Logo

Data Security Engineer

OKX
Singapore
Full time

Overview

Department

IT

Job type

Full time

Compensation

Salary not specified

Location

Singapore

Company size

Mature [ 50+ employess ]

Ready to apply?

You're one step away - it takes less than a minute to upload your resume

Resume Assistance

See how well your resume matches this job role with our AI-powered score. By uploading your resume, you agree to our Terms of Service

Develop and enhance data security detection capabilities; continuously validate existing data security rules and models; improve risk identification capabilities in data security.

Requirements

  • Major in information security, network security, or computer science; 3–5 years of relevant experience in data security.
  • Familiar with the data security lifecycle, understanding the risk points and key objectives at each stage.
  • Familiar with common security offense and defense techniques, with experience in building security operations and managing data security risks; strong sensitivity to data exposure risks.
  • Familiar with data security products and detection methods such as DLP, UEBA, sensitive data identification, data encryption/decryption, and secure data sharing.
  • Experience with enterprise-level endpoint data protection solutions; experience in endpoint security, familiarity with macOS and Linux systems, and hands-on experience in data threat modeling is a plus.
  • Experience with enterprise-level big data analysis tools such as Flink, Hive, Spark, ElasticSearch, and graph technologies; hands-on experience in security data mining, analytics, or threat intelligence analysis is a plus.
  • Strong logical thinking and communication skills, with a good understanding of compliance and legal considerations.
  • Responsibilities

  • Develop and enhance data security detection capabilities, including but not limited to DLP, data encryption and data masking.
  • Continuously validate existing data security rules and models; follow up on data security incident identification, response, handling, investigation, and forensics.
  • Continuously improve risk identification capabilities in data security by optimizing detection rules and models to optimize the overall detection coverage; build data asset maps; use graph detection and other techniques to trace data flows and identify sensitive data exfiltration risks.
  • Benefits

  • Competitive total compensation package.
  • L&D programs and Education subsidy for employees' growth and development.
  • Various team building programs and company events.
  • Wellness and meal allowances.
  • Comprehensive healthcare schemes for employees and dependants.
  • More that we love to tell you along the process!
  • © All rights reserved.