Collaborate with Cyber Threat Intelligence in other regions. Support Incident Response, Purple team, and Vulnerability Management teams by providing situational awareness on threats. Monitor and evaluate cyber threat intelligence from multiple sources. Participate in threat modeling processes and methodologies. Execute threat hunts to proactively look for malicious activities. Conduct testing activities as per the agreed scope and timeline, avoid disruption to business operations, and adhere to industry-standard methodologies (e.g., OWASP). Testing methodologies for web applications including injection attacks, XSS, CSRF, broken authentication & session management, security misconfiguration, sensitive data exposure, and insecure direct object reference. Use authorized tools (e.g., Burp Suite) and techniques to identify vulnerabilities and assess risk.