Web Application Penetration Tester

Image result for verizon
Join our Information Security team where you will identify exploitable vulnerabilities in applications before hackers are able to discover and exploit them. You will be exposed to real-world opportunities for hackers to be able to compromise applications in such a way that allows for unauthorized access to sensitive data or even take-over systems for malicious/non-business purposes.
Read more

Leave a Comment

Your email address will not be published. Required fields are marked *