Job Description :
Description:
- Experience conducting one or more of the following functions:

1) Application vulnerability assessments
2) Source code review
3) Application architecture reviews or threat modeling
Able to do manual code review and manual penetration testing
Exploiting vulnerabilities
Strong understanding of ethical hacking methodologies, frameworks, and industry resources, e.g. OWASP, OSSTMM, NIST publications, SANS/CWE, among others, in order to be able to maintain, improve, and benchmark the Vulnerability Assessment process,
Requires one to perform manual code review and manual dynamic testing to find application vulnerabilities