Netherlands and specializing in Cybersecurity managed services and distribution in APAC. The organization has offices in the Hongkong, Singapore, Vietnam and continues to expand our business to other countries as well as make starts to provide Cybersecurity services and products. At iDealogic CS, we are aiming to spread the message of cybersecurity insights and awareness to meet customers’ needs.

Our team in the Netherlands has developed the Cyber Security Assessment Tool (CSAT), which organizations can use to gain insights into their Cyber Security status. CSAT helps organizations to develop a roadmap for the implementation of software tools to maximize the security of their infrastructure and information. Currently, we are working closely with Microsoft global and partners around APAC to provide our solutions in delivering our customers the well-tailored services and fully integrated experience. We also provide industrial cybersecurity best practice in delivering high qualified of other services and products with penetration testing (Edgescan), malware hunting (Infocyte Hunt) and endpoints data security (Ego Secure) solutions.

We are pleased to invite qualified and passionate candidates to apply for a Cybersecurity Consultant position as part of our talented team. Experienced candidates will be working in HCMC office and deliver highly professional results.

Company: iDealogic CS, Floor 14th, An Phu Plaza, 117-119 Ly Chinh Thang Street, Ward 7, District 3, Ho Chi Minh City, Vietnam.

Headquarter: QS Solutions, Modemweg 38, 3821 BS Amersfoort, the Netherlands.

Job Purpose: The primary role of the position is to deliver high qualified cybersecurity report to customers and provide technical support to partner around APAC to recommend security best practices in the industry.

Key Responsibilities:

Consultancy services:

  • Study and research on current technologies and company’s products.
  • Analyze customer’s current infrastructure to be able to provide recommendations.
  • Present advised solutions and reports to customers and top management.
  • Proactively working on analysis and identifying opportunities to improve customer’s technology processes and procedures.
  • Conduct gaps analysis for any technology-related and data-related for security findings.
  • Keep track a full cycle of a cybersecurity assessment project to deliver a successful engagement.


Support partners:

  • Provide technical support to partners around APAC.
  • Deliver technical training related to current products of organization.
  • Support partners to conduct ongoing solution assessment.
  • Oversee progression and timeline during an assessment.

Job Specification

Qualifications (Degree/Diploma): Bachelor’s degree in Computer Science, Management/ BIS/ MIS/ Information Security, or a related technical field.

Professional Qualification and/or Regulatory, Licensing requirements: Certification (nice to have) such as CISA/CISM/CEH/CompTIA security+ is a plus.

Relevant Work Experience: Minimum from 1 – 3 years working experience in

  • IT Risk Advisory /IT Audit in big 4 professional service firms (PwC, Deloitte, KPMG or E&Y) is a plus


  • Experience in technical positions such as network security consultant/system administrator/security engineer.

Required Competencies and Skills (Essential to succeed in this job):

Technical/Functional skills:

  • Data Analysis and Data investigation skills
  • System administrator experiences.
  • Experience and knowledge in Microsoft technology such as Azure cloud solutions or any related Microsoft technology is a plus.
  • Knowledge and experience in IT security, Identity and access management solutions such as EDR, MFA or Nessus.
  • Knowledge of information security controls, guidelines and standards: ISO/CIS/NIST is a plus.

Personal skills: (Soft Competencies [Core/Leadership])

  • Delivers Result.
  • Builds Relationships.
  • Exercises Sound Judgment.
  • Inquisitive approach and attention to detail.
  • Strong English verbal communication skills.

Please send your CV to: hoang.nguyen@idealogic.com.vn or jameshn@qssolutions.nl

Cyber Security consultant needed:

Who are we?

We are 100% foreign investment organisation, established in Vietnam 5 years ago, in 2013. We do both Outsourcing business and Cyber Security business in South East Asia and Hong Kong. Our office in Ho Chi Minh city is the major development centre which support globally.

What is this position?

We are looking for a talented consultant who has strong knowledge in IT infrastructure and probably a bit of knowledge on Cyber Security to join us in this position. Together we will do consultations on Cyber Security for customers around South East Asia + Hong Kong.

Your job duties?

  • Study and research on current technologies and company’s products
  • Learning customer’s current infrastructure to be able to provide recommendations
  • Present solutions, reports to customers and top management
  • Doing project implementations
  • Provide technical supports to partners around South East Asia

What do we need from you?

We are looking for graduates and experienced candidates who can demonstrate:

  • Bachelor or Master Degree in Computer Engineering, Computer Science, MIS and any IT related fields
  • Working experiences in IT security, IT technical background and / or industry knowledge. Working experiences with Microsoft technologies are preferable
  • Strong IT security and IT technical knowledge as well as working experiences in any of the following areas:
    • Strong database management system including Data Gap Analysis, IAS39, Business Process◦Network security controls including firewall, router, IDS/IPS security configuration and security review
    • Operating system configuration and security review for any of various platforms: Mainframe, Windows NT/2000/2003, UNIX, Middleware, Oracle/SQL databases. This includes vulnerability assessment by using scanning tools
    • Penetration testing at both network and web application level
    • Security audit tools available such as Nessus, IIS, WebInspect, PhoneSweep, etc and hardware/software security implementation
    • Identity and access management solutions and implementation
  • Understanding of business security practices, security controls and risk management concepts
  • Strong analytical and problem solving capabilities
  • Excellent teamwork and inter-personal skills
  • Self-motivated individuals that are willing to develop solutions on their own or in a team of highly skilled professionals

Remember – Attitude is everything!!! We welcome all candidates who want to explore new technologies!!!

