Position Description : Assess the controls over application processes, including physical and logical security, systems acquisition and development, system and network infrastructure, system architecture, change management, computer operations, and production support. Evaluates network architecture, infrastructure, and system configurations to identify security risks and weaknesses. Performs penetration testing and vulnerability assessments to identify potential entry points for cyber threats.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level