In this role, you will create signatures (e.g. Yara) to monitor and identify indicators associated with APT to utilize in Virustotal (or other datasets) and in support of network defense and incident response efforts.
In this role, you will provide monitoring, problem escalation, job scheduling and tape management services for the various Client Data Centers. The Data Center Operations team monitors Clients IT applications 24x7x365.
In this role, you will performs complex analysis of business goals, objectives and needs of the general business environment and may create complex functional and technical specifications and flowcharts.
In this role, you will evaluates requests and consults in design for new or modified computer programs, solutions, reports and interfaces to determine feasibility and compatibility with current system.
In this role, you will ability to perform all system administration duties on the enterprise voice and video solutions, making routine software changes, maintaining records, and maintaining equipment inventory.
Individuals selected for these positions will have the unique opportunity to work with recognized security industry leaders, improve their technical skills, gain valuable experience and have fun protecting Lenovo in cyber space.
The selected candidate will identify and track new QA routines to minimize data outages and increase the efficiencies within the team. Managing the partnership with CSO to provide valuable new capabilities through new analysis capabilities and implementing automated functionality to detect new alert patterns.
In this role, the selected candidate will assist in the review, development, testing and implementation of security plans, products and control techniques; coordinate the reporting data security incidents.
In this Analyst position, you will work at a strategic level with all kinds of technical subject matter experts in the elicitation, modeling, documentation and management of data, and business and systems requirements. You will use your extensive knowledge of the information security space and analysis best practices to facilitate requirements sessions and communicate clearly and effectively with end-users, senior managers and other team members.