Skip to main contentA logo with &quat;the muse&quat; in dark blue text.

Insider Risk Investigator - USDS

AT TikTok
TikTok

Insider Risk Investigator - USDS

3+ months agoWashington, DC

Viewed on June 9, 2025

Responsibilities

In order to enhance collaboration and cross-functional partnerships, among other things, at this time, our organization follows a hybrid work schedule that requires employees to work in the office 3 days a week, or as directed by their manager/department. We regularly review our hybrid work model, and the specific requirements may change at any time.

Team Intro
The USDS Insider Risk Investigations team collaborates with cross-functional partners to assess and address risks posed by employees who may jeopardize the security of U.S. users' data. We investigate incidents such as data breaches, intellectual property theft, and other policy violations.

We are looking for an experienced Insider Risk Investigator with advanced expertise in Digital Forensics and Incident Response (DFIR). In this role, you will be responsible for identifying potential insider threats across the organization, conducting thorough investigations into unauthorized access or misuse of company assets and data, applying forensic methodologies to analyze incidents, and strengthening organizational security.

Want more jobs like this?

Get Software Engineering jobs in Washington, DC delivered to your inbox every week.

By signing up, you agree to our Terms of Service & Privacy Policy.


Responsibilities
- Conduct investigations into suspected insider threats including cases involving intellectual property theft, unauthorized access/use of sensitive systems or data, fraud/embezzlement activities, or violations of internal policies.
- Utilize advanced digital forensic techniques to collect evidence from endpoints (Windows/macOS/Linux), mobile devices (iOS/Android), network logs, cloud-based services (AWS/Azure/GCP), file shares/repositories (e.g., SharePoint), databases, and other relevant sources.
- Analyze system artifacts such as registry files, event logs, browser histories/cache data/memory dumps/timelines to accurately contextualize insider actions.
- Use endpoint detection tools (EDR) or SIEM platforms to identify behavioral anomalies that may indicate malicious intent or policy violations.
- Develop workflows for identifying high-risk behaviors such as exfiltration attempts via email/cloud storage/USB devices or lateral movement within internal networks.
- Collaborate with cross-functional stakeholders including Legal teams (for compliance/litigation support), HR/Ethics teams on employee-related investigations, IT/Security teams on mitigation measures or technical controls post-investigation findings.
- Generate detailed reports summarizing investigative findings with defensible documentation while maintaining chain-of-custody principles for potential legal proceedings.
- Provide recommendations for improving proactive monitoring mechanisms/tools for early detection of insider risks across physical/digital environments.
- Stay current on emerging threats related to insider risk programs as well as best practices in forensic analysis and security incident handling frameworks.

Qualifications

Minimum Qualifications
- Bachelor's degree in Cybersecurity/Digital Forensics/Information Technology/Computer Science or equivalent professional experience in related fields.
- 5+ years of experience conducting technical investigations into cybersecurity incidents with a strong emphasis on insider risk management cases.
- Expertise in digital forensic tools such as EnCase®, FTK®, Cellebrite®, X-Ways®, AXIOM®; familiarity with scripting languages like Python/Bash/PowerShell preferred.
- Advanced knowledge of Windows/macOS/Linux operating systems at a forensic level-including file systems (NTFS/APFS/HFS+), memory analysis techniques/artifacts extraction methods/log parsing capabilities.
- Experience working with EDR solutions (e.g., CrowdStrike Falcon®, Carbon Black®) or SIEM platforms such as Splunk®/QRadar®/ArcSight® for anomaly detection during investigations.
- Familiarity with cloud service providers like AWS/Azure/GCP-specifically their logging capabilities (e.g., CloudTrail/Azure Monitor)-and cloud-native investigation techniques.

Preferred Qualifications
- Certifications in Digital Forensics and Incident Response domains: GCFE®, GCFA®, CCE®, EnCE®, CISSP®, OSCP® preferred but not required depending upon experience level validation!
- Practical hands-on training certifications like SANS FOR508/MITRE ATT&CK fundamentals mastery ideal complements too
- Extended skill flexibility needs

Client-provided location(s): Washington, DC, USA
Job ID: TikTok-7473967395750938887
Employment Type: Other

Perks and Benefits

  • Health and Wellness

    • Health Insurance
    • Dental Insurance
    • Vision Insurance
    • HSA
    • Life Insurance
    • Fitness Subsidies
    • Short-Term Disability
    • Long-Term Disability
    • On-Site Gym
    • Mental Health Benefits
    • Virtual Fitness Classes
  • Parental Benefits

    • Fertility Benefits
    • Adoption Assistance Program
    • Family Support Resources
  • Work Flexibility

    • Flexible Work Hours
    • Hybrid Work Opportunities
  • Office Life and Perks

    • Casual Dress
    • Snacks
    • Pet-friendly Office
    • Happy Hours
    • Some Meals Provided
    • Company Outings
    • On-Site Cafeteria
    • Holiday Events
  • Vacation and Time Off

    • Paid Vacation
    • Paid Holidays
    • Personal/Sick Days
    • Leave of Absence
  • Financial and Retirement

    • 401(K) With Company Matching
    • Performance Bonus
    • Company Equity
  • Professional Development

    • Promote From Within
    • Access to Online Courses
    • Leadership Training Program
    • Associate or Rotational Training Program
    • Mentor Program
  • Diversity and Inclusion

    • Diversity, Equity, and Inclusion Program
    • Employee Resource Groups (ERG)

Company Videos

Hear directly from employees about what it is like to work at TikTok.