-
Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
-
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
-
Collect stakeholder data to evaluate risk and to develop mitigation strategies.
-
Identify security system weaknesses, using penetration tests.
-
Develop presentations on threat intelligence.
-
Identify new threat tactics, techniques, or procedures used by cyber threat actors.
-
Maintain up-to-date knowledge of hacking trends.
-
Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
-
Keep up with new penetration testing tools and methods.
-
Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
-
Prepare and submit reports describing the results of security fixes.
-
Discuss security solutions with information technology teams or management.
-
Design security solutions to address known device vulnerabilities.
-
Document penetration test findings.
-
Configure information systems to incorporate principles of least functionality and least access.
-
Gather cyber intelligence to identify vulnerabilities.
-
Conduct network and security system audits, using established criteria.
-
Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
-
Write audit reports to communicate technical and procedural findings and recommend solutions.
-
Update corporate policies to improve cyber security.
-
Develop and execute tests that simulate the techniques of known cyber threat actors.
-
Develop infiltration tests that exploit device vulnerabilities.