Specifications include, but are not limited to: External Network Penetration and Vulnerability Testing•Testing of identified IP addresses to attempt to gain access.•Broad scans to identify potential areas of exposure and services that may act as entry points.•Identification of vulnerabilities.•Targeted scans and manual investigation to validate vulnerabilities.•Identification of issues of immediate consequence and recommended solutions.•Ranking of vulnerabilities based on threat level, loss potential and likelihood of exploitation.External Web Application Security Assessment•Dynamic vulnerability scanning.•Malicious code analysis. •Manual code review.•Manual penetration testing.•Project Management - monitor and control project and ensure that it is completed in satisfactoryand timely manner.