• Perform security assessment by penetration testing, vulnerability scan, or another method to IT infrastructure, application, and related IT system• Conduct the risk-based analysis of issues or vulnerability from the security assessment.
• Provide the solution and consulting to fixing or mitigating the finding of vulnerability.
• Coordinate and facilitate with the related party to establish the security assessment e.g. selected vendors, application team, and system administrator
• Operate, m