How do they match: Penetration Testers

  • Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
  • Develop and execute tests that simulate the techniques of known cyber threat actors.
  • Identify new threat tactics, techniques, or procedures used by cyber threat actors.

  • Examine records or other types of data to investigate criminal activities.
  • Investigate illegal or suspicious activities.