Endpoint Security Engineer
Role details
Job location
Tech stack
Job description
technical validation, security operations, and drives engineering enhancements, including the deployment, configuration, and maintenance of security technologies across various domains. This role will define enterprise security technical controls and implement validation mechanisms within TikTok environments to ensure effectiveness and compliance. It will also include offensive security activities to assess the strength of existing response measures. By working with cross-functional teams, the role will establish a measurable and repeatable process to enhance the security posture of the organization continuously. Responsibilities - Build automated, repeatable validation workflows using infrastructure-as-code and automation frameworks to continuously validate technical control efficacy across servers (Linux/Windows), endpoints (macOS/Windows), email systems, IoT devices, and physical infrastructure. - Conduct STRIDE-based threat modeling on new services/infrastructure, building secure design libraries (cryptography, input validation) to enforce patterns and prevent vulnerabilities. Plan and execute assessments to test host-based detection/prevention controls under realistic attack scenarios, including EDR evasion, defense-bypass methods, and post-exploitation tradecraft. - Design and implement fault-tolerant, real-time data ingestion pipelines (Apache Flink/Spark Streaming, Kafka) and columnar data lakes (ClickHouse) to process petabytes of global endpoint security telemetry (HIDS, EDR, NDR, audit logs, IDS/IPS). - Build technical roadmaps and lead full-stack development of internal endpoint security tools, including technical validation platforms, scanners, secrets management integrations, and IAM policy engines - from gRPC/Protobuf API design to Kubernetes deployment with Istio service mesh. - Develop and harden core detection engineering platforms, enabling Sigma/YARA-L rule codification, automated backtesting against historical data, and CI/CD deployment to SIEM (Splunk ES, Chronicle) and EDR endpoints. - Research emerging MITRE ATT&CK TTPs, prototype behavioral analytics and ML-driven anomaly detection models to identify stealthy adversaries evading traditional signature-based defenses, and establish measurable technical security controls aligned to NIST, CIS, and MITRE ATT&CK frameworks for enterprise environments spanning servers, endpoints, email, IoT, and physical infrastructure. - Build low-code/no-code validation playbooks and microservices to automate technical validation workflows, integrating with CMDBs, ITSM tools, and infrastructure APIs for issue remediation.
Requirements
Minimum Qualifications: - Platform & Infrastructure Expertise: Deep hands-on experience with server (Linux, Windows), Kubernetes, and enterprise endpoint (macOS, Windows) technologies, with a track record of balancing security posture against operational and user-experience requirements. - Adversary Simulation Experience: Proven experience simulating advanced threat actor behavior in live, production-scale environments using Breach-and-Attack Simulation (BAS) frameworks and tooling. - Threat Intelligence: Deep working knowledge of attacker Tactics, Techniques, and Procedures (TTPs) mapped to the MITRE ATT&CK framework, with experience translating threat intelligence into actionable detection rules. - Engineering & Development: Proficiency in at least one programming or scripting language (Python, Go, Bash, or C/C++) with strong debugging and automation skills. - Offensive Security: Strong understanding of EDR evasion techniques, defense-bypass methods, and post-exploitation tradecraft. Preferred Qualifications - Automation & Tooling: Hands-on experience building security automation pipelines using infrastructure-as-code and CI/CD tooling (e.g., Ansible, Terraform, Jenkins, Chef, Puppet) and test-automation frameworks. - Policy & Validation: Familiarity with policy-as-code platforms (e.g., Open Policy Agent) or continuous security control validation solutions (e.g., AttackIQ, SafeBreach, Cymulate). - Purple Team Operations: Experience with purple team operations, including collaborative detection validation with blue teams, tuning detection logic, and measuring coverage against ATT&CK Navigator heatmaps.. - Cross-Domain Knowledge: Working knowledge spanning multiple security domains beyond host/endpoint - including application security (SAST/DAST), cloud security (CSPM, CWPP), network security, and data protection. - Product Development: Background in product development or engineering of enterprise security tooling (e.g., DLP engines, EDR agents, centralized logging/SIEM platforms). - Environment & Credentials: Experience operating in large-scale, globally distributed enterprises or high-velocity engineering-driven organizations. Master's degree in Computer Science, Information Security, or a related technical discipline; or relevant certifications such as OSCP, CRTO, GPEN, CISSP, or CCSP.
Benefits & conditions
The base salary range for this position in the selected city is $156000 - $316800 annually.
Compensation may vary outside of this range depending on a number of factors, including a candidate's qualifications, skills, competencies and experience, and location. Base pay is one part of the Total Package that is provided to compensate and recognize employees for their work, and this role may be eligible for additional discretionary bonuses/incentives, and restricted stock units.
Benefits may vary depending on the nature of employment and the country work location. Employees have day one access to medical, dental, and vision insurance, a 401(k) savings plan with company match, paid parental leave, short-term and long-term disability coverage, life insurance, wellbeing benefits, among others. Employees also receive 10 paid holidays per year, 10 paid sick days per year and 17 days of Paid Personal Time (prorated upon hire with increasing accruals by tenure).
The Company reserves the right to modify or change these benefits programs at any time, with or without notice.
For Los Angeles County (unincorporated) Candidates:
Qualified applicants with arrest or conviction records will be considered for employment in accordance with all federal, state, and local laws including the Los Angeles County Fair Chance Ordinance for Employers and the California Fair Chance Act. Our company believes that criminal history may have a direct, adverse and negative relationship on the following job duties, potentially resulting in the withdrawal of the conditional offer of employment