Software Engineer - Threat Intelligence
Singapore, Singapore
TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. TikTok has global offices including Los Angeles, New York, London, Paris, Berlin, Dubai, Singapore, Jakarta, Seoul and Tokyo.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Security Engineering Jobs
Threat Intel Jobs
Tags: Computer Science E-commerce Ecommerce Monitoring Threat intelligence
Perks/benefits: Team events
Region:
Asia/Pacific
Country:
Singapore
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information System Security Officer jobsSenior Security Analyst jobsSenior Cloud Security Engineer jobsInformation Security Manager jobsInformation Security Specialist jobsSenior Cybersecurity Engineer jobsSenior Network Security Engineer jobsSecurity Consultant jobsSenior Penetration Tester jobsIT Security Engineer jobsSenior Information Security Analyst jobsSecurity Specialist jobsCyber Security Specialist jobsSenior Cyber Security Engineer jobsChief Information Security Officer jobsInformation System Security Officer (ISSO) jobsIT Security Analyst jobsStaff Security Engineer jobsSystems Engineer jobsSystems Administrator jobsPrincipal Security Engineer jobsCloud Security Architect jobsSenior Product Security Engineer jobsSecurity Operations Analyst jobsCybersecurity Specialist jobs
CI/CD jobsMalware jobsSaaS jobsForensics jobsEDR jobsEncryption jobsSDLC jobsIDS jobsSplunk jobsBash jobsIPS jobsTop Secret jobsRMF jobsOWASP jobsIntrusion detection jobsSQL jobsThreat detection jobsFinance jobsCompTIA jobsDocker jobsDoDD 8570 jobsITIL jobsCRISC jobsActive Directory jobsGIAC jobs
HIPAA jobsTCP/IP jobsVPN jobsBanking jobsMITRE ATT&CK jobsUNIX jobsTerraform jobsOSCP jobsIT infrastructure jobsClearance Required jobsSANS jobsCISO jobsSOX jobsSOC 2 jobsPolygraph jobsDNS jobsJavaScript jobsCCSP jobsAnsible jobsIndustrial jobsSOAR jobsJira jobsCyber defense jobsCryptography jobsGCIH jobs