Responsibilities
Team Introduction:
The mission of TikTok's Global Security Organization is to build and earn trust by reducing risk and securing our businesses and products. Also known as "GSO", this team is the foundation of our efforts to keep TikTok safe, secure, and operating at scale for over 1 billion people around the world. We work to ensure that the TikTok platform is safe and secure, that our users' experience and their data remains safe from external or internal threats, and that we comply with global regulations wherever TikTok operates.
Trust is one of TikTok's biggest initiatives, and security is integral to our success. In whatever ways users interact with us - whether they're watching videos on their For You page, interacting with a Live video, or buying products on TikTok Shop - GSO protects their data and privacy, so they can have a secure and trustworthy experience.
Want more jobs like this?
Get jobs in Singapore delivered to your inbox every week.
As a Security Engineer on TikTok's Threat Detection and Response, Product Security team, you'll be at the forefront of our product defense strategy. You'll lead responses to product security incidents, collaborating closely with various teams to triage, conduct thorough root cause analysis, and drive remediation efforts to secure our platform.
Responsibilities
- Security Vulnerability Management: Identify, analyze, document, and coordinate the remediation of security weaknesses and potential attack methods in code and systems.
- Incident Response & Mitigation: Manage and respond to cybersecurity incidents, pinpointing affected systems and clearly outlining risks and exposures.
- External Collaboration & Communication: Engage with external security experts and communicate complex technical information effectively to diverse audiences.
- Strategic Problem Solving & Automation: Analyze complex security issues, develop clear and practical solutions, execute tasks with meticulous attention to detail, and develop automated solutions and scripts to enhance security processes.
- Program Effectiveness & Disclosure: Utilize data to measure security program effectiveness and coordinate the responsible disclosure of vulnerabilities.
- Vulnerability Scanning Operations: Operate and manage vulnerability scanning platforms, interpreting results to identify and prioritize security issues.
Qualifications
Minimum Qualifications:
- Security Vulnerability Analysis: Proven experience in identifying and understanding security weaknesses, including how they can be exploited, with a thorough understanding of common vulnerabilities like the OWASP Top 10. This involves analyzing potential attack methods from code and concepts, pinpointing affected systems or applications, and clearly documenting the risks and exposures.
- Security Incident Handling: Experience with managing and responding to cybersecurity incidents, ensuring a structured approach to addressing security breaches.
- Collaboration with Security Researchers: Demonstrated ability to work effectively and technically with external security experts, fostering open and productive discussions about security.
- Vulnerability Scanning Expertise: Experience operating and interpreting results from vulnerability scanning platforms, such as Qualys, including configuring scans, analyzing findings, generating reports, and collaborating on remediation with asset owners.
- Automation Tool Development: Experience in developing and scripting tools to automate security processes.
- Educational Background: A Bachelor's degree in Computer Science or a related field, with Related Certifications: BSCP, OSCP, OSWE, OSCE3.
Preferred Qualifications:
- Deep Security Knowledge: A thorough understanding of exploitation techniques and effective mitigation strategies across diverse technology domains, with a particular focus on web and mobile technologies. Ability to judge severity and business impact, and provide precise advice on security questions.
- Secure Software Development: Familiarity with best practices for integrating security throughout the software development process; as well as Proficiency in programming languages such as Python, Go, and JavaScript.
- Leading Security Remediation: Capability to act as the primary point of contact for resolving critical security vulnerabilities, including coordinating action plans and verifying their effectiveness.
- Comprehensive Cybersecurity Understanding: A strong and broad grasp of various cybersecurity safeguards, covering physical, technical, and procedural controls.
- Responsible Disclosure Practices: Experience with coordinating the responsible disclosure of vulnerabilities, potentially including participation in industry groups or standard-setting bodies.
- Data-Driven Security Improvement: Experience using data and metrics to evaluate program effectiveness, identify trends, and make informed strategic decisions.