How do they match: Penetration Testers

  • Configure information systems to incorporate principles of least functionality and least access.

  • Develop organizational policies or programs.
  • Test computer system operations to ensure proper functioning.