Conduct security assessments on IP and telecommunication networks, web applications and infrastructure to identify security vulnerabilities, weaknesses which could be exploited by cyber attackers. Constantly monitor and analyze the information systems and networks hunting for thr...

JELENTKEZEM