Perform formal penetration tests on web-based applications, networks and computer systems. Probe for vulnerabilities in web applications, fat/thin client applications and standard applications Pinpoint methods that attackers could use to exploit weaknesses and logic flaws. Research, document and discuss security findings with management and IT teams Analyzes the company’s security policies and procedures. Physical assessments of networks, computer systems and servers