Cyber Security Operations Center (CSOC) Analyst - USDS
Role details
Job location
Tech stack
Job description
About the Team The SOC team is responsible for 24x7 monitoring of multiple security-related information sources to manage incidents related to cyber, privacy, and data protection for TikTok data, infrastructure, and products. The SOC team will regularly survey the TikTok networks for signs of a breach, malware, or unauthorized access. Additionally, the SOC team is responsible for developing and maintaining incident response plans, playbooks and procedures. Finally, the SOC team will be responsible for data collection and analysis of Incident Response data.
The SOC analyzes disparate data sets when combined with threat information and other enrichment to identify incidents and drive appropriate responses to contain and minimize impact and restore normal operations. The analysis is used to ensure a consistent and coordinated response to ongoing threats ensuring TikTok can continue to operate safely and securely., As a Senior CSOC Analyst, you will be a member of TikTok's US Cyber Security Operations Center (CSOC) team. You will belong to a team of strong people, processes, and technologies with the overarching goal of detecting and responding to threats targeting TikTok's US operations and infrastructure. You'll be based in our Cyber Security Operations Center in London, UK., * Participate in incident response activities.
- Conduct technical analysis and assessments of security-related incidents, including malware analysis, packet-level analysis, and system-level forensic analysis.
- Collect and analyze disk & memory images with the intent of identifying information related to a security incident.
- Identify major threats that target TikTok users or utilize company infrastructure.
- Support the onboarding of new products, data, processes, or tools by identifying requirements by integrating them into operations (processes, playbooks, and training).
- This position is part of a 24x7 operation and requires shift work.
Requirements
- Bachelor's degree in Cybersecurity or equivalent information security, privacy, risk, compliance, project management or like discipline from an accredited college or university or measurable knowledge/experience from proven industry, military, defense, or government operations.
- 5+ years of experience handling security-related incidents
- Experience with identifying and responding to advanced threats and threat actor TTPs
- Excellent communication skills (verbal and written), ability to influence without authority.
- Demonstrated teamwork and collaboration skills, in particular in leading or contributing to global and multi-functional teams.
- Demonstrated time management, problem-solving, effort prioritization and interpersonal skills
- Must possess a high degree of integrity, be trustworthy, and have the ability to lead and inspire change
Preferred Qualifications
- Excellent fundamental knowledge of industry-standard frameworks (e.g., MITRE ATT&CK) as well as GCIA, GCIH, GREM or applicable experience in the Information Security field
- One or more programming/scripting languages (e.g., Perl, Java, Python, etc.) along with SQL - Experience writing and executing SQL queries
- Experience in performing or overseeing static/dynamic malware analysis along with performing digital forensics for incident response
- Strong Operating System Administration skills including conceptual knowledge of OS internals and experience with core service types
- Experience in cloud-hosted environments along with strong experience with UNIX/Linux and Windows environments while possessing strong analytical/problem-solving skills and cross-functional expertise across multiple IT operational and security disciplines