Logging & Asset Management Specialist - USDS

TikTok
London
1 year ago
Applications closed

Related Jobs

View all jobs

JUNIOR DATA GOVERNANCE ANALYST

IT Support Engineer

Devops Engineer

Senior Risk And Compliance Specialist

NET Developer

Junior Information Security Analysist

TikTok is the leading destination for short-form mobile video. Our mission is to inspire creativity and bring joy. . Data Security (“USDS”) is a subsidiary of TikTok in the . This new, security-first division was created to bring heightened focus and governance to our data protection policies and content assurance protocols to keep . users safe. Our focus is on providing oversight and protection of the TikTok platform and . user data, so millions of Americans can continue turning to TikTok to learn something new, earn a living, express themselves creatively, or be entertained. The teams within USDS that deliver on this commitment daily span across Trust & Safety, Security & Privacy, Engineering, User & Product Ops, Corporate Functions and more.Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible. Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day. To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always. At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve. Join us. The Security Operations team's primary focus is management of security and defense platforms, technologies, tools, and services supporting security controls across TikTok's environments. As a Logging and Analytics Platform Operations Specialist, you will be responsible for supporting the Logging and Analytics Platform Operations Lead and cross functional partners in deploying, integrating, and managing, technologies to support the security and protection of data in accordance with relevant geographical regulations, contractual commitments, and confidentiality requirements. In your capacity as a key contributor within Security Operations, you are part of a team that manages the design, engineering, and deployment of tools and technologies to monitor our global infrastructure footprint to validate data inventory, access and protection, and security of our vast infrastructure of data center, SaaS, and IaaS. This will include servicability and continuing improvement of technology platforms, technologies, and services as well as oversight to your team as they manage operational configuration updates to security tools and validate effectiveness. Further, you and your team will create a strategy for the control environment to enable and protect TikTok's infrastructure, technologies, and services. This will entail understanding requirements, designing controls, and ultimately managing the on-going operation of those controls. The candidate must be skilled in conducting technical analysis of security logs and business problems, as well as threats, incidents, investigations, workforce protection, and other general security-related issues. The candidate must also have the ability to communicate well, participate in coordinating response and defensive actions over a variety of security disciplines, and disseminate security information as appropriate in support of TikTok's critical business, go to market, and operational infrastructure needs. Responsibilities:• Determine requirements and deploy logging capabilities across applications, infrastructure, databases, and networks• Develop strategy for ingestion and extraction of log data from various sources, including integrations with SIEM• Define conditions and logic to identify unauthorized / inappropriate activities and indicators of compromise, including triage and escalation of suspected events• Optimize and tune existing correlation rules and alerts to reduce false positives• Develop and apply data models to event logs for advanced analytics• Support root cause analysis, debugging, post-mortem analysis of cybersecurity incidents in partnership with other security functions• Develop and report metrics on logging capabilities and trends based on analysis• Perform analysis of logging and monitoring coverage and onboard new data sources• Review and assess utilization of logging and monitoring tooling• Develop standard operating procedures and trainings for each technology• Architect and continuously improve security technology stack, process and procedures, support model and cross-function interactions• Define and execute (as needed) procedures to validate the effectiveness of the design, deployment, and management of security controls that aim to maintain confidentiality, integrity, and availability of enterprise data assets and technology platforms

Minimum Qualifications:• Bachelors’ Degree or industry equivalent work experience in cybersecurity, international security architecture, and/or engineering in a converged security program• 2+ years applicable experience• High degree of integrity and trustworthiness and the ability to lead and inspire change• Demonstrate ability to quickly assimilate to new knowledge and remain current on new developments in cybersecurity capabilities and industry knowledge• In-depth experience in the following:• Asset management Preferred Qualifications:• CISSP, SSCP, CAP, CCSP, CISM, CSX-P or applicable experience in the Information Security field• Experience with microservice architecture (Message Queues, Function-as-a-Service, • Experience using one or more programming/scripting languages (., Python, Go, Java, • Experience with Elastic Search or similar technologies• Familiarity with source code management tools (., Github, Gitlab)• Familiarity with securing data across SaaS and IaaS cloud platforms (., AWS, Google Cloud Platform)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Write a Cyber Security Job Ad That Attracts the Right People

Cyber security is now a board-level priority for organisations across the UK. From financial services and healthcare to critical infrastructure, SaaS platforms and the public sector, demand for skilled cyber security professionals continues to grow. Yet despite this demand, many employers struggle to attract the right candidates. Cyber security job adverts often generate large volumes of applications, but few are a genuine match. Meanwhile, experienced security engineers, analysts and architects quietly ignore adverts that feel vague, unrealistic or disconnected from real security work. In most cases, the problem is not a lack of talent — it is the quality of the job advert. Cyber security professionals are trained to assess risk, spot weaknesses and question assumptions. A poorly written job ad signals organisational immaturity and weak security culture. A well-written one signals seriousness, competence and trust. This guide explains how to write a cyber security job ad that attracts the right people, improves applicant quality and positions your organisation as a credible security employer.

Maths for Cyber Security Jobs: The Only Topics You Actually Need (& How to Learn Them)

If you are applying for cyber security jobs in the UK it can feel like “real security people” must be brilliant at maths. The reality is simpler: most roles do not need degree-level pure maths. What they do need is confidence with a small set of practical topics that show up repeatedly in day-to-day work across SOC, incident response, cloud security, AppSec, threat detection, IAM & security engineering. This guide strips the maths down to what actually helps you get hired. It includes a 6-week learning plan plus portfolio projects you can publish to prove the skills. You will focus on: Number systems & bitwise thinking (binary, hex, bytes, XOR) Modular arithmetic basics (enough to understand how modern crypto “works”) Probability & statistics for detection, triage & risk Discrete maths for logic, sets, graphs & complexity Security maths habits: estimation, false positive control & evidence-led reporting You will not waste time on heavy theory that rarely appears in junior or mid-level cyber security roles.

Neurodiversity in Cyber Security Careers: Turning Different Thinking into a Superpower

Cyber security is all about thinking like an attacker, spotting unusual patterns, protecting systems & responding calmly when everything looks like it’s on fire. It’s a discipline built on curiosity, persistence & noticing things other people miss. That’s exactly why it can be such a good fit for many neurodivergent people. If you live with ADHD, autism or dyslexia, you may have been told your brain is “too distracted”, “too literal” or “too disorganised” for a security role. In reality, the traits that can make traditional office work tough often line up beautifully with cyber security work – from hyperfocus in incident response to meticulous analysis in threat hunting. This guide is written for cyber security job seekers in the UK. We’ll look at: What neurodiversity means in a cyber context How ADHD, autism & dyslexia strengths map to different security roles Practical workplace adjustments you can ask for under UK law How to talk about neurodivergence during applications & interviews By the end, you’ll have a clearer sense of where you might thrive in cyber security – & how to turn “different thinking” into a genuine superpower.