How do they match: Penetration Testers

  • Develop and execute tests that simulate the techniques of known cyber threat actors.
  • Develop infiltration tests that exploit device vulnerabilities.
  • Develop presentations on threat intelligence.
  • Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.

  • Develop computer or information security policies or procedures.
  • Develop computer or information systems.
  • Develop organizational policies or programs.
  • Develop testing routines or procedures.
  • Discuss design or technical features of products or services with technical personnel.
  • Stay informed about current developments in field of specialization.