About the job
...-scale web applications, REST APIs, and cloud-backed services.
Identify and validate... ...simulating real-world adversaries.
Develop custom exploitation tools, PoCs, and... ...security weaknesses and collaborate with engineering teams to drive long-term mitigations....
Read more on Jooble →