The Technology Governance team provides security advice and guidance to OKX entities across all coverage areas, including global locations support business growth by working with all teams within the company to help them achieve their goals. This team works closely with compliance and legal teams to interpret global requirements for applying for licensing or any regional requirements, and understanding them.
What You’ll Be Doing
-
Security Risk Identification and Assessment:
- Security Architecture Review: Conduct comprehensive security architecture assessments for new and existing systems using Threat Modeling methodologies to identify structural vulnerabilities before they go live.
- AI & MCP Security Assessment: Evaluate the security posture of Artificial Intelligence implementations, specifically focusing on MCP integrations, LLM interactions, and AI Agent permissions to prevent prompt injection, unauthorized data access, and excessive agency.
- Access Control Assessment: Evaluate permission control mechanisms across enterprise systems to identify over-provisioning and control deficiencies.
- Cloud Infrastructure Review: Audit cloud platform configurations and overall architecture to detect potential security vulnerabilities.
- Data Flow Analysis: Evaluate technical safeguards during critical data flows to uncover leakage risks.
- System Review: Conduct comprehensive system security reviews and design robust security hardening solutions.
-
Technical Governance Plan Design:
- AI Governance Framework: Design security standards and guardrails for AI adoption, ensuring that MCP servers, AI clients, and data connectors adhere to strict authentication and authorization policies.
- Remediation Framework Design: Design technical remediation plans and long-term governance frameworks based on identified issues.
- IAM Optimization: Design optimization paths for IAM systems based on the Principle of Least Privilege (PoLP).
- Data Protection Strategy: Formulate technical control strategies for sensitive data across its entire lifecycle.
- Tool Evaluation: Evaluate and integrate security technologies into the overall security architecture.
-
Remediation Promotion and Verification:
- Cross-Functional Collaboration: Work with technical teams to drive effective implementation of security remediations.
- Verification Testing: Design and execute technical verification tests (e.g., penetration testing) to confirm remediation effectiveness.
- Tracking Mechanism: Establish a tracking mechanism for security improvements and potential regression risks.
- Continuous Review & Reporting: Regularly review projects and consolidate results into strategic reports.
What We Look For In You
Perks & Benefits
-
Competitive total compensation package
-
L&D programs and Education subsidy for employees' growth and development
-
Various team building programs and company events
-
Wellness and meal allowances
-
Comprehensive healthcare schemes for employees and dependants
-
More that we love to tell you along the process!