OKX logo

OKX

Security Engineer (Data & Endpoint Security) at OKX

Hong Kong, Hong Kong SARFull-timeEngineeringPosted about 2 months ago

About the Role

<div class="ace-line ace-line old-record-id-Cfb8dvi9voxFkWxhNcmuJX50sZb"> <div data-page-id="ICg8dcrqNohbEMxVh0Tusc7hsZz" data-lark-html-role="root" data-docx-has-block-data="false"> <h2 class="heading-2 ace-line old-record-id-SOJTdq885oxPNjxXfuquxFfSsLW"><strong>Who We Are</strong></h2> <p>At OKX, we believe that the future will be reshaped by crypto, and ultimately contribute to every individual's freedom.&nbsp;</p> <p>OKX is a leading crypto exchange, and the developer of OKX Wallet, giving millions access to crypto trading and decentralized crypto applications (dApps). OKX is also a trusted brand by hundreds of large institutions seeking access to crypto markets. We are safe and reliable, backed by our Proof of Reserves.</p> <p>Across our multiple offices globally, we are united by our core principles: We Before Me, Do the Right Thing, and Get Things Done. These shared values drive our culture, shape our processes, and foster a friendly, rewarding, and diverse environment for every OK-er.</p> <p>OKX is part of OKG, a group that brings the value of Blockchain to users around the world, through our leading products OKX, OKX Wallet, OKLink and more.<br><br></p> </div> </div> <div class="ace-line ace-line old-record-id-Cfb8dvi9voxFkWxhNcmuJX50sZb"> <div data-page-id="ICg8dcrqNohbEMxVh0Tusc7hsZz" data-lark-html-role="root" data-docx-has-block-data="false"> <h3 class=" old-record-id-XTdtdsqSVouLY1xFBTTuSS5Lseh"><strong>About the Opportunity</strong></h3> </div> </div> <div class="ace-line ace-line old-record-id-Cfb8dvi9voxFkWxhNcmuJX50sZb"> <div data-page-id="ICg8dcrqNohbEMxVh0Tusc7hsZz" data-lark-html-role="root" data-docx-has-block-data="false"> <div class=" old-record-id-Qh1PdDa4Hoafczx01UeusRo6sPf"> <div data-lark-html-role="root"> <div class="rich-text-paragraph" data-eleid="4"><strong><span class="text-only" data-eleid="5"><span class="text-only">Job Responsibilities</span></span></strong></div> <div class="rich-text-paragraph" data-eleid="6"><strong><span class="text-only" data-eleid="7"><span class="text-only"><br>Data Security (Optional Focus Area)</span></span></strong></div> <ul class="richTextDocs-unOrderList richTextDocs-unOrderList-disc" data-eleid="8"> <li class="richTextDocs-listItem" data-eleid="9"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="10"><span class="text-only">Develop and enhance enterprise data security detection capabilities, including but not limited to DLP, sensitive data identification, data encryption/decryption, and data masking.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="11"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="12"><span class="text-only">Continuously validate and optimize existing data security rules, models, and detection strategies to improve coverage and accuracy.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="13"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="14"><span class="text-only">Participate in data security incident identification, response, investigation, and forensics.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="15"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="16"><span class="text-only">Build and maintain data asset maps; use graph-based techniques to trace data flows and identify risks of sensitive data exfiltration.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="17"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="18"><span class="text-only">Use enterprise data platforms to perform risk analytics, anomaly detection, and data-focused threat modeling.</span></span></div> </li> </ul> <div class="rich-text-paragraph" data-eleid="19"><strong><span class="text-only" data-eleid="20"><span class="text-only">Endpoint / Host Security (Optional Focus Area)</span></span></strong></div> <ul class="richTextDocs-unOrderList richTextDocs-unOrderList-disc" data-eleid="21"> <li class="richTextDocs-listItem" data-eleid="22"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="23"><span class="text-only">Build and improve host-based detection capabilities, including malware analysis, intrusion detection, threat modeling, and host behavior baseline modeling across office and production environments.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="24"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="25"><span class="text-only">Continuously refine host security policies and detection models to improve detection performance and reduce false positives.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="26"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="27"><span class="text-only">Handle host security alerts and incident response end-to-end.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="28"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="29"><span class="text-only">Enhance endpoint data collection pipelines to improve data completeness, integrity, and real-time coverage.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="30"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="31"><span class="text-only">Detect and analyze APT attacks and attempted intrusions across multi-cloud and hybrid environments; support endpoint security architecture improvements.</span></span></div> </li> </ul> <div class="rich-text-paragraph" data-eleid="32"><strong><span class="text-only" data-eleid="33"><span class="text-only"><br>Job Requirements</span></span></strong></div> <div class="rich-text-paragraph" data-eleid="34"><strong><span class="text-only" data-eleid="35"><span class="text-only"><br>Core Requirements</span></span></strong></div> <ul class="richTextDocs-unOrderList richTextDocs-unOrderList-disc" data-eleid="36"> <li class="richTextDocs-listItem" data-eleid="37"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="38"><span class="text-only">Bachelor’s degree or above in Information Security, Network Security, Computer Science, or related fields; 3–5+ years of experience in data security or host security.