Software Engineer - Threat Intelligence
Singapore, Singapore
TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. TikTok has global offices including Los Angeles, New York, London, Paris, Berlin, Dubai, Singapore, Jakarta, Seoul and Tokyo.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Security Engineering Jobs
Threat Intel Jobs
Tags: Computer Science E-commerce Ecommerce Monitoring Threat intelligence
Perks/benefits: Team events
Region:
Asia/Pacific
Country:
Singapore
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Cybersecurity Engineer jobsInformation System Security Officer jobsIT Security Analyst jobsSenior Security Analyst jobsSenior Information Security Analyst jobsSecurity Operations Engineer jobsSenior Cloud Security Engineer jobsCyber Security Specialist jobsInformation Security Manager jobsSenior Product Security Engineer jobsSenior Network Security Engineer jobsInformation System Security Officer (ISSO) jobsSenior Information Security Engineer jobsSenior Cyber Security Engineer jobsSecurity Consultant jobsChief Information Security Officer jobsInformation Systems Security Engineer jobsSecurity Specialist jobsNetwork Engineer jobsCyber Threat Intelligence Analyst jobsSenior Software Engineer jobsIT Security Engineer jobsSecurity Operations Analyst jobsCybersecurity Specialist jobsSenior IT Auditor jobs
GDPR jobsSecurity assessment jobsEDR jobsTS/SCI jobsEncryption jobsSDLC jobsThreat detection jobsRMF jobsMalware jobsTerraform jobsSplunk jobsSQL jobsIDS jobsITIL jobsFinance jobsCompTIA jobsOWASP jobsTop Secret jobsIPS jobsForensics jobsSOC 2 jobsActive Directory jobsDocker jobsGIAC jobsClearance Required jobs
TCP/IP jobsOSCP jobsCRISC jobsHIPAA jobsMITRE ATT&CK jobsDoDD 8570 jobsIntrusion detection jobsAnsible jobsVPN jobsCCSP jobsZero Trust jobsJavaScript jobsSOAR jobsJira jobsDNS jobsUNIX jobsIT infrastructure jobsData Analytics jobsIndustrial jobsSOX jobsBanking jobsNIST 800-53 jobsKPIs jobsGCIH jobsSANS jobs