A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.
Which name describes this specialist?
Submit