How do they match: Penetration Testers

  • Develop and execute tests that simulate the techniques of known cyber threat actors.
  • Identify new threat tactics, techniques, or procedures used by cyber threat actors.

  • Examine records or other types of data to investigate criminal activities.
  • Investigate illegal or suspicious activities.