当前位置:网站首页>Work of safety inspection
Work of safety inspection
2022-07-07 02:33:00 【Mountain Rabbit 1】
Responsibilities :
1、 Implementation of safety service items , Including security scanning 、 Penetration test 、 Safety inspection 、 Security audit 、 Emergency response and other work ;
2、 Compilation of safety management and safety technical data in the project ; Security reinforcement of server and network equipment in the project ;
3、 In the event of a network attack or security incident , Provide emergency response services , Help users recover the system and investigate and collect evidence ;
4、 According to industry characteristics and customer requirements , Develop a security strategy 、 Security system 、 Operation and maintenance system, etc .
5、 Carry out daily information security related work , Prepare summary reports related to information security ;
6、 Carry out network security monitoring 、 analysis 、 Early warning ;
7、 Sort out network equipment 、 Safety equipment protection , Identify safety risks ;
8、 Complete the risk assessment 、 Information security management system construction 、 Information security planning services 、 Level protection filing and evaluation and other project implementation work ;
9、 Prepare information security plan for major activities ;
10、 Be responsible for the design of user data center security protection architecture 、 Implementation and operation maintenance , Sort out the security equipment strategy ;
11、 Prepare relevant vulnerability repair plans , Complete relevant safety reinforcement .
12、 Writing and sorting of daily operation and maintenance documents
Job requirements :
1、 Bachelor degree or above , Computer network related majors ;
3、 Familiar with common security attacks , Will use mainstream penetration testing tools , Such as sqlmap、awvs、nmap、Burp、 Ice scorpion 、goby、x-ray etc. , Have the ability to independently complete the complete penetration test of individual systems ;
4、 Be familiar with the repair methods of common vulnerabilities , Such as SQL Inject 、XSS、XML、 Upload files 、 Deserialization class vulnerability 、 Component vulnerabilities, etc , Have certain vulnerability management ability ;
5、 Sensitive to security dynamics , For new vulnerabilities, it can quickly analyze the business scope affected by vulnerabilities , And timely formulate repair measures ;
6、 Familiar with network attack defense 、 Safety assessment 、 Safety reinforcement 、 Safety inspection and other related technologies ; Experience in emergency response ;
7、 Familiar with the Lord
边栏推荐
- [unity] upgraded version · Excel data analysis, automatically create corresponding C classes, automatically create scriptableobject generation classes, and automatically serialize asset files
- 人脸识别应用解析
- [C # notes] use file stream to copy files
- MFC Windows 程序设计[147]之ODBC数据库连接(附源码)
- Draco - gltf model compression tool
- 3D laser slam: time synchronization of livox lidar hardware
- C语言练习题_1
- Recent applet development records
- The cities research center of New York University recruits master of science and postdoctoral students
- Tips for web development: skillfully use ThreadLocal to avoid layer by layer value transmission
猜你喜欢

How can reinforcement learning be used in medical imaging? A review of Emory University's latest "reinforcement learning medical image analysis", which expounds the latest RL medical image analysis co

Alibaba cloud middleware open source past

1 -- Xintang nuc980 nuc980 porting uboot, starting from external mx25l

1500万员工轻松管理,云原生数据库GaussDB让HR办公更高效
![[paper reading | deep reading] dngr:deep neural networks for learning graph representations](/img/8e/41a80131c6ec7a7cdffe4a77012fed.png)
[paper reading | deep reading] dngr:deep neural networks for learning graph representations

Go swagger use

Lidar: introduction and usage of ouster OS

Tiflash source code reading (IV) design and implementation analysis of tiflash DDL module
![leetcode:736. LISP syntax parsing [flowery + stack + status enumaotu + slots]](/img/0d/e07fe970167368040eb09b05c3682e.png)
leetcode:736. LISP syntax parsing [flowery + stack + status enumaotu + slots]

leetcode:5. 最长回文子串【dp + 抓着超时的尾巴】
随机推荐
Infrared camera: juge infrared mag32 product introduction
1500万员工轻松管理,云原生数据库GaussDB让HR办公更高效
postgresql之integerset
Web3的先锋兵:虚拟人
PostgreSQL图形化界面工具之pgAdmin4
Web3对法律的需求
[Mori city] random talk on GIS data (II)
STM32 project -- Topic sharing (part)
Overall query process of PostgreSQL
Application analysis of face recognition
[leetcode] day97 remove linked list elements
Web3's need for law
【Unity】升级版·Excel数据解析,自动创建对应C#类,自动创建ScriptableObject生成类,自动序列化Asset文件
1 -- Xintang nuc980 nuc980 porting uboot, starting from external mx25l
The cities research center of New York University recruits master of science and postdoctoral students
所谓的消费互联网仅仅只是做行业信息的撮合和对接,并不改变产业本身
如何从0到1构建32Core树莓派集群
【Node学习笔记】chokidar模块实现文件监听
TiFlash 源码阅读(四)TiFlash DDL 模块设计及实现分析
Zhang Ping'an: accelerate cloud digital innovation and jointly build an industrial smart ecosystem