Join our Information Security team where you will identify exploitable vulnerabilities in applications before hackers are able to discover and exploit them. You will be exposed to real-world opportunities for hackers to be able to compromise applications in such a way that allows for unauthorized access to sensitive data or even take-over systems for malicious/non-business purposes.
Read more