Â· Keep abreast of new developments, emerging threats and vulnerabilities in cyber security practices and technologies.
Â· To conduct one (or more) of the following in customer environment :
Â· To conduct vulnerability assessment and penetration test on networks, web applications, mobile applications, wireless systems etc.
Â· To perform security review of host OS configuration, source code, covering various types of applications, networks and platforms.
Â· To review and develop security framework, information security policies, processes or procedures.
Â· To provide holistic risk assessment in IT or IT environment.
Â· To perform security analysis on the vulnerabilities.
Â· To prepare comprehensive reports with document findings.
Â· To deliver presentations to customers.