We use cookies to improve your experience and for marketing. Read our cookie policy or manage cookies.

Penetration Testers

15-1299.04

Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.

Sample of reported job titles: Application Security Assessor, Application Security Hacker, Application Security Tester, Certified Hacker, Certified Tester, Consulting Advisory Tester, Cyber Assessment Tester, Cyber Assessor, Cyber Security Engineer, Cyber Security Tester, Cyber Tester, Cybersecurity Engineer (Cyber Engineer), Embedded Tester, Forensic Analysis Tester, Hacker, Hardware Hacker, Information Security Analyst, Information Security Assessor, IT Security Tester (Information Technology Security Tester), Network Security Engineer, Network Security Tester, Penetration Tester, Penetration Testing Consultant, Risk Tester, Security Application Tester, Security Architect, Security Assessment Tester, Security Automation Tester, Security Consultant, Security Consulting Tester, Security Engineer, Security Tester, Systems Security Tester, Tester, Vulnerability Analyst, Vulnerability Assessment Analyst
Occupation-Specific Information
Tasks
Technology Skills
Occupational Requirements
Work Activities
Detailed Work Activities