How do they match: Penetration Testers

  • Configure information systems to incorporate principles of least functionality and least access.

  • Test computer system operations to ensure proper functioning.