Logging & Asset Management Specialist - USDS

TikTok
London
1 year ago
Applications closed

Related Jobs

View all jobs

JUNIOR DATA GOVERNANCE ANALYST

IT Support Engineer

Devops Engineer

Junior Information Security Analysist

AWS Security Engineer

Cloud Security Pre-Sales Consultant - AWS, Azure

TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. . Data Security (“USDS”) is a subsidiary of TikTok in the . This new, security-first division was created to bring heightened focus and governance to our data protection policies and content assurance protocols to keep . users safe. Our focus is on providing oversight and protection of the TikTok platform and . user data, so millions of Americans can continue turning to TikTok to learn something new, earn a living, express themselves creatively, or be entertained. The teams within USDS that deliver on this commitment daily span across Trust & Safety, Security & Privacy, Engineering, User & Product Ops, Corporate Functions and more.Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible. Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day. To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always. At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve. Join us. The Security Operations team's primary focus is management of security and defense platforms, technologies, tools, and services supporting security controls across TikTok's environments. As a Logging and Analytics Platform Operations Specialist, you will be responsible for supporting the Logging and Analytics Platform Operations Lead and cross functional partners in deploying, integrating, and managing, technologies to support the security and protection of data in accordance with relevant geographical regulations, contractual commitments, and confidentiality requirements. In your capacity as a key contributor within Security Operations, you are part of a team that manages the design, engineering, and deployment of tools and technologies to monitor our global infrastructure footprint to validate data inventory, access and protection, and security of our vast infrastructure of data center, SaaS, and IaaS. This will include servicability and continuing improvement of technology platforms, technologies, and services as well as oversight to your team as they manage operational configuration updates to security tools and validate effectiveness. Further, you and your team will create a strategy for the control environment to enable and protect TikTok's infrastructure, technologies, and services. This will entail understanding requirements, designing controls, and ultimately managing the on-going operation of those controls. The candidate must be skilled in conducting technical analysis of security logs and business problems, as well as threats, incidents, investigations, workforce protection, and other general security-related issues. The candidate must also have the ability to communicate well, participate in coordinating response and defensive actions over a variety of security disciplines, and disseminate security information as appropriate in support of TikTok's critical business, go to market, and operational infrastructure needs. Responsibilities:• Determine requirements and deploy logging capabilities across applications, infrastructure, databases, and networks• Develop strategy for ingestion and extraction of log data from various sources, including integrations with SIEM• Define conditions and logic to identify unauthorized / inappropriate activities and indicators of compromise, including triage and escalation of suspected events• Optimize and tune existing correlation rules and alerts to reduce false positives• Develop and apply data models to event logs for advanced analytics• Support root cause analysis, debugging, post-mortem analysis of cybersecurity incidents in partnership with other security functions• Develop and report metrics on logging capabilities and trends based on analysis• Perform analysis of logging and monitoring coverage and onboard new data sources• Review and assess utilization of logging and monitoring tooling• Develop standard operating procedures and trainings for each technology• Architect and continuously improve security technology stack, process and procedures, support model and cross-function interactions• Define and execute (as needed) procedures to validate the effectiveness of the design, deployment, and management of security controls that aim to maintain confidentiality, integrity, and availability of enterprise data assets and technology platforms

Minimum Qualifications:• Bachelors’ Degree or industry equivalent work experience in cybersecurity, international security architecture, and/or engineering in a converged security program• 2+ years applicable experience• High degree of integrity and trustworthiness and the ability to lead and inspire change• Demonstrate ability to quickly assimilate to new knowledge and remain current on new developments in cybersecurity capabilities and industry knowledge• In-depth experience in the following:• Asset management Preferred Qualifications:• CISSP, SSCP, CAP, CCSP, CISM, CSX-P or applicable experience in the Information Security field• Experience with microservice architecture (Message Queues, Function-as-a-Service, • Experience using one or more programming/scripting languages (., Python, Go, Java, • Experience with Elastic Search or similar technologies• Familiarity with source code management tools (., Github, Gitlab)• Familiarity with securing data across SaaS and IaaS cloud platforms (., AWS, Google Cloud Platform)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.