...Security in accordance with organizational needs ~Conduct, develop, and evaluate Penetration Test & Vulnerability Assessment ~Review... ...documentation, such as detailed configuration of hardware, software, firmware, etc ~Create roadmap / timeline related to penetration...