How do they match: Penetration Testers

  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.

  • Search files, databases or reference materials to obtain needed information.