Conducting internal and external network penetration tests, web application assessments, cloud configuration reviews, social engineering tests, red team engagements, writing detailed findings reports, and working with engineering teams to remediate discovered vulnerabilities.