Must have one year of experience in the following skills: (1) application and infrastructure information security; (2) application of threat modeling or other risk identification techniques; (3) knowledge of system security vulnerabilities and remediation techniques, including penetration testing, source code review, configuring advanced runtime and static vulnerability testing tools and the development of exploits; (4) programming in Java, C, C++, Perl, Ruby or Python; (5) coordinating responsibility of technical security tasks; (6) working with network and web related protocols, including TCP/IP, UDP, IPSEC, HTTP, HTTPS, and related routing protocols; (7) experience with common attack patterns, fuzzing, dynamic code assessment, and exploitation techniques for web and mobile applications; and (8) working with cloud native services in AWS, Azure, or GCP.#0000 Preferred Qualifications Please see job description and the position requirements above. Must have one year of experience in the following skills: (1) application and infrastructure information security; (2) application of threat modeling or other risk identification techniques; (3) knowledge of system security vulnerabilities and remediation techniques, including penetration testing, source code review, configuring advanced runtime and static vulnerability testing tools and the development of exploits; (4) programming in Java, C, C++, Perl, Ruby or Python; (5) coordinating responsibility of technical security tasks; (6) working with network and web related protocols, including TCP/IP, UDP, IPSEC, HTTP, HTTPS, and related routing protocols; (7) experience with common attack patterns, fuzzing, dynamic code assessment, and exploitation techniques for web and mobile applications; and (8) working with cloud native services in AWS, Azure, or GCP.