Conducted Vulnerability assessments & Penetration Testing using tools to evaluate attack vectors
Review of Vulnerability assessment reports
Follow up with various stakeholders for closure of identified vulnerabilities
Creating and presenting vulnerability assessment summary reports to senior management
Conducted Hardware & Software Audit
Review of Network Utilization reports
Creating and presenting Network Utilization summary reports to senior management