Logo

Data Security Engineer

OKX
Hong Kong
Full time
On site

Overview

Department

IT

Job type

Full time

Compensation

Salary not specified

Location

Hong Kong, East Asia

Company size

Mature [ 50+ employess ]

Resume Assistance

See how well your resume matches this job role with our AI-powered score. By uploading your resume, you agree to our Terms of Service

Ready to apply?

You're one step away - it takes less than a minute to upload your resume

Develop and enhance data security detection capabilities; continuously validate existing data security rules and models; improve risk identification capabilities in data security.

Requirements

  • Major in information security, network security, or computer science; 3–5 years of relevant experience in data security.
  • Familiar with the data security lifecycle, understanding the risk points and key objectives at each stage.
  • Familiar with common security offense and defense techniques, with experience in building security operations and managing data security risks; strong sensitivity to data exposure risks.
  • Familiar with data security products and detection methods such as DLP, UEBA, sensitive data identification, data encryption/decryption, and secure data sharing.
  • Experience with enterprise-level endpoint data protection solutions; experience in endpoint security, familiarity with macOS and Linux systems, and hands-on experience in data threat modeling is a plus.
  • Experience with enterprise-level big data analysis tools such as Flink, Hive, Spark, ElasticSearch, and graph technologies; hands-on experience in security data mining, analytics, or threat intelligence analysis is a plus.
  • Strong logical thinking and communication skills, with a good understanding of compliance and legal considerations.
  • Responsibilities

  • Develop and enhance data security detection capabilities, including but not limited to DLP, data encryption and data masking.
  • Continuously validate existing data security rules and models; follow up on data security incident identification, response, handling, investigation, and forensics.
  • Continuously improve risk identification capabilities in data security by optimizing detection rules and models to optimize the overall detection coverage; build data asset maps; use graph detection and other techniques to trace data flows and identify sensitive data exfiltration risks.
  • Benefits

  • Competitive total compensation package
  • L&D programs and education subsidy for employees' growth and development
  • Various team building programs and company events
  • Wellness and meal allowance
  • Comprehensive healthcare schemes for employees and dependants
  • © All rights reserved.