桃園市蘆竹區經歷不拘大學
About SHL Medical
SHL Medical is a global leader in the design, development, and manufacturing of advanced self-injection devices. With 6,000 employees worldwide and headquarters in Switzerland, we partner with top pharma and biotech companies to deliver innovative autoinjectors, pen injectors, and drug delivery systems. Key operations are in Sweden, Taiwan, and the US. We are committed to innovation, impact, and growth, creating solutions that improve patients’ lives while fostering a dynamic and inclusive workplace.
Job Overview
The IT Security Engineer will support SHL’s transition from a technically focused to a business-aligned security model. You will empower IT and business teams to implement and own security controls while providing guidance and oversight. The role covers operational security, governance, engineering, and strategic influence to embed a pragmatic and forward-looking security culture.
Key Responsibilities
1. Security Governance & Enablement
Support transition to business-aligned security through new models, policies, and frameworks.
Advise IT infrastructure and application teams on security controls and validate against governance requirements.
Align security strategies with operational goals, bridging technical and business needs.
Elevate security posture with risk-based approaches.
2. Security Engineering
Assess and improve cybersecurity posture across infrastructure, applications, and networks.
Recommend additional controls, standards, and awareness programs.
Provide secure design and architecture advice on endpoints, identity, access, and networks.
Contribute to security infrastructure roadmap and threat modelling.
Stay updated on emerging threats, regulations, and technologies.
Prepare materials for security architecture reviews and governance.
3. Operational Security Monitoring & Support
Coordinate with SOC and MSSP providers; review incident trends and risks.
Support incident response, root cause analysis, and policy alignment.
Review threat intelligence and monitoring data; give actionable recommendations.
Maintain policies and processes for phishing, vulnerability, and endpoint protection.
Support risk assessments, audits, and compliance reporting.
4. Business Continuity & Disaster Recovery
Assist in developing and reviewing contingency and recovery plans.
Coordinate testing of continuity and recovery strategies.
Ensure alignment with governance and audit standards.