Individuals selected for these positions will have the unique opportunity to work with recognized security industry leaders, improve their technical skills, gain valuable experience and have fun protecting Lenovo in cyber space.
In this role, the selected candidate must have experience with conducting application threat modeling, security risk assessments, security control assessments, and vulnerability assessments using open source and commercial tools and manual methods.
In this role, the selected candidate will review device logs, full packet capture, and all forms of telemetry, interpret data; conduct online forensic investigations of devices (UNIX, Windows hosts and other platforms).
As an experienced professional, provide advice to client management with regard to moderately complex security issues. Assists in the review, development, testing and implementation of security plans, products and control techniques.
In this role, you will create signatures (e.g. Yara) to monitor and identify indicators associated with APT to utilize in Virustotal (or other datasets) and in support of network defense and incident response efforts.
In this role, the selected candidate will serve as the team member to support the analysis of general network technical problems and provides recommendations and technical support in solving these problems.
In this role, you will be responsible to performs forensic analysis of digital information and gathers and handles evidence. Identifies network computer intrusion evidence and perpetrators. Investigates computer fraud or other electronic crimes, crack files and system passwords, detects steganography and recovers deleted, fragmented and corrupted data from digital media of all types.
In this role, you will performs complex analysis of business goals, objectives and needs of the general business environment and may create complex functional and technical specifications and flowcharts.