Chris Gerrits – US Cyber Soilder , the father of Infocyte

Chris Gerrits , the 10 intense years of US Cyber Battle is never over with Christ , after came home he continue his battles with Infocyte – a cyber threat hunter

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these high profile attacks are organized and can persist in your organization’s endpoints without detection for months, sometimes years.
It’s clear that current real-time security processes are simply ineffective at detecting post breach activity, especially as time passes after the initial compromise. Don’t wait for your customers or the authorities to tell you that you are the victim of a cyberattack. Simply layering on increasing numbers of defensive tools does not deliver total security. You need to proactively hunt for hidden threats that have bypassed these defenses to fully protect your organization.
Infocyte HUNT provides an easy-to-use, yet powerful solution to limit risk and eliminate dwell time by enabling an organization’s own IT and security professionals to proactively discover malware and persistent threats, active or dormant, that have successfully breached existing defenses and established a beachhead within your network.





Kaspersky: You can trust us despite US government ban

Kaspersky: You can trust us despite US government ban

He had this appeal to his American customers: “Please stay with us – you can trust us.”

While he described the revenue his firm earns from the US government as “close to zero”, the wider US market account for about the quarter of Kaspersky’s sales

But Mr. Kaspersky said the Americans could have full access to his company’s activities: “We will open every door, check everything. We don’t have any secrets, we don’t do anything bad against our customers and against governments.”

That means that a Russian business offering cyber-security software may struggle to convince American consumers to buy products that their own government suggests are unsafe.

The problem for the company is that Russia is now seen as a haven for hackers and cyber-criminals, and its government is widely accepted to have interfered in last year’s American presidential election.

Eugene Kaspersky said he wanted relations between the two countries to improve and called for international co-operation on cyber-security – he insisted that “only the bad guys are happy with this situation”.

The Kremlin has criticized the US government’s actions, describing the ban as unfair competition.

The American store chain Best Buy has stopped selling Kaspersky products, but Mr Kaspersky said he had had positive discussions with other retailers.

‘Unfair competition’

“We co-operate with many law enforcement agencies around the world – in the past with the US as well.”

“When they say we have strong ties with Russian espionage it’s not true,” he told me via a video call from Argentina.

But the company’s founder said that while he lived in Moscow and his firm co-operated with Russian law enforcement on cyber-security, there were no deeper ties.

Mr Kaspersky told the BBC that the Trump administration’s move to ban government agencies from using his products was an “uncomfortable situation”. The US has said it is concerned that Kaspersky is vulnerable to influence from the Kremlin.

Eugene Kaspersky has denied that the cyber-security firm he founded is close to the Russian government and insists it poses no danger to its American customers.

Source : BBC UK


Ransomware: Is the worst yet to come?  

Ransomware: Is the worst yet to come?

Data hostage-takers are innovating quickly, Raytheon experts warn test

Last Updated: 09/07/2017

Cyber defenders found a weakness in the WannaCry attack that allowed them to disable it with a “kill switch.” But criminals worked quickly to counter that effort, creating a new variant that circumvented the defense.

Raytheon has been tracking WannaCry since it first began spreading across Europe in May 2017, and experts at Forcepoint Labs have been posting technical information about the worm on their blog. The worm appears under various names, including WCry and WannaCrypt0r 2.0.

Some attackers have even introduced “affiliate programs,” encouraging victims to infect their friends in return for a decryption key, Douglas said.

Some ransomware users have introduced tiered payments, giving victims a choice of how much data to free, said Josh Douglas, chief strategy officer for Raytheon Foreground Security.  Others are attacking specific users in return for a cut of the profits, a model known as ransomware-as-a-service.

Ransomware programs infect computers, identify data that looks important and encrypts them – rendering them useless without a special decryption key. The attackers demand payment to unlock the data.

“Anyone can launch an attack,” he said. “You don’t have to be a cyber whiz to inflict cyber damage.”

The deep web is full of do-it-yourself ransomware kits, Daly said, meaning it’s easy for novices to try their hand at causing havoc.

“If we do not invest in the cybersecurity of our critical infrastructure we will continue to see massive attacks with both economic and safety ramifications,” Daly said. “From the government to the boardroom, leaders need to make cyber resiliency a requirement, putting focus and funding behind it.”

People in charge of critical infrastructure must work to make it more resilient to such attacks, Daly said.

They recommended installing security updates on all machines within an organization, and disabling SMBv1 on all Windows systems, where doing so would not impede older systems on the network.

Analysts from Forcepoint, a cybersecurity firm jointly owned by Raytheon, have reported that the attack has several mechanisms for spreading laterally through a network after the initial victim has been infected. This includes using a vulnerability in something known as SMBv1, an early version of a PC feature called Server Message Block that allows computers on a network to access printers, files and other commonly shared items.

The attack, using malware called Petya, hit a wide range of targets, including government offices in Ukraine, banks in Russia, a shipping company in Denmark, an advertising agency in Britain and even a chocolate factory in Australia.

“If you thought WannaCry was bad, you haven’t met this one yet,” Daly said, adding that the attacks “are demonstrating just how vulnerable critical infrastructure is by hitting railways, airports and more.”

The latest attack follows a similar but less severe virus called WannaCry that infected tens of thousands of computers in more than 150 countries in May. Ransomware is ballooning into a billion-dollar market as attackers quickly find new ways to exploit its reach, said Michael K. Daly, chief technology officer at Raytheon Cybersecurity and Special Missions.

A new ransomware attack that swept across Europe and is now hobbling IT systems around the world is the latest in a wave of hackers-for-hire holding critical data hostage, Raytheon cybersecurity experts warn.

Source : Raytheon Cyber