Years of Experience
Easy Apply only
Complete penetration testing on web applications, operating systems, network protocols, wireless, mobile, databases, middleware, etc; research and remain current on emerging threats and adversary emul...
Conducting Red Team exercises to evaluate and improve processes and technologies. Including application design, threat detection, incident response, patching, vulnerability remediation, secure develop...
Use feedback and reflection to develop self awareness, personal strengths and address development areas. Delegate to others to provide stretch opportunities and coach to help deliver results...
You are responsible for functional/technical track of a project.
Perform in-depth analysis of penetration testing results and create report that describes findings, exploitation procedures, risks and recommendations...