Logo

Endpoint Security Engineer

OKX
Hong Kong
Full time
On site

Overview

Department

IT

Job type

Full time

Compensation

Salary not specified

Location

Hong Kong

Company size

Mature [ 50+ employess ]

Ready to apply?

You're one step away - it takes less than a minute to upload your resume

Resume Assistance

See how well your resume matches this job role with our AI-powered score. By uploading your resume, you agree to our Terms of Service

Build host-based security detection capabilities and optimize existing host security policies and detection models. Handle threat alerts and incident responses to improve overall detection coverage and accuracy.

Requirements

  • Degree in information security, network security, or computer science, with 3–5 years of experience in host security.
  • Familiar with security attack and defense techniques; experienced in building and operating host security systems; in-depth knowledge of intrusion methods and detection techniques for both office and production networks.
  • Proficient in macOS and Linux systems, with experience in optimizing host behavior data collection and improving host data quality and integrity.
  • Familiar with mainstream APT attack techniques and corresponding detection methods, capable of identifying APT intrusions or attempted attacks in office or production environments.
  • Skilled in host security detection in multi-cloud environments; familiar with mainstream EDR products for both office and production networks; candidates with in-house (enterprise-side) host security construction experience are preferred.
  • Experience in enterprise-level big data analytics using tools such as Flink, Hive, Spark, ElasticSearch, and Graph technologies; practical experience in using real-time and offline data for threat modeling is a plus.
  • Strong logical thinking and communication skills, with solid awareness of compliance and legal considerations.
  • Responsibilities

  • Build host-based security detection capabilities, including but not limited to malware analysis, intrusion detection rule management, threat modeling, and host behavior baseline modeling for both office and production environments.
  • Continuously optimize existing host security policies and detection models; handle threat alerts and incident responses to improve overall detection coverage and accuracy.
  • Optimize current host data collection and detection pipelines to enhance the quality and coverage of fundamental host security data; drive consistency and integrity between real-time and offline host data.
  • Benefits

  • Competitive total compensation package
  • L&D programs and education subsidy for employees' growth and development
  • Various team building programs and company events
  • Wellness and meal allowance
  • Comprehensive healthcare schemes for employees and dependants
  • © All rights reserved.