* Develop Assessment and Authorization (A&A) packages for various systems * Develop and maintain security documentation such as: * Authorization...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike * Mimic threat actor behavior...
Update your browser to have a more positive job search experience.
×