Protects the confidentiality and availability of software, systems and information owned, controlled, used and managed by the company. Responsible for performing penetration testing and vulnerability assessments within a team environment. Conducts formal tests on web-based and traditional applications, networks/infrastructure, mobile, source code reviews, threat analysis, wireless network assessments and other technology. Performs the daily operation of the team including vulnerability identification, risk assessments, vulnerability remediation, and validation testing. Will provide actionable recommendations and guidance for the business based on the assessment findings.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level