Penetration Testers

system procedure information security computer activity critical system feature of products test computer system operation criminal activity
Where in the military? Select a military branch to see samples.
Cyber Defense Operations; Cyber Surety; Cyber Surety Craftsman; Cyber Surety Journeyman; Cyber Systems Operations Craftsman; Cyber Systems Operations Journeyman; Cyberspace Support Superintendent; Spectrum Defense Operations Apprentice, Spectrum Operations; Spectrum Defense Operations Craftsman, Spectrum Operations; Spectrum Defense Operations Helper, Spectrum Operations
Cyber Network Defender; Network Systems Engineering
No similar titles were found.
Cryptologic Cyberspace Analyst; Intelligence Software/Security Engineer
ADP Systems Security Officer; Basic Offensive Cyber Operator; Computer Network Capability Development; Cryptologic Infrastructure Maintenance Director; Cryptologic Technicians (Collection); Cyber Exploitation Analyst; Cyber Research and Development Specialist; Cyberspace Operations Planner; Interactive Operator; Navy Interactive On-Net (ION) Operator (Unix)
No similar titles were found.
What they do:
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
On the job, you would:
  • Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.
  • Conduct network and security system audits, using established criteria.


Knowledge information for this career will be available soon.


Skills information for this career will be available soon.


Abilities information for this career will be available soon.


Information for this career will be available soon.


You might use software like this on the job:

Development environment software

  • Go Hot Technology In Demand
  • Oracle Java 2 Platform Enterprise Edition J2EE Hot Technology In Demand

Operating system software

  • Bash Hot Technology In Demand
  • Shell script Hot Technology In Demand

Transaction security and virus protection software

  • Invicti Acunetix
  • Metasploit In Demand


Education: (rated 4 of 5)

Get started on your career:

Find Training

Job Outlook

New job opportunities are very likely in the future.
Local Salary Info
Find Jobs
See more details at O*NET OnLine about penetration testers.