Logo

Data Security Engineer

OKX
Develop and enhance data security detection capabilities; continuously validate existing data security rules and models; improve risk identification capabilities in data security.

Overview

Department

IT

Job type

Full time

Compensation

Salary not specified

Location

Singapore, Southeast Asia

Resume Assistance

See how well your resume matches this job role with our AI-powered score. By uploading your resume, you agree to our Terms of Service

Ready to apply?

You're one step away - it takes less than a minute to upload your resume

You're one step away - it takes less than a minute to upload your resume

Requirements

  • Major in information security, network security, or computer science; 3–5 years of relevant experience in data security.
  • Familiar with the data security lifecycle, understanding the risk points and key objectives at each stage.
  • Familiar with common security offense and defense techniques, with experience in building security operations and managing data security risks; strong sensitivity to data exposure risks.
  • Familiar with data security products and detection methods such as DLP, UEBA, sensitive data identification, data encryption/decryption, and secure data sharing.
  • Experience with enterprise-level endpoint data protection solutions; experience in endpoint security, familiarity with macOS and Linux systems, and hands-on experience in data threat modeling is a plus.
  • Experience with enterprise-level big data analysis tools such as Flink, Hive, Spark, ElasticSearch, and graph technologies; hands-on experience in security data mining, analytics, or threat intelligence analysis is a plus.
  • Strong logical thinking and communication skills, with a good understanding of compliance and legal considerations.
  • Responsibilities

  • Develop and enhance data security detection capabilities, including but not limited to DLP, data encryption and data masking.
  • Continuously validate existing data security rules and models; follow up on data security incident identification, response, handling, investigation, and forensics.
  • Continuously improve risk identification capabilities in data security by optimizing detection rules and models to optimize the overall detection coverage; build data asset maps; use graph detection and other techniques to trace data flows and identify sensitive data exfiltration risks.
  • Benefits

  • Competitive total compensation package.
  • L&D programs and Education subsidy for employees' growth and development.
  • Various team building programs and company events.
  • Wellness and meal allowances.
  • Comprehensive healthcare schemes for employees and dependants.
  • More that we love to tell you along the process!
  • © All rights reserved.