▪ Conduct Vulnerability Assessments of Network and Security Devices using various open source and commercial tools
▪ Map out a network, discover ports and services running on the different exposed network and security devices
▪ Conduct penetration test and launch exploits using Nessus, Metaspoilt, Backtrack penetration testing distribution tools sets
▪ Research and maintain proficiency in computer network exploitation, tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption.
▪ Analyze scan reports and suggest remediation / mitigation plan
▪ Keep track of new vulnerabilities on various network and security devices for different vendors
▪ Review software posture and work with operations to plan code version upgrade requirements of supported security and network devices
▪ Advanced technical analysis on intrusions
▪ Audit configuration of Network and Security devices
▪ Providing rich client specific reports