How do they match: Penetration Testers

  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.
  • Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
  • Maintain up-to-date knowledge of hacking trends.

  • Analyze security of systems, network, or data.
  • Examine records or other types of data to investigate criminal activities.
  • Search files, databases or reference materials to obtain needed information.
  • Stay informed about current developments in field of specialization.