Logo

Senior Engineer - Network Security

OKX
Hong Kong
Full time

Overview

Department

IT

Job type

Full time

Compensation

Salary not specified

Location

Hong Kong

Company size

Mature [ 50+ employess ]

Ready to apply?

You're one step away - it takes less than a minute to upload your resume

Resume Assistance

See how well your resume matches this job role with our AI-powered score. By uploading your resume, you agree to our Terms of Service

Build data security detection capabilities and continuously validate existing data security rules and models. Improve risk identification capabilities and enhance detection levels through data security rules and models.

Requirements

  • Having a background in information security, network security, or computer related fields, with 3 to 5 years of work experience in data security
  • Familiar with the data security lifecycle, understand the data security risk points and key construction work content of each lifecycle;
  • Familiar with common security attack and defense techniques, capable of security operation and construction, with rich experience in discovering and managing data security risks, and data sensitivity
  • Familiar with data security products and data security detection methods, such as data leakage prevention, UEBA, sensitive data identification, data encryption and decryption, data sharing, etc;
  • Having experience and capabilities in enterprise level terminal data security, such as Endpoint DLP, Browser DLP, IM DLP, Mail DLP. Experience in host security, familiarity with Macos and Linux operating systems, and practical experience in data threat modeling are preferred;
  • Having experience and capabilities in enterprise level big data analysis, such as Flink Hive、Spark、ElasticSearch、Graph. Practical experience in information security data mining, data analysis, and intelligence analysis is preferred;
  • Strong logical thinking ability, communication and collaboration skills, compliance and legal awareness.
  • Responsibilities

  • Build data security detection capabilities, including but not limited to Endpoint DLP, Browser DLP, IM DLP, Mail DLP.
  • Continuously validate existing data security rules and models, follow up on data security incident identification, response, disposal, investigation, and evidence collection.
  • Continuously improve the risk identification capability of data security, enhance the overall detection level and coverage through data security rules and models, build data asset maps, track the data flow process through graph detection and other technologies, and identify the risks of sensitive data outsourcing.
  • © All rights reserved.