➢ Excellent abilities at penetration testing Wireless, VoIP, infrastructure, web and mobile.
➢ Thorough understanding of risk assessment and vulnerability assessment.
➢ Excellent understanding of threat modeling and Secure SDLC.
➢ Experienced at using security tools such as Nessus, Nmap, Metasploit, Kali Linux, Burp Suite and
other tools.
➢ Intermediate knowledge of Reverse Engineering techniques.
➢ Excellent understanding of network protocols (TCP/IP suite), Wi