Software Engineer, Threat Intelligence
Singapore, Singapore
⚠️ We'll shut down after Aug 1st - try foo🦍 for all jobs in tech ⚠️
TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. TikTok has global offices including Los Angeles, New York, London, Paris, Berlin, Dubai, Singapore, Jakarta, Seoul and Tokyo.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
This team is a group of experts who keep an eye on the web for any signs of trouble and danger from people with malicious intentions. They use various ways to gather, study, and share information about the current and future cyber dangers that could harm the organization or its customers. They also provide advice and help on how to avoid, find, and deal with these dangers, and help to make the organization more secure. This team is a very important part of the organization’s cyber security plan and protection.
Responsibilities
1. Responsible for analysis, investigation and traceability of underground/blackmarket industry cases.
2. Perform real-time analysis and trending of security log data from various security devices and systems, leveraging on in-depth analysis of understand industry exploitation chains and knowledge of most underground sources in non-China areas.
3. Respond to user incident reports and evaluates the type and severity of security events.
4. Maintain data sources feeding the log monitoring system, develop and maintain detection and alerting rules.
5. Identify recurring security issues and risks and develops mitigation plans and recommends process improvements.
6. Constantly keep up with the latest attacks in the underground industry, identify business logic risks and independently conduct traceability or investigation.
7. In-depth analysis of underground industry exploitation chains, knowledge of most underground sources in non-China areas.
8. In-depth understanding of various business risks such as eCommerce/Payment business with the ability to lead discovery, data analysis, investigation, evidence collection, traceability analysis and communication with business teams.
9. Research, design, and develop computer and network software or specialised utility programs.
10. Analyse user needs and develop software solutions, applying principles and techniques of computer science, engineering, and mathematical analysis.
11. Update software, enhances existing software capabilities, and develops and direct software testing and validation procedures.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
1
0
0
Categories:
Security Engineering Jobs
Threat Intel Jobs
Tags: Computer Science E-commerce Ecommerce Monitoring Threat intelligence
Perks/benefits: Team events
Region:
Asia/Pacific
Country:
Singapore
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Senior Cybersecurity Engineer jobsSenior Security Analyst jobsIT Security Analyst jobsSenior Information Security Analyst jobsInformation System Security Officer jobsSenior Cloud Security Engineer jobsCyber Security Specialist jobsSecurity Operations Engineer jobsSenior Product Security Engineer jobsInformation Security Manager jobsInformation System Security Officer (ISSO) jobsSenior Network Security Engineer jobsSenior Cyber Security Engineer jobsSenior Information Security Engineer jobsSecurity Consultant jobsChief Information Security Officer jobsSecurity Specialist jobsInformation Systems Security Engineer jobsCyber Threat Intelligence Analyst jobsIT Security Engineer jobsSenior Software Engineer jobsNetwork Engineer jobsCybersecurity Specialist jobsSecurity Operations Analyst jobsSoftware Engineer jobs
Security assessment jobsEDR jobsBash jobsEncryption jobsTS/SCI jobsSDLC jobsIDS jobsRMF jobsSQL jobsThreat detection jobsITIL jobsSplunk jobsCompTIA jobsMalware jobsTerraform jobsIPS jobsFinance jobsTop Secret jobsOWASP jobsSOC 2 jobsForensics jobsDocker jobsActive Directory jobsGIAC jobsClearance Required jobs
DoDD 8570 jobsCRISC jobsOSCP jobsHIPAA jobsMITRE ATT&CK jobsTCP/IP jobsIntrusion detection jobsVPN jobsCCSP jobsSOAR jobsZero Trust jobsAnsible jobsJavaScript jobsUNIX jobsDNS jobsIT infrastructure jobsNIST 800-53 jobsData Analytics jobsIndustrial jobsJira jobsKPIs jobsSOX jobsGCIH jobsSANS jobsMachine Learning jobs