INTERNSHIP DETAILS

Internship, IT Security IAM

CompanyBPMB
LocationKuala Lumpur
Work ModeOn Site
PostedFebruary 5, 2026
Internship Information
Core Responsibilities
The intern will support monitoring user access and assist in maintaining user access matrices and permissions. They will also perform compliance checks, support audits, and investigate access-related incidents.
Internship Type
full time
Company Size
464
Visa Sponsorship
No
Language
English
Working Hours
40 hours
Apply Now →

You'll be redirected to
the company's application page

About The Company
Bank Pembangunan Malaysia Berhad (BPMB) is wholly owned by the Malaysian Government through the Minister of Finance Inc. and was established in 1973 to provide financial assistance to Bumiputera enterprises in the industrial and commercial sectors as well as to create a healthy and competitive Bumiputera entrepreneurial community in line with the nation’s developmental policy. BPMB is mandated as a development financial institution providing medium to long term financing to the following sectors: Infrastructure, Maritime, Technology and Oil & Gas.
About the Role

Elevate Your Banking Career with us! Be part of a team that is driving sustainable development and making positive impact on Malaysia's future.

Job Summary

Job Description

1) Support in monitoring user access.

2) Assist in maintaining and updating user access matrices and permissions.

3) Perform regular compliance checks and support in audits and risk assessments.

4) Investigate access related incidents and recommend improvements.

5) Work with other departments to ensure secure and proper access to systems.

6) Conduct regular user access reviews and support ID housekeeping tasks

7) Stay updated with the latest cybersecurity threats and best practices.

8) Perform other duties and responsibilities as assigned by the supervisor from time to time

Requirement

Internship, IT Security IAM (Open)

Don't miss out this opportunity, let's CREATE your journey to excellence with us!

Key Skills
User Access MonitoringAccess MatricesCompliance ChecksAuditsRisk AssessmentsIncident InvestigationCybersecurity ThreatsUser Access Reviews
Categories
TechnologySecurity & Safety