Understanding the Role of a Pentester in Cybersecurity