Individuals selected for these positions will have the unique opportunity to work with recognized security industry leaders, improve their technical skills, gain valuable experience and have fun protecting Lenovo in cyber space.
In this role, you will performs complex analysis of business goals, objectives and needs of the general business environment and may create complex functional and technical specifications and flowcharts.
In this role, you will be responsible to build, upgrade, and troubleshoot pc issues in a windows 10/7 environment with office365. Install and support enterprise applications and office equipment including mobile devices.
In this role, the selected candidate will be responsible to understand business requirements, technical specifications and change management documentation in order to document it procedures and related information.
In this role, you will provide status reporting on testing progress including any certification / summary documentation. Uses a broad base of test methodology while executing manual tests or designing tests for automation.
In this role, the selected candidate must have an excellent understanding of Software Development Life Cycle (SDLC), Software Test Life Cycle (STLC) and Test Methodologies from project definition to post-deployment documentation.
The individual will develop a testing plan that effectively evaluates the design and performance of existing controls, identifies control gaps and measures the effectiveness of the controls in managing operational risk.
In this role, you will develops and maintains clear, understandable documentation to describe program development and modification, as well as troubleshooting. Updates system and support documentation as necessary to reflect changes to programs, solutions, reports and interfaces.
In this role, you will evaluates requests and consults in design for new or modified computer programs, solutions, reports and interfaces to determine feasibility and compatibility with current system.
In this role, the selected candidate will assist in the review, development, testing and implementation of security plans, products and control techniques; coordinate the reporting data security incidents.
In this role, you will ability to perform all system administration duties on the enterprise voice and video solutions, making routine software changes, maintaining records, and maintaining equipment inventory.
In this Analyst position, you will work at a strategic level with all kinds of technical subject matter experts in the elicitation, modeling, documentation and management of data, and business and systems requirements. You will use your extensive knowledge of the information security space and analysis best practices to facilitate requirements sessions and communicate clearly and effectively with end-users, senior managers and other team members.