Job Description
Role Description
Perform application, network, API, and mobile penetration testing using manual and automated techniques, aligned with the security assessment offering.Conduct vulnerability assessments and validate exploitable weaknesses to estimate business impact. Execute Red Team exercises, simulating real‑world attack scenarios and post‑exploitation activities, Document and present detailed findings, proof‑of‑concept (PoC) exploitation steps, and actionable remediation recommendations.
Skills
cybersecurity,endpoint security,information security,intrusion prevention system,
Show more Show less
Perform application, network, API, and mobile penetration testing using manual and automated techniques, aligned with the security assessment offering.Conduct vulnerability assessments and validate exploitable weaknesses to estimate business impact. Execute Red Team exercises, simulating real‑world attack scenarios and post‑exploitation activities, Document and present detailed findings, proof‑of‑concept (PoC) exploitation steps, and actionable remediation recommendations.
Skills
cybersecurity,endpoint security,information security,intrusion prevention system,
Show more Show less
Ready to Apply?
Take the next step in your AI career. Submit your application to UST today.
Submit Application