About the Role
Role Description
Perform application, network, API, and mobile penetration testing using manual and automated techniques, aligned with the security assessment offering.Conduct vulnerability assessments and validate exploitable weaknesses to estimate business impact. Execute Red Team exercises, simulating real‑world attack scenarios and post‑exploitation activities, Document and present detailed findings, proof‑of‑concept (PoC) exploitation steps, and actionable remediation recommendations.
Skills
cybersecurity,endpoint security,information security,intrusion prevention system,
Tahap senioriti
Tahap permulaan
Jenis pekerjaan
Sepenuh masa
Bidang tugas
Teknologi Maklumat
Industri
Perkhidmatan IT dan Perundingan IT
Perform application, network, API, and mobile penetration testing using manual and automated techniques, aligned with the security assessment offering.Conduct vulnerability assessments and validate exploitable weaknesses to estimate business impact. Execute Red Team exercises, simulating real‑world attack scenarios and post‑exploitation activities, Document and present detailed findings, proof‑of‑concept (PoC) exploitation steps, and actionable remediation recommendations.
Skills
cybersecurity,endpoint security,information security,intrusion prevention system,
Tahap senioriti
Tahap permulaan
Jenis pekerjaan
Sepenuh masa
Bidang tugas
Teknologi Maklumat
Industri
Perkhidmatan IT dan Perundingan IT
Ready to Apply?
Submit your application today and take the next step in your career journey with UST.
Apply Now