Skip to main content

Specialty Occupation

Specialty Occupation一般有两种情况,一种是单独的Specialty Occupation,另一种是Specialty Occupation+Beneficiary Qualifications。
大多数人包括楼主遇到的是前者,意思就是说移民局认为你做的东西过于简单,不足以成为一个Specialty Occupation,因为Specialty Occupation需要至少本科学历。注意移民局评断Specialty Occupation并不是说你申请了一个符合Specialty Occupation的title就直接认定你符合这个资质,而是要看你的工作职责具体是什么。这一点很多都是由于律师在第一次提交文件的时候在雇主支持信上没有很强烈地写明你的职责,或者说写了职责但是不够专业,让人看不出你要做的这些事情是需要一个本科学历以上的人做,比如我见过有人的工作职责写的是"other tasks assigned by managment group", 这other tasks完全可以是整理材料倒垃圾这种谁都能干的事情,站不住脚。所以你的佐证可以用很多方面证明,但是不管是提供专家信、教授信、老板写信,其实都是or的关系,也就是说不需要都准备,你要知道你的point是告诉移民官:你做的是什么什么事情,为什么这件事情有技术含量所以需要本科学位,以及做这件事情为什么需要专业知识(比如做某件事必须需要修过某某课程的内容),另外就是你没有做非你专业之外不专业的事情(比如刚才说了你不会去做整理文件倒垃圾这种事)。总之就是,要好好补你的工作职责,以老板的口吻说清楚职位的复杂性和专业性,祝好运!

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...