Job Description
From Web Security to Underlying System Security,
From client security to wireless product security,
From IoT Security to Industrial Internet Security,
From safety specification development to real-time emergency response,
From media security to digital forensics, digital rights,
All efforts are for safety!
From the underlying driver to human-machine verification,
From network programming to data encryption,
From big data to risk control services,
What we need is full-stack technicians!
From anti-crawler to privacy protection,
From anti-cheating to ensuring fairness and justice,
We need a chivalrous heart with the courage to break through!
Position Requirement
Basic Qualifications:
- Familiar with computer networks, can develop C/C ++ under Linux environment, and master at least one scripting language of Perl/Python/Shell.
- Familiar with Web security, understand the current popular Web vulnerabilities (XSS, SQL Injection, CSRF, etc.), and understand Java development framework (Struts, Spring, iBATIS, Hibernate, etc.)
- Experience in server-side development, familiar with Java, Spring framework, distributed technology stack, understanding of message queue, distributed transaction, docker container, microservice principles
- Experience in Windows client security attack and defense, or understanding of Android/iOS wireless client security
- Understand Linux system management and network management-related operations, understand the security vulnerabilities of Linux systems, have Linux exploit code/shellcode writing experience
- Familiar with TCP/IP protocol stack and routing switching principle, familiar with enterprise server security
- Familiar with data analysis or machine learning, and have practice in the field of security
- Proficient in SQL and master the usage of Hadoop, Hive, R, or related big data tools
- Understand the working principle of crawler frameworks such as Scrapy and Selenium
- Familiar with the use of at least one of the common deep learning tools, such as PyTorch and TensorFlow, to quickly verify the feasibility of the algorithm
- Familiar with image/video/audio codec, processing, analysis, modeling semantic understanding, and other related technologies, familiar with the use of OpenCV, with knowledge of information theory is preferred
- Familiar with the basic theory of cryptography, homomorphic encryption, multi-party security calculation, local differential privacy, password engineering optimization, white box password, business secret authentication, SGX
- Strong learning ability, curiosity about new things, and can quickly adapt to the new environment
- Good communication skills and team coordination ability
- Able to cooperate with others to achieve goals together
- Passion for the field, good at independent thinking and reflection
Preferred Qualifications:
- Relevant internship or project experience in campus or Internet companies