Back to Explore
TASK
Penetration Testers
ID
work_computer_mathematical/penetration_testers
Type
TASK
Children
22
Child Nodes (22)
ATOMIC
Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
ATOMIC
Collect stakeholder data to evaluate risk and to develop mitigation strategies.
ATOMIC
Conduct network and security system audits, using established criteria.
ATOMIC
Configure information systems to incorporate principles of least functionality and least access.
ATOMIC
Design security solutions to address known device vulnerabilities.
ATOMIC
Develop and execute tests that simulate the techniques of known cyber threat actors.
ATOMIC
Develop infiltration tests that exploit device vulnerabilities.
ATOMIC
Develop presentations on threat intelligence.
ATOMIC
Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
ATOMIC
Discuss security solutions with information technology teams or management.
ATOMIC
Document penetration test findings.
ATOMIC
Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.
ATOMIC
Gather cyber intelligence to identify vulnerabilities.
ATOMIC
Identify new threat tactics, techniques, or procedures used by cyber threat actors.
ATOMIC
Identify security system weaknesses, using penetration tests.
ATOMIC
Investigate security incidents, using computer forensics, network forensics, root cause analysis, or malware analysis.
ATOMIC
Keep up with new penetration testing tools and methods.
ATOMIC
Maintain up-to-date knowledge of hacking trends.
ATOMIC
Prepare and submit reports describing the results of security fixes.
ATOMIC
Test the security of systems by attempting to gain access to networks, Web-based applications, or computers.
ATOMIC
Update corporate policies to improve cyber security.
ATOMIC