Overview
Identify critical flaws in applications and systems that cyber actors could exploit.
Responsibilities
- Conduct vulnerability assessments of relevant technology (e.g., computing environment, network and supporting infrastructure, and applications).
- Prepare and present comprehensive vulnerability assessments.
- Conduct network security audits and scanning.
- Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense operations.
- Prepare audit reports that identify technical and procedural findings, and make recommendations on corrective strategies and solutions.
- Conduct and/or support authorized penetration testing on organization networks and systems.
- Define and review requirements for information security solutions.
Skills
- Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense operations.
- Prepare audit reports that identify technical and procedural findings, and make recommendations on corrective strategies and solutions.
- Conduct and/or support authorized penetration testing on organization networks and systems.
- Define and review requirements for information security solutions.