Software Engineer, Threat Intelligence
Singapore, Singapore
TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. TikTok has global offices including Los Angeles, New York, London, Paris, Berlin, Dubai, Singapore, Jakarta, Seoul and Tokyo.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
1
0
0
Categories:
Security Engineering Jobs
Threat Intel Jobs
Tags: Computer Science E-commerce Ecommerce Monitoring Threat intelligence
Perks/benefits: Team events
Region:
Asia/Pacific
Country:
Singapore
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information System Security Officer jobsSenior Cloud Security Engineer jobsSenior Security Analyst jobsInformation Security Manager jobsInformation Security Specialist jobsSenior Cybersecurity Engineer jobsSenior Network Security Engineer jobsSecurity Consultant jobsIT Security Engineer jobsCyber Security Specialist jobsSenior Penetration Tester jobsSenior Information Security Analyst jobsSecurity Specialist jobsSenior Cyber Security Engineer jobsChief Information Security Officer jobsSystems Engineer jobsInformation System Security Officer (ISSO) jobsIT Security Analyst jobsStaff Security Engineer jobsSystems Administrator jobsCloud Security Architect jobsSenior Product Security Engineer jobsPrincipal Security Engineer jobsSecurity Operations Analyst jobsCyber Security Architect jobs
Kubernetes jobsCI/CD jobsForensics jobsSaaS jobsEncryption jobsIDS jobsSDLC jobsEDR jobsSplunk jobsIPS jobsTop Secret jobsBash jobsRMF jobsOWASP jobsIntrusion detection jobsSQL jobsThreat detection jobsCompTIA jobsFinance jobsDoDD 8570 jobsDocker jobsITIL jobsCRISC jobsActive Directory jobsGIAC jobs
Banking jobsVPN jobsTCP/IP jobsHIPAA jobsOSCP jobsUNIX jobsSANS jobsTerraform jobsMITRE ATT&CK jobsClearance Required jobsIT infrastructure jobsSOC 2 jobsSOX jobsCISO jobsDNS jobsCCSP jobsPolygraph jobsJavaScript jobsSOAR jobsJira jobsAnsible jobsIndustrial jobsCryptography jobsCyber defense jobsGCIH jobs