Your Responsibilities Perform penetration testing on chargers, embedded controllers, and backend infrastructures using various techniques (e.g. brute force, code injection, malformed data) Attack implemented security mitigations in order to bypass them, either via software or hardware techniques suc