Why Work at Lenovo
Here at Lenovo, we believe in smarter technology that builds a brighter, more sustainable and inclusive future for our customers, colleagues, communities, and the planet.
And we go big. No, not big—huge.
We’re not just a US$70 billion revenue Fortune Global 500 company, we’re one of Fortune’s Most Admired. We’re transforming the world through intelligent transformation, offering the world’s most complete portfolio of smart devices, infrastructure, and solutions. With more than 71,500 employees doing business in 180 markets, we help millions—not just the select few—experience our version of a smarter future.
The one thing that’s missing? Well… you...
Description and Requirements
Job Description
1.Assist in the implementation, monitoring, and update of technical controls to protect Lenovo.
2.Monitor and investigate the alerts to identify attacks
3.Assist in incident response processes.
4.Security operations assistance as needed.
5. Domestic and international travel may be required (5%) for technical meetings, workshops, and on-site collaboration activities.
6.Bring a passion to learn and stay on top of cyber security threats and trends. 7.Bring discipline and dedication to ensure programs are secure and meet goals.
Requirements:
1.BA/BS degree in Computer Science, Information technology, Information Security, or related field.
2.Hands on advanced technical experience will be considered for those individuals without a degree.
3.General knowledge of cyber security concepts
4. Experience in attack mitigation and knowledge of various attacks
5.1 to 2 years of technical experience in at least one of the following
6.Network Administration
7.Microsoft Domain Controllers/Active Directory
8.Web application development, deployment, and support
9.Cloud administration – (e.g. AWS, Google, Azure, Tencent, Alibaba)
10. System administration (Linux or Windows)
11.Security engineering
12.Vulnerability Management
13. Application Security
14. 1 year of cyber security and/or information security principles related experience
15.Hands on experience with a wide range of security tools.
16.Excellent oral and written communication skills Preferred Qualifications a.Penetration testing b.Cyber Security operations and incident response c. Vulnerability management d.Current Certification in relevant field of Information