Job Description Templates
  • Search
  • Menu Menu

Penetration Testers

CrowdSourceLawyers.com

Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.

This title represents an occupation for which data collection is currently underway.

View report: Summary  Details  Custom  My Next MoveEasy Read  My Next Move for VeteransVeterans  Mi Próximo PasoEspañol

Tasks  |  Detailed Work Activities  |  Job Zone  |  Credentials  |  Wages & Employment  |  Job Openings

Tasks

Show fewer All 22 displayed
  • Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.See more occupations related to this task.
  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.See more occupations related to this task.
  • Conduct network and security system audits using established criteria.See more occupations related to this task.
  • Configure information systems to incorporate principles of least functionality and least access.See more occupations related to this task.
  • Design security solutions to address known device vulnerabilities.See more occupations related to this task.
  • Develop and execute tests that simulate the techniques of known cyber threat actors.See more occupations related to this task.
  • Develop infiltration tests that exploit device vulnerabilities.See more occupations related to this task.
  • Develop presentations on threat intelligence.See more occupations related to this task.
  • Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.See more occupations related to this task.
  • Discuss security solutions with information technology teams or management.See more occupations related to this task.
  • Document penetration test findings.See more occupations related to this task.
  • Evaluate vulnerability assessments of local computing environments, networks, infrastructures, or enclave boundaries.See more occupations related to this task.
  • Gather cyber intelligence to identify vulnerabilities.See more occupations related to this task.
  • Identify new threat tactics, techniques, or procedures used by cyber threat actors.See more occupations related to this task.
  • Identify security system weaknesses using penetration tests.See more occupations related to this task.
  • Investigate security incidents by using computer forensics, network forensics, root cause analysis, or malware analysis.See more occupations related to this task.
  • Keep up with new penetration testing tools and methods.See more occupations related to this task.
  • Maintain up-to-date knowledge of hacking trends.See more occupations related to this task.
  • Prepare and submit reports describing the results of security fixes.See more occupations related to this task.
  • Test the security of systems by attempting to gain access to networks, web-based applications, or computers.See more occupations related to this task.
  • Update corporate policies to improve cyber security.See more occupations related to this task.
  • Write audit reports to communicate technical and procedural findings and recommend solutions.See more occupations related to this task.

Find occupations related to multiple tasks

back to top

CrowdSourceLawyers.com

https://crowdsourcelawyers.com/job-description-templates/

Detailed Work Activities

Show fewer All 18 displayed
  • Develop testing routines or procedures.See more occupations related to this activity.
  • Analyze security of systems, network, or data.See more occupations related to this activity.
  • Prepare scientific or technical reports or presentations.See more occupations related to this activity.
  • Stay informed about current developments in field of specialization.See more occupations related to this activity.
  • Analyze risks to minimize losses or damages.See more occupations related to this activity.
  • Develop computer or information security policies or procedures.See more occupations related to this activity.
  • Develop computer or information systems.See more occupations related to this activity.
  • Develop organizational policies or programs.See more occupations related to this activity.
  • Discuss design or technical features of products or services with technical personnel.See more occupations related to this activity.
  • Evaluate characteristics of equipment or systems.See more occupations related to this activity.
  • Examine records or other types of data to investigate criminal activities.See more occupations related to this activity.
  • Interpret design or operational test results.See more occupations related to this activity.
  • Investigate illegal or suspicious activities.See more occupations related to this activity.
  • Prepare analytical reports.See more occupations related to this activity.
  • Prepare technical or operational reports.See more occupations related to this activity.
  • Search files, databases or reference materials to obtain needed information.See more occupations related to this activity.
  • Test computer system operations to ensure proper functioning.See more occupations related to this activity.
  • Test performance of electrical, electronic, mechanical, or integrated systems or equipment.See more occupations related to this activity.

Find occupations related to multiple detailed work activities

back to top

Job Zone

Title Job Zone Four: Considerable Preparation Needed
Education Most of these occupations require a four-year bachelor’s degree, but some do not.
Related Experience A considerable amount of work-related skill, knowledge, or experience is needed for these occupations. For example, an accountant must complete four years of college and work for several years in accounting to be considered qualified.
Job Training Employees in these occupations usually need several years of work-related experience, on-the-job training, and/or vocational training.
Job Zone Examples Many of these occupations involve coordinating, supervising, managing, or training others. Examples include real estate brokers, sales managers, database administrators, graphic designers, chemists, art directors, and cost estimators.
SVP Range (7.0 to < 8.0)

back to top

Credentials

Find Training Find Certifications Apprenticeship.gov

back to top

Wages & Employment Trends

Median wage data for Computer Occupations, All Other.
Employment data for Computer Occupations, All Other.
Industry data for Computer Occupations, All Other.

Median wages (2020) $44.65 hourly, $92,870 annual
State wages
 
Local wages
  
Employment (2020) 442,200 employees
Projected growth (2020-2030) Average (5% to 10%) Average (5% to 10%)
Projected job openings (2020-2030) 37,500
State trends
 
Top industries (2020)
Professional, Scientific, and Technical Services
Government

Source: Bureau of Labor Statistics 2020 wage data external site and 2020-2030 employment projections external site. “Projected growth” represents the estimated change in total employment over the projections period (2020-2030). “Projected job openings” represent openings due to growth and replacement.

back to top

Job Openings on the Web

Find Jobs

back to top


This page includes information from O*NET OnLine by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. O*NET® is a trademark of USDOL/ETA.

© Copyright | CrowdSourceLawyers
Scroll to top