The role to assess the security of a organization by employing red-team techniques to validate their security measures.
Environments
- Unknown : Working in a black box, like real attackers
- Partially known: Working in grey box
- Known environment: Working in white box. Like Insider Threats