Subscribe to Job Alert
Join our happy subscribers
Responsible for simulating cyber-attacks to identify and exploit vulnerabilities within the organization's IT infrastructure, applications, and networks. This role focuses on offensive security techniques to test the effectiveness of security controls and improve the organization's overall security posture.
Qualifications
Experience:
Check how your CV aligns with this job
Build your CV for free. Download in different templates.
Join our happy subscribers