1. Conduct Vulnerability Assessments of application, Network and Security Devices using various open source and commercial tools. 2. Map out networks, and discover ports and services running on the exposed network and security devices. 3. Conduct penetration tests and launch…
1. User Support: a. Provide first line technical support to end users for hardware, software, and network issues. b. Respond to and resolve IT help desk tickets and support requests in a timely manner. c. Assist users with account creation,…