* Develop software for existing control systems * Support testing and assessment of embedded systems locally and at external locations * Utilize...
* Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike * Mimic threat actor behavior...
Update your browser to have a more positive job search experience.
×