How do they match: Penetration Testers

  • Discuss security solutions with information technology teams or management.

  • Search files, databases or reference materials to obtain needed information.