Back to search:Red Team / Jakarta

Red Team

  • Minimize findings from security assessments (Vulnerability Assessment and Penetration Testing – VAPT) by proactively identifying vulnerabilities in advance.
  • Reduce information security risks, including those related to system development activities (projects, business-as-usual operations, and enhancements).

Requirements

  • Information Security/Cyber Security
  • Risk Assessment
  • IT Governance
  • COBIT/CISM/CRISC/CISSP
  • OSCP/OSCE