Tested internally developed web and mobile applications for potential vulnerabilities, and performed controlled exploitation of these vulnerabilities to demonstrate the full potential impact.
Coordinated and scheduled risk assessments for third party vendors performing services for the firm, in order to identify potential security issues with their network infrastructure, physical site security, and company policies.