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="39"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="40"><span class="text-only">Strong understanding of security attack/defense techniques and enterprise security system design.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="41"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="42"><span class="text-only">Hands-on experience with data security or endpoint security products (e.g., DLP, EDR, UEBA, sensitive data identification).</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="43"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="44"><span class="text-only">Proficiency in macOS and Linux systems; experience with enterprise endpoint protection solutions.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="45"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="46"><span class="text-only">Familiarity with big data analytics platforms such as&nbsp;</span><span class="text-only text-with-abbreviation text-with-abbreviation-bottomline">Flink</span><span class="text-only">, Spark, Hive,&nbsp;</span><span class="text-only text-with-abbreviation text-with-abbreviation-bottomline">Elasticsearch</span><span class="text-only">, and graph analysis technologies.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="47"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="48"><span class="text-only">Strong analytical thinking, communication skills, and a solid understanding of compliance and legal obligations in security operations.</span></span></div> </li> </ul> <div class="rich-text-paragraph" data-eleid="49"><strong><span class="text-only" data-eleid="50"><span class="text-only">Preferred Qualifications (Any of the Below)</span></span></strong></div> <ul class="richTextDocs-unOrderList richTextDocs-unOrderList-disc" data-eleid="51"> <li class="richTextDocs-listItem" data-eleid="52"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="53"><span class="text-only">Experience designing endpoint data protection or host agent solutions.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="54"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="55"><span class="text-only">Experience detecting or analyzing APT attacks in enterprise environments.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="56"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="57"><span class="text-only">Experience in data lineage analysis, graph-based security analytics, or sensitive data flow tracing.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="58"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="59"><span class="text-only">Hands-on experience with security data models, detection rule engines, or in-house security product development.</span></span></div> </li> <li class="richTextDocs-listItem" data-eleid="60"> <div class="richTextDocs-listItem__text"><span class="text-only" data-eleid="61"><span class="text-only">Prior experience building or operating host/data security systems within an enterprise security team.<br><br></span></span></div> </li> </ul> </div> </div> </div> </div> <div class="ace-line ace-line old-record-id-Cfb8dvi9voxFkWxhNcmuJX50sZb"> <h3><strong>Perks &amp; Benefits</strong></h3> <ul> <li>Competitive total compensation package</li> <li>L&amp;D programs and education subsidy for employees' growth and development</li> <li>Various team building programs and company events</li> <li>Wellness and meal allowance</li> <li>Comprehensive healthcare schemes for employees and dependants</li> <li>More that we love to tell you along the process!<br><br><em><span class="text-only text-font-italic" data-eleid="32"><span class="text-only">Please note that Hong Kong is a group-level service hub, and&nbsp;</span><span class="text-only text-with-abbreviation text-with-abbreviation-bottomline">OKX</span><span class="text-only">&nbsp;does not carry on a business of operating a virtual asset trading platform in Hong Kong.</span></span></em></li> </ul> </div> <p>&nbsp;</p><div class="content-conclusion"><div data-lark-html-role="root"><span class="text-only" data-eleid="18"><span class="text-only"><span class="text-only" data-eleid="6">Notice:<br></span></span></span> <div data-lark-html-role="root"><span class="text-only" data-eleid="26"><span class="text-only">All official </span><span class="text-only text-with-abbreviation text-with-abbreviation-bottomline">OKX</span><span class="text-only"> vacancies are published on this website.</span></span> <span class="text-only" data-eleid="28"><span class="text-only">While roles may appear on selected third-party platforms from time to time, information on other sites may be inaccurate or outdated. </span></span><strong><span class="text-only" data-eleid="29"><span class="text-only">If in doubt, please apply directly through our official careers website.</span></span></strong></div> </div> <div data-lark-html-role="root"><span class="text-only" data-eleid="18"><span class="text-only">Information collected and processed as part of the recruitment process of any job application you choose to submit is subject to&nbsp;</span><span class="text-only text-with-abbreviation text-with-abbreviation-bottomline">OKX</span><span class="text-only">'s </span></span><a class="link rich-text-anchor __anchor-intercept-flag__ text-content-link" href="https://www.okx.com/en-eu/help/okx-candidate-privacy-notice" target="_blank" data-eleid="19" data-lark-is-custom="true" data-lark-link="true">Candidate Privacy Notice</a><span class="text-only" data-eleid="20"><span class="text-only">.</span></span></div></div>