- Develop and execute tests that simulate the techniques of known cyber threat actors.
- Develop infiltration tests that exploit device vulnerabilities.
- Develop presentations on threat intelligence.
- Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
- Collect stakeholder data to evaluate risk and to develop mitigation strategies.
- Develop computer or information security policies or procedures.
- Develop computer or information systems.
- Develop organizational policies or programs.
- Develop testing routines or procedures.
- Search files, databases or reference materials to obtain needed information.
- Stay informed about current developments in field of specialization.