Finally, choose the target source, establish a talent skill tree, which is convenient for accurately and quickly finding resumes

0 24
One year ago, there was an urgent need to expand the backendLinux C/C++the R&D t...

One year ago, there was an urgent need to expand the backendLinux C/C++the R&D team needs to be, at least one is required, the restRecruited within a month20People.Recruiting so many people in a short period of time, and ensuring the quality, and the salary is not among the top, the difficulty can be imagined.

The responsibility of a manager is not to be in a smooth situation in doing anything, but to find a way to achieve the goal at any time. To achieve the goal, just shouting slogans is not enough; the executor first needs to analyze rationally, then adopt effective and practical methods, and finally do this thing in earnest.

First, create a capability portrait of the position

Finally, choose the target source, establish a talent skill tree, which is convenient for accurately and quickly finding resumes

Model the job capabilities according to the capability building model, as follows:

The basic part is shown in the following figure:

1659577477_62eb24857a58d4497e8f5.png!small?1659577479677

The programming language isCSeries language,CC++Go,, at least one is required, the rest2LinuxThis will be quick to get started; the operating system for programming isLinux, therefore, preferLinuxPlatform developers, generally doing network equipment research and development, embedded research and development, server development, most of whom useR&D personnel;DPDK

, network programming, which is a bonus item, and those who do network-related development will be more matched with this item.

1659577379_62eb2423b4ad5b3a88c54.png!small?1659577382124

Mainly focuses on the business of network security, pillars include routing, switching,IPS,SNMPEtc.

Finally, look at the forward-looking (forward-looking ability) part, as shown in the following figure:

1659577392_62eb243050ffd249d7086.png!small?1659577394581

The forward-looking part of the roof mainly requires candidates to have comprehensive experience and vision in the field, and to have a broad understanding of surrounding technologies, and be able to integrate and innovate in combination with the business. The main keywords of the forward-looking position of this job are:SASE, cloud, container, operation,SOAREtc.

Then, associate the ability range corresponding to different level positions

1659577408_62eb244022997d26f6f4f.png!small?1659577410553

Junior positions, focusing on the basic part, the key is to see the range hit in the resume, rather than looking at the working experience.

Middle positions, focusing on the business pillar part, the key is to see the importance of the role assumed in the resume and the degree of understanding of the business.

Senior positions, focusing on the forward-looking part of the roof, the key is to see the breadth and depth of knowledge, as well as innovation ability, and also requires a certain working experience.

The above examination content can define the salary range, it is not advisable to publicly explain it to candidates or directly put it intoJDDescription, thus avoiding too many ineffective resumes. There is a basic consensus, which can be effectively communicated in the future.

Finally, choose the target source, establish a talent skill tree, which is convenient for accurately and quickly finding resumes

Taking a junior position as an example, build a skill tree, the green part is relatively matched, as follows:

1659577424_62eb2450dae55888b7576.png!small?1659577427217

In terms of development languages, there are generally three types of platform programmers involvedC,C++,Go, mainly doingWindowsClient software development, doingLinuxServer-side development, doing embedded development, doingAndroidUndercSome development. To break it down further, working on client-side, including antivirus software orVPNClient-side, with a high relevance to the target position; doingLinuxBackground development with good experience in high concurrency and storage; the relevance of the rest is not significant, and it is not considered during resume screening;

In terms of network fundamentals, the key examination is to do routing, switching,DPI/DFI, firewall and other products experienced candidates. Here, attention should be paid to, for consumer-level network products, they are often through the open source stacking product model now, and their employees generally have less involvement in real underlying code, more focused on business-level packaging and management, so they are not considered; while for those working on enterprise-level network equipment, they are relatively more in line with the target;

Finally, let's look at which source enterprises. Generally speaking, the internet and gaming industries have higher salaries but lower matching rates, so they are not considered; military industry and research institutes have relatively lacking professional programming capabilities and low willingness to change jobs, so they are not considered either; relatively matching is from traditional data communication manufacturers, second-line manufacturers are more in line with the target, and salary can be increased20~30%, with solid foundation and rigorous development literacy.

In summary, the search keywords for primary positions have been sorted out:

Enterprise-level routing, switching, intrusion detection, protocol analysis, firewall, antivirus software,VPNHigh concurrency, storage, second-line data communication, second-line or micro network security.

The decomposition principles of intermediate and senior levels are roughly similar, and will not be elaborated here.

With the correct goal, the next step is to work hard. Put your efforts in the right direction, and work smartly+Hard work, and the result proved to be relatively ideal in the end.

Of course, the recruitment team is not enough at this stage. The most fundamental thing about teaming up is the balance point between 'budget and goals', that is, what kind of budget you have, what kind of goals you want to achieve, and what kind of human structure model to adopt, all need to be thought out in advance. If the budget is different, this tree structure can be further fine-tuned. However, we must understand that it is not necessarily money that can find the most suitable talents without the correct thinking.

Summarize:

First build the ability building, clarify the overall knowledge scope and ability model of talents

Focus on assessing skills and abilities for different job levels, and correspond to the Ability Building

Decompose the talent skill tree, find key words, and find target source enterprises that match

你可能想看:

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

Building a test environment requires caution! What points should be paid attention to before and after building it?

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

最后修改时间:
admin
上一篇 2025年03月28日 23:30
下一篇 2025年03月28日 23:53

评论已关闭