Software Engineer, Threat Intelligence
Singapore, Singapore
TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. TikTok has global offices including Los Angeles, New York, London, Paris, Berlin, Dubai, Singapore, Jakarta, Seoul and Tokyo.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Categories:
Security Engineering Jobs
Threat Intel Jobs
Tags: Computer Science E-commerce Ecommerce Monitoring Threat intelligence
Perks/benefits: Team events
Region:
Asia/Pacific
Country:
Singapore
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Security Analyst jobsSenior Cloud Security Engineer jobsInformation System Security Officer jobsInformation Security Manager jobsSenior Cybersecurity Engineer jobsSenior Network Security Engineer jobsInformation Security Specialist jobsSecurity Consultant jobsSenior Penetration Tester jobsSecurity Specialist jobsSenior Information Security Analyst jobsSenior Cyber Security Engineer jobsIT Security Engineer jobsCyber Security Specialist jobsChief Information Security Officer jobsIT Security Analyst jobsPrincipal Security Engineer jobsStaff Security Engineer jobsCloud Security Architect jobsInformation System Security Officer (ISSO) jobsCyber Security Architect jobsSenior Product Security Engineer jobsSystems Engineer jobsSenior Information Security Engineer jobsSecurity Operations Analyst jobs
CI/CD jobsSaaS jobsForensics jobsMalware jobsEncryption jobsEDR jobsTop Secret jobsSplunk jobsSDLC jobsIDS jobsIPS jobsSQL jobsRMF jobsCompTIA jobsBash jobsIntrusion detection jobsDocker jobsFinance jobsThreat detection jobsDoDD 8570 jobsOWASP jobsITIL jobsActive Directory jobsTCP/IP jobsCRISC jobs
Terraform jobsVPN jobsGIAC jobsSANS jobsUNIX jobsBanking jobsHIPAA jobsIT infrastructure jobsClearance Required jobsJavaScript jobsSOX jobsAnsible jobsPolygraph jobsDNS jobsCCSP jobsJira jobsData Analytics jobsMITRE ATT&CK jobsSOC 2 jobsOSCP jobsGCIH jobsCISO jobsSOAR jobsMachine Learning jobsCyber defense jobs