1. Threat modeling: On the security monitoring platform, different mathematical logic is used to associate and analyze logs of various devices and dimensions, realizing a logical relationship model of different stages of attack chains, and improving the monitoring accuracy of the security monitoring platform. 2. Attack validation: Use penetration testing to conduct real attacks and validate the effectiveness of the threat model. 3. Familiar with the common vulnerabilities such as SQL injection, XSS, CSRF, etc., OWASP TOP 10 security risks 4. Handle network security events and provide emergency response support
Qualifications:
1. Familiar with the common vulnerabilities such as SQL injection, XSS, CSRF, etc., OWASP TOP 10 security risks; 2. Able to handle network security events and provide emergency response support; 3. Priority will be given to those who meet the following conditions: Bachelor's degree or above, and who have submitted at least 2 original vulnerabilities of a general type to the China National Vulnerability Database (CNNVD) or the China National Vulnerability Sharing Platform (CNVD).
Languages
English
Cantonese
Skills
Internet Security
Security Testing
杨杨枫瑞
Qianxin International · hrbp
Be careful
Don’t provide your bank or credit card details when applying for jobs.