How do they match: Penetration Testers

  • Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.

  • Investigate illegal or suspicious activities.
  • Examine records or other types of data to investigate criminal activities.