How do they match: Penetration Testers

  • Develop and execute tests that simulate the techniques of known cyber threat actors.
  • Identify new threat tactics, techniques, or procedures used by cyber threat actors.

  • Examine records or other types of data to investigate criminal activities.
  • Interpret design or operational test results.
  • Investigate illegal or suspicious activities.
  • Prepare technical or operational reports.
  • Test computer system operations to ensure proper functioning.