Security Operations Analyst Detection Engineering & Threat Hunting

London, United Kingdom

Job Description

TikTok's IT security team is responsible for enterprise IT global cyber security, server security, endpoint security, application security construction, and protection work. They work to improve overall IT security capabilities and security posture, providing security processes, security assessments, security operations, and security vulnerability management services. The team also supports IT teams and business departments in meeting their security requirements.
Responsibilities
- Monitor security alerts and events generated by various security tools and technologies, such as SIEM, IDS/IPS, firewalls, and endpoint detection and response (EDR) systems.
- Build and tune high-fidelity detections across endpoint, identity, cloud, and SaaS telemetry sources.
- Reduce alert fatigue and false positives through improved severity tagging, disposal logic, and enrichment workflows.
- Conduct threat and scenario-driven threat hunts based on TTPs, anomalies, and threat intelligence.
- Identify and close detection gaps uncovered during incident response or hunting operations.
- Design and maintain SOAR playbooks and automation logic for triage, enrichment, and response.
- Partner with CTI and detection engineers to operationalize threat intelligence and attacker behaviors.
- Develop and maintain detection logic aligned with frameworks such as MITRE ATT&CK and MaGMa.
- Contribute scripts and tooling (e.g., Python, PowerShell) to improve investigation and response efficiency.
- Support 24/7 global SOC by contributing to alert routing, follow-the-sun workflows, and detection health monitoring.
- Assist in post-incident reviews to drive continuous improvement of detection coverage and response workflows.
- Coordinate Security Incident Response lessons learnt and post-mortem activities with XFN stakeholders.
Qualifications:
Minimum Qualifications:
- Bachelor's degree in Computer Science, Cyber Security, or STEM field.
- Experience working in or supporting a 24/7 global security operations environment.
- Strong proficiency with SIEM platforms (e.g., Splunk, Chronicle, Elastic) and EDR tools (e.g., SentinelOne, CrowdStrike).
- Hands-on experience writing and tuning detection logic (e.g., Sigma, EQL, KQL, YARA).
- Deep understanding of attacker tactics and techniques (MITRE ATT&CK, threat modeling).
- Scripting ability in Python or similar languages to support automation, enrichment, or detection-as-code workflows.
- Experience conducting investigations using logs from identity providers, endpoints, cloud, and network telemetry.
Preferred Qualifications:
- Familiarity with SOAR platforms and automation of incident response tasks.
- Experience with detection-as-code pipelines, GitOps, or CI/CD rule deployment.
- Experience contributing to threat hunt frameworks or purple team exercises.
- Knowledge of red teaming, penetration testing, malware analysis, or digital forensics.

Skills Required

Beware of fraud agents! do not pay money to get a job

MNCJobs.co.uk will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Related Jobs

Job Detail

  • Job Id
    JD4178192
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Full Time
  • Job Location
    London, United Kingdom
  • Education
    Not mentioned