第1篇 设计部门安全职责
(1) 在进行新建、改建、扩建和技术改造项目设计时,保证有关安全、环保、工业卫生等 技术措施同时设计、施工、竣工验收。严格执行各专业的国家安全技术规范标准。
(2) 负责安全技术措施项目的设计工作。
(3) 组织设计审查时,应有安全技术、消防、工业卫生、环保和工会等部门代表参加 。
(4) 二十九、法律合同部门的安全职责
(5) 认真执行健康、安全与环境保护的法规标准,把维护健康、保证安全与环境保护,纳入订立各种生产建设和生产维修项目合同的议事日程,使安全与环境保护得到法律合同的保护。
(6) 在签定和审定新建、扩建和改建和项目维修合同时负责审查安全计划措施。
(7) 对已签订了合同的生产建设和维修项目的施工过程进行安全性监督,确保工和的安全性和牢固性。
第2篇 设计部门的安全职责
(1) 在进行新建、改建、扩建和技术改造项目设计时,保证有关安全、环保、工业卫生等 技术措施同时设计、施工、竣工验收。严格执行各专业的国家安全技术规范标准。
(2) 负责安全技术措施项目的设计工作。
(3) 组织设计审查时,应有安全技术、消防、工业卫生、环保和工会等部门代表参加 。
(4) 二十九、法律合同部门的安全职责
(5) 认真执行健康、安全与环境保护的法规标准,把维护健康、保证安全与环境保护,纳入订立各种生产建设和生产维修项目合同的议事日程,使安全与环境保护得到法律合同的保护。
(6) 在签定和审定新建、扩建和改建和项目维修合同时负责审查安全计划措施。
(7) 对已签订了合同的生产建设和维修项目的施工过程进行安全性监督,确保工和的安全性和牢固性。
第3篇 安全设计师岗位职责
高级安全设计师 senior security architect,band 9
position description:
• security risk assessment and review of lenovo systems and applications to drive adoption of application and infrastructure security controls and best practices
• security risk assessment and review of 3rd party systems and applications to ensure the standard and proprietary application security controls adopted and compliant with lenovo requirements
• security architecting, solution design and implementation
• investigate, coordinate and address information security incidents
• manage and resolve information security risk issues
• work with internal and e_ternal audits to drive corrective actions in information security
position requirements:
• bs above degree in computer science, information security/assurance/audit, or relevant majors.
• 7+ years security industry e_perience.
• solid understanding of information protection and cyber security principles processes and practices.
• strong technical background and a passion for cyber security.
• ability to master and optimize comple_ processes
• ability to on global cross functional internal and e_ternal teams.
• effective verbal and written communications. proficiency in english and mandarin is a plus.
• one or more relevant it security certifications: cissp, ccsp,cisa, cism.
• one or more below certifications should be a plus: itil, cobit, pmp, iso 27001 (internal/lead) auditor.
required technical skills:
• infrastructure network and systems hardening
• web application security
• vulnerability/penetration testing
• microsoft windows system administration
• microsoft active directory group policy object
• microsoft software update service
• security operations and/or engineering e_perience • security incident response e_perience
• desirable to have windows server, uni_/linu_ system administration skills (centos, red hat linu_, ai_)
• desirable to have database administration e_perience (ms sql, mysql, oracle)
• application software : symantec sep, tenable nessus, rapid7,wvs,cybereason,malwarebytes, splunk, and other security systems and applications vendors including open source.
• diagnostic software : wireshark, windows command-line, uni_/linu_ command-line, filemon, process e_plorer and other security systems and applications vendors including open source.
• network topologies : ethernet, lan/wan
• network protocols: tcp/ip, netbios/smb, snmp, icmp, smtp, ssh/ftp, rdp, and similar
hands on e_perience with diverse range of security tools such as:
anti-virus,hids, dlp, siem, pki/strong authentication, database technologies, encryption technologies, mobility security, end user computing security tools, vulnerability scanning tools and asset management tools.
demonstrated thorough knowledge and direct e_perience reviewing logs from any of the following: windows event log, linu_ syslog, anti-virus log, hids log, firewalls log.
senior security architect,band 9
position description:
• security risk assessment and review of lenovo systems and applications to drive adoption of application and infrastructure security controls and best practices
• security risk assessment and review of 3rd party systems and applications to ensure the standard and proprietary application security controls adopted and compliant with lenovo requirements
• security architecting, solution design and implementation
• investigate, coordinate and address information security incidents
• manage and resolve information security risk issues
• work with internal and e_ternal audits to drive corrective actions in information security
position requirements:
• bs above degree in computer science, information security/assurance/audit, or relevant majors.
• 7+ years security industry e_perience.
• solid understanding of information protection and cyber security principles processes and practices.
• strong technical background and a passion for cyber security.
• ability to master and optimize comple_ processes
• ability to on global cross functional internal and e_ternal teams.
• effective verbal and written communications. proficiency in english and mandarin is a plus.
• one or more relevant it security certifications: cissp, ccsp,cisa, cism.
• one or more below certifications should be a plus: itil, cobit, pmp, iso 27001 (internal/lead) auditor.
required technical skills:
• infrastructure network and systems hardening
• web application security
• vulnerability/penetration testing
• microsoft windows system administration
• microsoft active directory group policy object
• microsoft software update service
• security operations and/or engineering e_perience • security incident response e_perience
• desirable to have windows server, uni_/linu_ system administration skills (centos, red hat linu_, ai_)
• desirable to have database administration e_perience (ms sql, mysql, oracle)
• application software : symantec sep, tenable nessus, rapid7,wvs,cybereason,malwarebytes, splunk, and other security systems and applications vendors including open source.
• diagnostic software : wireshark, windows command-line, uni_/linu_ command-line, filemon, process e_plorer and other security systems and applications vendors including open source.
• network topologies : ethernet, lan/wan
• network protocols: tcp/ip, netbios/smb, snmp, icmp, smtp, ssh/ftp, rdp, and similar
hands on e_perience with diverse range of security tools such as:
anti-virus,hids, dlp, siem, pki/strong authentication, database technologies, encryption technologies, mobility security, end user computing security tools, vulnerability scanning tools and asset management tools.
demonstrated thorough knowledge and direct e_perience reviewing logs from any of the following: windows event log, linu_ syslog, anti-virus log, hids log, firewalls log.