Why Work at Lenovo
Description and Requirements
Job Responsibilities:
1. As a key member of Security Operation and response team, you will support security related projects and issues.
2. This includes the development of project plans and schedules as well as the hands-on configuration and maintenance of security applications, service monitoring system, and operating systems.
3. provide recommendations for security improvements
Job Requirements:
General:
BS or MS in Computer Science, Information Security or relevant majors;
Solid understanding of Information protection and cyber security principles processes and practices.
8 years security industry experience.
Strong technical background and a passion for cyber security.
Ability to master and optimize complex processes
Ability to on global cross functional internal and external teams.
Effective verbal and written communications. Proficiency in English and Mandarin is a plus.
One or more relevant IT security certifications: CISSP, CCSP, MCDBA, IBM Certified Database Associate/Administrator, LPIC-1, Linux+, MCSA/MCSE
One or more below certifications should be a plus: ITIL, CobiT, PMP, ISO 27001 (Internal/Lead) Auditor.
Security specific:
This position requires the ability to analyze and interpret security problems and drive outstanding problems to closure. The position requires assisting in the day-to-day operations of security applications, defense in depth security principles and solution design, Cloud security principles and practices, Cyber incident response, Security policy design, implementation and enforcement, Advanced persistent threat analysis and detection
Technical Skills:
• Infrastructure operating systems and database hardening
• Vulnerability/Penetration testing
• Microsoft Windows System Administration
• Microsoft Active Directory Group Policy Object experience
• Microsoft Software Update Service
• Security operations and/or engineering experience
• Security incident response experience
• Desirable to have Windows server, UNIX/Linux system administration skills (CentOS, Red Hat Linux, Rocky)
• Desirable to have database administration experience (MS SQL, MySQL, DB2)
• Diagnostic Software : WireShark, Windows Command-line, UNIX/Linux Command-line, Process Explorer and other Security systems and applications vendors including Open Source.
Hands on experience with diverse range of security tools such as:
Anti-virus,HIDS, DLP, SIEM, PKI/Strong Authentication, database technologies, encryption technologies, mobility security, end user computing security tools, Vulnerability scanning tools and asset management tools.
Demonstrated thorough knowledge and direct experience reviewing logs from any of the following: Windows event log, Linux syslog, Anti-Virus log, HIDS log, Firewalls log.