This person will be able to assess a company's security posture, perform in-depth penetration testing using a variety of assessment tools, and set up dynamic defenses to prevent intrusion. They will have a firm understanding of cryptography and various attacks and be able to execute the 5 key elements of a Pen Test; Information Gathering, Scanning, Enumeration, Exploitation and Reporting. They will be able to function within a larger cybersecurity team and protect operating systems from attack.