How do they match: Penetration Testers

  • Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.
  • Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
  • Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
  • Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
  • Maintain up-to-date knowledge of hacking trends.
  • Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.

  • Analyze security of systems, network, or data.
  • Develop computer or information security policies or procedures.
  • Develop computer or information systems.
  • Discuss design or technical features of products or services with technical personnel.
  • Examine records or other types of data to investigate criminal activities.
  • Search files, databases or reference materials to obtain needed information.
  • Test computer system operations to ensure proper functioning.