How do they match: Penetration Testers

  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.
  • Discuss security solutions with information technology teams or management.