Job Responsibilities:
- Responsible for managing information security, including the development of security standards, guidelines, and processes, as well as the control of information security incidents.
- Oversee the construction, maintenance, and management of the company's existing systems and IT security defense systems, including risk assessments and compliance checks.
- Provide real-time response, handling, and forensic investigation of information security incidents.
- Develop, test, and optimize automated security tools and rule models.
- Monitor and audit the security of existing company systems, promptly identifying and fixing security vulnerabilities.
- Carry out other tasks as assigned by management.
Job Requirements:
- Perform regular maintenance on the company’s security devices and system architecture (including AWS cloud security), monitor security devices, and respond to security incidents.
- Be familiar with penetration testing procedures, methods, and processes, proficient in using penetration testing tools, and possess the ability to conduct penetration tests.
- Have knowledge of common security configurations for hosts, databases, operating systems, and security devices, and understand the principles of common security products.
- Have a deep understanding of the construction and maintenance of information security management systems, be familiar with common information security technical architectures in the industry, and understand the principles of mainstream security products and protection technologies.
- Be knowledgeable in network security technologies and network defense strategies, with the ability to analyze and handle network security incidents.
- Be familiar with AWS cloud services and architecture, such as IAM, KMS, VPC, EC2, S3, CloudTrail, etc.
- Be proficient in penetration testing processes, strategies, and methods, and skilled in using common external network penetration testing tools (e.g., Burp Suite, Metasploit, Cobalt Strike).
- Have in-depth knowledge in one or more of the following areas: binary security, web security, server security, client security, mobile security, or source code auditing.
- Be proactive, have strong communication skills, and demonstrate a strong willingness for self-improvement and continuous learning.