Successful incumbent will Perform penetration testing and attack simulations on business critical infrastructure including internal servers, networks and applications to identify and resolve security flaws. Occasional experiments with various methods attackers could use to exploit information securi