About the company
About OKX OKX is a leading crypto trading app, and a Web3 ecosystem. Trusted by more than 20 million global customers in over 180 international markets, OKX is known for being the fastest and most reliable crypto trading app of choice for investors and professional traders globally. Our Singapore office is a Product and Engineering hub and we are in the progress of expanding our teams in Singapore for the continuous growth of our global business. We build and maintain core trading platform with millions of daily active users. Design, Product and Engineering teams work cross-functionally to identify customer needs, and ship high-quality new features through fast iterations.
Job Summary
You’ll Be Doing
📍Security Risk Identification and Assessment: 📍Security Architecture Review: Conduct comprehensive security architecture assessments for new and existing systems using Threat Modeling methodologies to identify structural vulnerabilities before they go live. 📍AI & MCP Security Assessment: Evaluate the security posture of Artificial Intelligence implementations, specifically focusing on MCP integrations, LLM interactions, and AI Agent permissions to prevent prompt injection, unauthorized data access, and excessive agency. 📍Access Control Assessment: Evaluate permission control mechanisms across enterprise systems to identify over-provisioning and control deficiencies. 📍Cloud Infrastructure Review: Audit cloud platform configurations and overall architecture to detect potential security vulnerabilities. 📍Data Flow Analysis: Evaluate technical safeguards during critical data flows to uncover leakage risks. 📍System Review: Conduct comprehensive system security reviews and design robust security hardening solutions. 📍Technical Governance Plan Design: 📍AI Governance Framework: Design security standards and guardrails for AI adoption, ensuring that MCP servers, AI clients, and data connectors adhere to strict authentication and authorization policies. 📍Remediation Framework Design: Design technical remediation plans and long-term governance frameworks based on identified issues. IAM Optimization: Design optimization paths for IAM systems based on the Principle of Least Privilege (PoLP). 📍Data Protection Strategy: Formulate technical control strategies for sensitive data across its entire lifecycle. 📍Tool Evaluation: Evaluate and integrate security technologies into the overall security architecture. 📍Remediation Promotion and Verification: 📍Cross-Functional Collaboration: Work with technical teams to drive effective implementation of security remediations. 📍Verification Testing: Design and execute technical verification tests (e.g., penetration testing) to confirm remediation effectiveness. 📍Tracking Mechanism: Establish a tracking mechanism for security improvements and potential regression risks. 📍Continuous Review & Reporting: Regularly review projects and consolidate results into strategic reports.
What We Look For In You
Education and Experience: 📍Bachelor’s degree or higher in Computer Science, Information Security, or a related technical field. 📍At least 5 years of experience in security technology or security operations, with clear experience in security governance. 📍Familiarity with large-scale enterprise IT environments, multi-cloud/hybrid cloud models, and modern AI technology stacks. 📍Technical Skills: 📍Architecture & Threat Modeling: Proficiency in performing Security 📍Architecture Reviews and Threat Modeling (e.g., STRIDE, PASTA); ability to dissect complex microservices and distributed systems. 📍AI Security Knowledge: Deep understanding of AI/LLM security risks (e.g., OWASP Top 10 for LLM), including secure design of MCP, RAG (Retrieval-Augmented Generation) architectures, and AI Agent sandboxing. 📍Cloud Security: Proficient in cloud security architecture (AWS, Alibaba Cloud). IAM Knowledge: Strong understanding of identity protocols (RBAC, OAuth, ABAC) and their integration. Data Security: Technical knowledge of DLP, encryption, and data masking best practices. Automation & Tools: Capability in Python/Shell scripting and familiarity with security tools (SIEM, WAF, etc.).
If this role isn’t the perfect fit, there are plenty of exciting opportunities in blockchain technology, cryptocurrency startups, and remote crypto jobs to explore. Check them on our Jobs Board.



