Logging & Asset Management Specialist - USDS

TikTok
London
10 months ago
Applications closed

Related Jobs

View all jobs

Senior Security Engineer, Application Security

Senior DevSecOps Engineer

Senior TechOps Engineer

Wagon Fitters - Mechanical Backgrounds Considered

Wagon Fitters - Mechanical Backgrounds Considered

Mechanical Fitters

TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. . Data Security (“USDS”) is a subsidiary of TikTok in the . This new, security-first division was created to bring heightened focus and governance to our data protection policies and content assurance protocols to keep . users safe. Our focus is on providing oversight and protection of the TikTok platform and . user data, so millions of Americans can continue turning to TikTok to learn something new, earn a living, express themselves creatively, or be entertained. The teams within USDS that deliver on this commitment daily span across Trust & Safety, Security & Privacy, Engineering, User & Product Ops, Corporate Functions and more.Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible. Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day. To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always. At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve. Join us. The Security Operations team's primary focus is management of security and defense platforms, technologies, tools, and services supporting security controls across TikTok's environments. As a Logging and Analytics Platform Operations Specialist, you will be responsible for supporting the Logging and Analytics Platform Operations Lead and cross functional partners in deploying, integrating, and managing, technologies to support the security and protection of data in accordance with relevant geographical regulations, contractual commitments, and confidentiality requirements. In your capacity as a key contributor within Security Operations, you are part of a team that manages the design, engineering, and deployment of tools and technologies to monitor our global infrastructure footprint to validate data inventory, access and protection, and security of our vast infrastructure of data center, SaaS, and IaaS. This will include servicability and continuing improvement of technology platforms, technologies, and services as well as oversight to your team as they manage operational configuration updates to security tools and validate effectiveness. Further, you and your team will create a strategy for the control environment to enable and protect TikTok's infrastructure, technologies, and services. This will entail understanding requirements, designing controls, and ultimately managing the on-going operation of those controls. The candidate must be skilled in conducting technical analysis of security logs and business problems, as well as threats, incidents, investigations, workforce protection, and other general security-related issues. The candidate must also have the ability to communicate well, participate in coordinating response and defensive actions over a variety of security disciplines, and disseminate security information as appropriate in support of TikTok's critical business, go to market, and operational infrastructure needs. Responsibilities:• Determine requirements and deploy logging capabilities across applications, infrastructure, databases, and networks• Develop strategy for ingestion and extraction of log data from various sources, including integrations with SIEM• Define conditions and logic to identify unauthorized / inappropriate activities and indicators of compromise, including triage and escalation of suspected events• Optimize and tune existing correlation rules and alerts to reduce false positives• Develop and apply data models to event logs for advanced analytics• Support root cause analysis, debugging, post-mortem analysis of cybersecurity incidents in partnership with other security functions• Develop and report metrics on logging capabilities and trends based on analysis• Perform analysis of logging and monitoring coverage and onboard new data sources• Review and assess utilization of logging and monitoring tooling• Develop standard operating procedures and trainings for each technology• Architect and continuously improve security technology stack, process and procedures, support model and cross-function interactions• Define and execute (as needed) procedures to validate the effectiveness of the design, deployment, and management of security controls that aim to maintain confidentiality, integrity, and availability of enterprise data assets and technology platforms

Minimum Qualifications:• Bachelors’ Degree or industry equivalent work experience in cybersecurity, international security architecture, and/or engineering in a converged security program• 2+ years applicable experience• High degree of integrity and trustworthiness and the ability to lead and inspire change• Demonstrate ability to quickly assimilate to new knowledge and remain current on new developments in cybersecurity capabilities and industry knowledge• In-depth experience in the following:• Asset management Preferred Qualifications:• CISSP, SSCP, CAP, CCSP, CISM, CSX-P or applicable experience in the Information Security field• Experience with microservice architecture (Message Queues, Function-as-a-Service, • Experience using one or more programming/scripting languages (., Python, Go, Java, • Experience with Elastic Search or similar technologies• Familiarity with source code management tools (., Github, Gitlab)• Familiarity with securing data across SaaS and IaaS cloud platforms (., AWS, Google Cloud Platform)

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Shadowing and Mentorship in Cybersecurity: Gaining Experience Before Your First Full-Time Role

How to Find Mentors, Build Industry Connections, and Develop Real-World Skills in a Rapidly Evolving Field Introduction Cybersecurity has become one of the most crucial, fast-growing fields in the tech industry—yet it can also be one of the most challenging areas to break into for new professionals. As cyber threats escalate worldwide, organisations of all shapes and sizes are looking for skilled individuals who can protect their data, systems, and networks from attacks. Whether your ultimate aim is to become a penetration tester, security analyst, incident responder, threat intelligence expert, or compliance specialist, the path to a full-time cybersecurity role typically requires more than just theoretical knowledge. This is where shadowing and mentorship come into play. Working alongside an experienced cybersecurity professional allows you to see how theories and frameworks apply in real-world scenarios—something textbooks, online courses, or even certifications cannot fully replicate. Mentors can provide the critical guidance, industry insights, and networking connections needed to help you progress from cybersecurity enthusiast to a confident, job-ready candidate. In this article, we explore why mentorship is so vital in cybersecurity, how job shadowing can sharpen your practical understanding, and how to secure these opportunities—whether through formal mentorship programmes or informal connections. We’ll also cover tips on demonstrating your value as a mentee, strategies for building long-term professional relationships, and ways to measure your growth so you’re ready to step into that first full-time cyber role with confidence.

Tips for Staying Inspired: How Cyber Security Pros Fuel Creativity and Innovation

Cyber security professionals face a rapidly changing digital landscape, where new threats emerge almost daily and the stakes—protecting critical data, safeguarding personal privacy, and defending entire infrastructures—could not be higher. It’s easy to be consumed by vulnerability scans, incident response workflows, and endless compliance checks. Yet, thriving in this high-pressure environment demands more than just technical know-how. It also requires creativity and innovation, which enable you to stay one step ahead of potential attackers. So how do cyber security experts remain inspired and agile, even when the challenges can feel relentless? Below, we’ll explore ten actionable strategies to help security analysts, threat hunters, penetration testers, and security engineers maintain fresh perspectives and keep innovating. If you’re looking to sharpen your problem-solving skills and rediscover the spark that drew you to cyber security in the first place, these tips can guide you toward a more fulfilling and impactful career.

Top 10 Cyber Security Career Myths Debunked: Key Facts for Aspiring Professionals

In a hyper-connected world, cyber security is no longer an afterthought—it’s a core component of modern business, government, and everyday life. From stopping ransomware attacks to safeguarding personal data, cyber security professionals shoulder a vital responsibility: keeping digital systems, networks, and data safe. Unsurprisingly, the demand for skilled cyber security talent continues to surge, offering robust and often lucrative career paths. Yet, despite the industry’s prominence, myths and misconceptions about cyber security careers abound. Is it really just about hacking? Do you need to be a superhuman coder with years of experience? Or is cyber security just a niche field, reserved for tech giants? At CyberSecurityJobs.tech, we see firsthand how these myths deter capable individuals from entering or advancing in one of the most dynamic fields in tech. This article aims to bust the top 10 cyber security career myths—providing clear, evidence-based insights into what it really takes to thrive in this ever-evolving domain. Whether you’re a recent graduate exploring the field, a mid-career professional seeking a pivot, or simply curious about the prospects, read on to discover the true breadth and promise of cyber security careers.