Responsibilities
Team introduction : The security engineering-network security department of ByteDance Security and Risk Control is responsible for the construction, planning and management of the company's internal network security defense system. We are committed ...
...ities
1. Responsible for the compliance risks of Volcano Engine Principal and build technical capabilities to support busi... ...ent 2. Responsible for the design and development of cloud network compliance security products, including but not limited to traffic analysis, i...
...ystem platform architecture related to global CDN and edge computing network infrastructure
2. Responsible for providing high-quality system carrying solutions for the implementation of CDN, security, dynamic acceleration, edge computing and other products in overseas...
...ties
1. Responsible for the capacity building of ByteDance's security baseline 2. Design and development of security solutions and s... ... Node.js, familiar with common algorithms and data structures, network programming, multithreading, distributed and other technologie...
Responsibilities
1 , Responsible for ByteDance network-side security operation protection (such as attack response and protection in Anti-DDoS, WAF and other fields) 2. Responsible for the construction and improvement of ByteDance network-side security operation cap...
Roles & Responsibilities
1. Vulnerability risk convergence: building business An operational system with security risk convergence, implemented solutions to achieve vulnerability risk control goals able to complete solution review, problem discovery, exposure, and op...
Roles & Responsibilities
1. App security incidents Emergency analysis and disposal, including but not limited to reverse analysis... ...elopment experience will be given priority.
5. Have certain engineering development capabilities and be familiar with python/java/c/c...
...haracteristics of different computer room environments, design network deployment solutions that meet business needs, including physi... ...tworks and virtual networks 2. Ensure network connectivity and security isolation in the cloud environment, and pass security acceptan...
1. Responsible for security maintenance, security inspections, policy maintenance manage... ...dling and security analysis of servers, network equipment, security products, network i... ...information security, computer, network engineering, information communications and other r...
...s & Responsibilities
1. Responsible for Tencent Cloud Native security product capability operation work, continuously improve the co... ...es and make improvements.
Qualifications
1. Familiar with network attack and defense technology, familiar with common host/termi...
Responsibilities
Team IntroductionFeishu Security Algorithm Team is committed to applying the industry's leading security algorith... ... field, such as the application of models in content security, network security, data security and other fields.
Qualifications ...
...inals Emergency analysis and handling capabilities for App/OS security incidents, including but not limited to reverse analysis, deo... ...d related majors more than 3 years of Android and iOS reverse engineering experience , and familiar with JAVA/C++ programming
4. Good...
...ombination with the business 2. Participate in the research and development of requirements for high-performance scenarios of host networks 3. Participate in the development and optimization of chip network libraries.
Qualifications
1. 35 years of relevant work e...
Responsibilities
1. Responsible for the architecture design and development related to Feilian network modules, and build a highly available, highly concurrent and scalable network system 2. Responsible for the continuous evolution and optimization of VPN, proxy gat...
...e for the management of department data security and the construction and operation of t... ...security, information and communication engineering, mathematics and system science or rela... ...years of work experience in information and network security, personal data protection.
Job Responsibilities:
Manage daily operations of information security, ensuring agreed SLAs are met or exceeded, and escalation procedures are followed whenever relevant Oversee the planning, budgeting, and directing of all security operation activities across the t...
... Develop the server/SDK/API part to support the business output of the product
2. Responsible for the deployment and delivery of security products, improve the product deployment and delivery process, and improve delivery and operation and maintenance efficiency
3. ...
Responsibilities
1. Responsible for the development of mobile scanning tools in the DevSecOps ecosystem 2. Cooperate with the infrastructure team to support the implementation and use of the tools and maximize the value of the tools.
Qualifications
1. Proficie...
... 3. QUIC technology research and development, providing standardized QUIC protocol access for global users 4. Researching advanced network protocols in the industry, conducting R&D and implementation for the company based on business scenarios, and participating in the...
Responsibilities
1. Responsible ByteDance IT office network operation and maintenance, system operation and maintenance management... ...bove, major in network communications, computer, communication engineering and other related majors, and more than 3 years of network ope...
Roles & Responsibilities
1. Responsible for the account security of the big model, build risk indicators, establish a risk control system, and ensure the healthy development of the business
2. Build an identification system for abnormal accounts, verify the risk co...
...onsible for the daily operation and management of ByteDance IT network operations, including campus, backbone, and offline related sc... ...he configuration, debugging and troubleshooting of network and security equipment from mainstream domestic and foreign manufacturers s...
Roles & Responsibilities
1. Positions can be based in Beijing/Shenzhen
2. Responsible for the security assessment and reinforcement of cloud platforms, cloud services, and cloud infrastructure, identifying security risks, formulating plans and promoting risk conver...
... of video accounts and live broadcasts, and proactively explore potential risks
3. Explore the ability of the LLM model to solve security issues such as zero/few shot, long tail/complex governance standards/high response speed, etc. Achieve efficient application and i...
Roles & Responsibilities
1. Responsible for innovative security Product research and development, provide reasonable architectural design and implement its core logic based on actual business needs
2. Responsible for the code design and implementation of business p...
Roles & Responsibilities
1 .Responsible for the security project management of the PCG business line, promote the achievement of pr... ...ears of security-related work experience, familiar with common network security scenarios, computer, network space security, informat...
...ponsibilities
Responsible User privacy protection and data security of short video products, from distributed architecture to bus... ... and optimize the system architecture 3. Cooperate with other engineering and product teams to ensure the privacy security and complian...
Responsibilities
1. Ensure the security of AI-related business development, online launch and other links, review the security of business requirements, conduct code audits and interface assessments 2. Participate in penetration testing to explore security vulnerabil...
... Responsible for Tencent Full-process quality control of cloud security and ToB-related security products, participating in requiremen... ...al experience in computer and software basics such as computer networks and databases
3. Proficient in at least one programming lang...
Roles & Responsibilities
1. Responsible QQ account login security policy operation work, continuously optimize security policies through data analysis and feature extraction
2. Responsible for the QQ account theft countermeasures, restore attack methods based on in...