How do they match: Penetration Testers

  • Identify new threat tactics, techniques, or procedures used by cyber threat actors.
  • Write audit reports to communicate technical and procedural findings and recommend solutions.

  • Develop computer or information security policies or procedures.
  • Develop testing routines or procedures.