General Information

Req #
Career area:
Hardware Engineering
Wednesday, November 3, 2021
Working time:

Why Work at Lenovo

Here at Lenovo, we believe in smarter technology for all, so we spend our time building a society that’s brighter and more inclusive. And we go big. No, not big—huge. 

We’re a US$60 billion revenue Fortune Global 500 company serving customers in 180 markets around the world. Focused on a bold vision to deliver smarter technology for all, we are developing world-changing technologies that power (through devices and infrastructure) and empower (through solutions, services and software) millions of customers every day and together create a more inclusive, trustworthy and sustainable digital society for everyone, everywhere. 

The one thing that’s missing? Well… you...

Description and Requirements

Job Responsibilities:

1. Responsible for the safety test of the company's products, propose a repair plan and assist related personnel in repair;

2. Participate in the establishment and improvement of relevant product safety regulations and procedures;

3. According to the current status of product security, discover potential security risks, conduct penetration testing and exploit vulnerabilities on PCs, tablets, mobile phones, and IOT smart hardware products, and promote the implementation of security requirements in products;

4. Manage the existing tools in the CSL

5 Carry out security standard training for development and testing personnel to improve safety risk prevention capabilities;

6. Responsible for the construction of automated vulnerability mining tool platform and the construction of threat intelligence system.

job requirements:

Basic items:

1. More than 3 years of safety experience;

2. Familiar with at least one development language such as python, Java and PHP;

3. Sensitive to security vulnerabilities, good at discovering hidden dangers or security vulnerabilities in products;

4. Have independent experience in vulnerability mining research and analysis, not limited to web vulnerabilities, system vulnerabilities, and application vulnerabilities

5. Have some insights into the vulnerabilities principles and utilization methods of various Web, APP, hardware, and IOT products, and be familiar with common security vulnerabilities solutions;

6. Have good plan execution ability and problem-solving ability, have a high degree of work responsibility, good team consciousness and coordination and cooperation ability.


1. Those engaged in IOT security-related research are preferred;

2. Participated in a large CTF and achieved an excellent ranking or submitted high-risk vulnerabilities in CVE/CNVD/CNNVD preferred;

3. Holders of CISSP are preferred;

4. Have good communication skills, coordination skills, understanding skills, and have a strong sense of responsibility and team management skills. Those who can withstand a certain intensity of work pressure are preferred.