Skip to main content

H-1B的申请过程

外籍员工接受了一份工作录取通知书之后,就应该开始进行申请H-1B签证/身份。一般来说,在该份工作正式开始前的六个月,就可以开始申请H-1B签证 /身份,但是不能早于六个月。比如说,如果工作的开始时间是2006年11月30日,在2006年5月30日就可以开始申请H-1B,但是绝对不能早于 2006年5月30日。尽早开始申请是很重要的,近几年来,H-1B的名额一般都会很快就被用完。由于H-1B名额的限制,对于雇主来说,加快招聘程序, 甚至是提早工作开始的时间都是比较安全的做法。
以下是申请H-1B的一般步骤:
  • 搜寻劳工部的现行工资标准数据库,找到该地区该职位的现行工资标准。现行工资标准取决于职位性质及内涵,而不是该雇员。提供正确的信息是非常重要的,因为 任何一个差错都可能改变现行工资数额。如果现行工资标准高于雇主所提供的薪金水平,可以查询其他相关现行工资标准数据库的信息。确定一个职位的现行工资标 准的过程比较複杂,我们建议您咨询专业的移民律师。
  • 雇主必须向美国劳工部递交《劳工情况申请》(Labor Condition Application, LCA)。这份申请将约束雇主必须支付不低于现行工资标准的薪金,对H-1B外籍员工提供和其他员工平等的待遇,雇用该外籍员工不会对其他员工的工作产生 负面影响,还有就是公司内部没有出现有关外籍员工即将开始工作的职位的罢工或者停工。
  • 获得劳工部批准的LCA后,向美国移民局递交H-1B申请,及所有相关的文件以及申请费。
H-1B的处理时间一般是2到4个月,如果雇主缴纳加速处理费,移民局还可以加急审理H-1B申请,一般移民局会在15个工作日给出最终结果。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...