Penetration Testers
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
40 alternate job titles:
Salary Information
Penetration Testers: $108,970 (median) per year.
Starting salary (10th percentile).
Required expreience: Varies by Company
Data source: U.S. Bureau of Labor Statistics
Daily Tasks & Responsibilities
| Task Description | Category |
|---|---|
| Evaluate characteristics of equipment or systems. | Analysis |
| Analyze risks to minimize losses or damages. | Analysis |
| Analyze security of systems, network, or data. | Analysis |
| Develop computer or information systems. | Development |
| Develop computer or information security policies or procedures. | Development |
| Develop testing routines or procedures. | Development |
| Discuss design or technical features of products or services with technical personnel. | Development |
| Interpret design or operational test results. | Development |
| Stay informed about current developments in field of specialization. | Development |
| Develop organizational policies or programs. | Development |
| Test performance of electrical, electronic, mechanical, or integrated systems or equipment. | General |
| Prepare technical or operational reports. | General |
| Search files, databases or reference materials to obtain needed information. | General |
| Investigate illegal or suspicious activities. | General |
| Examine records or other types of data to investigate criminal activities. | General |
| Test computer system operations to ensure proper functioning. | General |
| Prepare analytical reports. | General |
| Prepare scientific or technical reports or presentations. | Communication |
Technology Requirements
| Technology | Description |
|---|---|
| Amazon Web Services AWS software | Data base user interface and query software |
| ServiceNow | Data base user interface and query software |
| Microsoft SQL Server | Data base user interface and query software |
| Structured query language SQL | Data base user interface and query software |
| Database management systems | Data base management system software |
| Bash | Operating system software |
| C | Development environment software |
| C# | Object or component oriented development software |
| C++ | Object or component oriented development software |
| Go | Development environment software |
| JavaScript | Web platform development software |
| Linux | Operating system software |
| Microsoft Azure software | Development environment software |
| Microsoft PowerShell | Development environment software |
| Oracle Java | Object or component oriented development software |
| Perl | Object or component oriented development software |
| Python | Object or component oriented development software |
| Ruby | Development environment software |
| UNIX | Operating system software |
| Ansible software | Expert system software |
| Apple iOS | Operating system software |
| Apple macOS | Operating system software |
| Docker | Application server software |
| GitHub | Application server software |
| Google Android | Operating system software |
| IBM Terraform | Configuration management software |
| Kubernetes | Application server software |
| Microsoft Active Directory | Internet directory services software |
| Microsoft Active Server Pages ASP | Web platform development software |
| Microsoft Excel | Spreadsheet software |
| Microsoft Office software | Office suite software |
| Oracle Java 2 Platform Enterprise Edition J2EE | Development environment software |
| PHP | Web platform development software |
| Shell script | Operating system software |
| Splunk Enterprise | Enterprise system management software |
| Firewall software | Network security and virtual private network VPN equipment software |
| Ghidra | Computer aided design CAD software |
| Kali Linux | Program testing software |
| MITRE ATT&CK software | Program testing software |
| Metasploit | Transaction security and virus protection software |
| Nmap | Transaction security and virus protection software |
| Operating system software | Operating system software |
| Portswigger BurP Suite | Transaction security and virus protection software |
| Qualys Cloud Platform | Cloud-based protection or security software |
| Rapid7 software | Transaction security and virus protection software |
| Tenable Nessus | Transaction security and virus protection software |
| Web application software | Development environment software |
| Wireshark | Network monitoring software |
| Google Cloud software | Cloud-based management software |
| HP WebInspect | Transaction security and virus protection software |
| Hex-Rays IDA Pro | Compiler and decompiler software |
| IBM Middleware | Transaction server software |
| IBM QRadar SIEM | Network monitoring software |
| Invicti Acunetix | Transaction security and virus protection software |
| Magellan Firmware | Operating system software |
| Management information systems MIS | Enterprise resource planning ERP software |
| Microsoft Azure DevOps Services | Development environment software |
| Microsoft Visual Basic Scripting Edition VBScript | Development environment software |
| Objective C | Object or component oriented development software |
| RESTful API | Web platform development software |
| Rapid7 Nexpose | Transaction security and virus protection software |
| Rust programming language | Development environment software |
| Security assertion markup language SAML | Web platform development software |
| Software development tools | Development environment software |
| Software libraries | Development environment software |
| System testing software | Program testing software |
| Vector 35 Binary Ninja | Compiler and decompiler software |
| Web server software | Transaction server software |