About the Team
The SOC team is responsible for 24x7 monitoring of multiple security-related information sources to manage incidents related to cyber, privacy, and data protection for TikTok data, infrastructure, and products. The SOC team regularly surveys the TikTok networks for signs of a breach, malware, or unauthorized access. The team also develops and maintains incident response plans, playbooks, and procedures, and collects and analyzes incident response data.
Responsibilities
The SOC analyzes disparate data sets combined with threat information and other enrichment to identify incidents and drive appropriate responses to contain and minimize impact and restore normal operations. This analysis ensures a consistent and coordinated response to ongoing threats, keeping TikTok operating safely and securely.
About the Role
As a CSOC Analyst, you will be a member of TikTok's US Cyber Security Operations Center (CSOC) team. You will belong to a team of strong people, processes, and technologies with the overarching goal of detecting and responding to threats targeting TikTok's US operations and infrastructure. You will be based in our Cyber Security Operations Center in London, UK.
Duties and Responsibilities
- Participate in incident response activities.
- Conduct technical analysis and assessments of security-related incidents, including malware analysis, packet-level analysis, and system-level forensic analysis.
- Collect and analyze disk & memory images with the intent of identifying information related to a security incident.
- Identify major threats that target TikTok users or utilize company infrastructure.
- Support the onboarding of new products, data, processes, or tools by identifying requirements by integrating them into operations (processes, playbooks, and training).
- This position is part of a 24x7 operation and requires shift work.
Minimum Qualifications
- Bachelor’s degree in Cybersecurity or equivalent information security, privacy, risk, compliance, project management or related discipline from an accredited college or university; or measurable knowledge/experience from proven industry, military, defense, or government operations.
- 3+ years of experience handling security-related incidents.
- Experience with identifying and responding to advanced threats and threat actor TTPs.
- Excellent communication skills (verbal and written), ability to influence without authority.
- Demonstrated teamwork and collaboration skills, in particular in leading or contributing to global and multi-functional teams.
- Demonstrated time management, problem-solving, effort prioritization and interpersonal skills.
- Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change.
Preferred Qualifications
- Excellent fundamental knowledge of industry-standard frameworks (e.g., MITRE ATT&CK) and GCIA, GCIH, GREM or applicable experience in the Information Security field.
- One or more programming/scripting languages (e.g., Perl, Java, Python, etc.) along with SQL – experience writing and executing SQL queries.
- Experience in performing or overseeing static/dynamic malware analysis along with performing digital forensics for incident response.
- Strong Operating System Administration skills including conceptual knowledge of OS internals and experience with core service types.
- Experience in cloud-hosted environments along with strong experience with UNIX/Linux and Windows environments while possessing strong analytical/problem-solving skills and cross-functional expertise across multiple IT operational and security disciplines.
#J-18808-Ljbffr