Create comprehensive exploitation strategies that identify exploitable technical or operational vulnerabilities.
Core KSAT for the following Work Roles
Collaborates to identify access and collection gaps that can be satisfied through cyber collection and/or preparation activities. Leverages all authorized resources and analytic techniques to penetrate targeted networks.
Additional KSAT for the following Work Roles
No Work Roles with Additional KSAT 2194