A proficient cybersecurity analyst adeptly engaging in the practice of penetration testing on computer systems, networks, and applications. This entails the art of exploiting recognizable vulnerabilities, fashioning innovative testing methodologies to discern latent weaknesses, and conducting rigorous physical security evaluations encompassing servers, web applications, software, proprietary systems, and various network devices. Fueled by a fervent passion for these competencies, an aspiration to channel these proficiencies toward a position as a distinguished Penetration Tester within a reputable enterprise is fervently pursued.
As a member of the security team, I was responsible for the following:
Perform code reviews and penetration tests to discover and exploit