




Description: * Knowledge of automated vulnerability scanners is desirable; * In-depth knowledge of TCP/IP; * Solid knowledge of Operating Systems; * Knowledge of pentesting frameworks. * Conduct offensive security testing on hosts running on various platforms and operating systems, including but not limited to Microsoft Windows, UNIX, Linux; * Perform penetration tests (pentesting) on applications, systems, and web pages; * Ethically exploit documented or undocumented vulnerabilities; * Analyze log files from various sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify potential network security threats; * Support the defensive team in establishing controls to mitigate identified exploits; * Produce activity reports and document exploitation actions; * Present penetration test results and provide advisory support to resolution teams; 2509140202531280429


