Responsible for the company’s security attack and defense capability building, choose one of the following directions.
【Web Application Security Direction 】
1. Responsible for the safety construction and operation of the company’s application safety life cycle;
2. Responsible for the operation and optimization of the company’s black box scanning platform rules;
3. Responsible for the operation and optimization of the company’s white box code scanning platform;
4. Responsible for tracking the industry’s security attack and defense trends, tracking the latest security vulnerabilities, and conducting research and analysis.
【 Safety Operation Direction 】
1. Responsible for the operation of various security alarms of Meituan and the emergency and investigation of incidents, and follow up the repair of related risks;
2. Responsible for security attack and defense capability building of the United States Group, including log/vulnerability/backdoor analysis, development and design of security detection strategies and models;
3. Responsible for the repair and promotion of various types of security vulnerabilities in the asset domain of Meituan and related platform and data capacity building;
4. Responsible for cutting-edge security technology research, and conduct risk assessment and provide defense suggestions through offensive and defensive drills.
【Windows/macOS Security Directions 】
1. Participated in the architecture design, development and performance optimization of Windows/macOS office network security client software;
2. Carry out research on vulnerability mining and attack and defense technology for Windows/macOS system and important software;
3. Translate security research results into office network security products to ensure the security of the company’s host computer and data.
【 Mobile safety direction 】
Responsible for the construction of attack and defense systems for various mobile platforms (Android/iOS/ mini programs /H5, etc.), covering the development of mobile security components, device risk identification, program analysis, vulnerabilities and privacy compliance detection.
【 Cloud Native Security Direction 】
1. Cloud-native security research, follow up the latest research results of cloud-native security in the industry, including the security attack and defense research of kubernetes, docker, linux system, etc., and be able to make innovations based on the latest research results;
2. Cloud-native security research and development, translating the research results into the ground, forming security products or providing technical support to business parties to ensure the safe and reliable operation of cloud infrastructure.
【 System Safety Direction 】
1. Responsible for the research and capacity building of program automation vulnerability mining ability;
2. Responsible for the research and capacity building of program behavior analysis techniques;
3. Responsible for internal business vulnerability mining, vulnerability analysis and vulnerability utilization, and capacity precipitation;
4. Responsible for the research on the combination of AI and system security, and implement the research results to solve practical business problems.
【 Data Security Direction 】
1. Responsible for the construction and design of internal and ecological data security technology system, including but not limited to data asset map, UEBA, SIEM, API security, data encryption, EDR, zero trust, etc.;
2. Responsible for promoting the landing and operation of data security technology solutions and related tools across departments and companies;
3. Promote data security risk quantification system, response mechanism and risk handling performance assessment.
Job requirements
1. Information security, computer science, statistics, mathematics and other related education and professional background;
2. Familiar with mainstream network offensive and defensive technologies and principles;
3. Be familiar with at least one language of Python, Java and Go, and have developed at least one language;
4. Familiar with industry security attack and defense dynamics, tracking the latest security vulnerabilities, able to analyze vulnerability principles and implement PoC writing;
5. Be able to read English technical literature without barriers; 6. Clear logic, strong expression ability, good team spirit and active communication awareness.
- News
- Featured Events
- People We Serve
- Choose Your Program
- Applied Science & Technology (B.A.)
- Biomedical Engineering (B.S., M.S., Ph.D.)
- Civil & Environmental Engineering (B.S., M.S., Ph.D.)
- Computer Engineering (B.S., M.S., Ph.D.)
- Computer Science (B.S., M.S., Ph.D.)
- Cybersecurity (M.S.)
- Data Analytics (M.S.)
- Electrical Engineering (B.S., M.S., Ph.D.)
- Engineering Management (M.S. Ph.D.)
- Mechanical & Aerospace Engineering (B.S., M.S., Ph.D.)
- Regulatory Biomedical Engineering (M.Eng.)
- Systems Engineering (B.S., M.S., Ph.D.)
- Telecommunications Engineering (M.S.)
- Featured Jobs & Internships
- Resources
- About