Analyzes network scan results to determine and categorize potential vulnerabilities and exploit vulnerabilities as part of assessment.
Supports assessed unit by advising them on elimination/mitigation of network-based vulnerabilities through technical or procedural means.
Using a number of analysis and planning techniques, prepares and integrates analyses, organizes conflicting requirements, and synthesizes data relevant to the planning process compared with impacts to existing RED cyber plans and systems.
Served as technical penetration testing expert conducting and/or supporting authorized penetration testing on enterprise network assets
As part of a Penetration Test, conducted reconnaissance of an information system to identify appropriate exploits and utilize the tools to conduct that exploit.
Develops and enhances Information Technology (IT), cybersecurity, and exploitation knowledge, skills, and abilities (KSAs); provides expertise and supports to the development of CSSP Tactics, Techniques, and Procedures (TTPs).Posted On
January 23, 2023