Job Description
TikTok is the leading destination for short-form mobile video. At TikTok, our mission is to inspire creativity and bring joy. TikTok's global headquarters are in Los Angeles and Singapore, and its offices include New York, London, Dublin, Paris, Berlin, Dubai, Jakarta, Seoul, and Tokyo.
Why Join Us
Creation is the core of TikTok's purpose. Our platform is built to help imaginations thrive. This is doubly true of the teams that make TikTok possible.
Together, we inspire creativity and bring joy - a mission we all believe in and aim towards achieving every day.
To us, every challenge, no matter how difficult, is an opportunity; to learn, to innovate, and to grow as one team. Status quo Never. Courage Always.
At TikTok, we create together and grow together. That's how we drive impact - for ourselves, our company, and the communities we serve.
Join us.
The Platform Product and Operation team is under TikTok Data-Trust and Safety. Their goal is to keep the platform running smoothly and to guarantee user safety. The business solution team is responsible for business security and user experience; Evaluate the potential compliance and various risks of the business in a qualitative and quantitative manner, propose feasible prevention and control plans, follow up on the implementation and execution of various optimization strategies, and be responsible for the long-term results of the business.
Responsibilities:
1. Familiarize oneself with various methods and presentation styles of risk content, conduct malicious content injection, and evaluate the platform's ability to identify and filter out violations.
2. Master various social engineering attack techniques, simulate phishing emails, induce clicking on links, etc., to evaluate the system's ability to detect and block cheating and fraudulent behavior.
3. Collect and organize data and logs during attack simulations, extract key indicators and reports, and output content security strategy optimization plans.
4. Collaborate with upstream and downstream business teams to identify potential security risks and propose improvement suggestions, producing risk assessment reports.
5. Design and develop security drill plans, design appropriate attack methods and techniques based on the characteristics of different scenarios and user behaviors, ensuring that simulated attacks are meaningful and effective, continuously improving the quality and efficiency of evaluations.
6. Continuously optimize solutions based on simulated attack results and feedback, taking long-term responsibility for business outcomes.