What You'll Do

  • Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.
  • Collect stakeholder data to evaluate risk and to develop mitigation strategies.
  • Conduct network and security system audits, using established criteria.
  • Configure information systems to incorporate principles of least functionality and least access.
  • Design security solutions to address known device vulnerabilities.
  • Develop and execute tests that simulate the techniques of known cyber threat actors.
  • Develop infiltration tests that exploit device vulnerabilities.
  • Develop presentations on threat intelligence.
  • Develop security penetration testing processes, such as wireless, data networks, and telecommunication security tests.
  • Discuss security solutions with information technology teams or management.

Career Fit Overview

Use this summary to sense whether the day to day rhythm and focus of this path line up with what energizes you.

Top passions

  • Analyst: Investigating problems and finding patterns keeps you engaged.
  • Organizer: Bringing order to data and processes satisfies you.
  • Maker: Building and fixing energizes you. You like tangible results and practical tools.

Want a personal read on fit. Take the free assessment and see your exact compatibility with this career and many related roles.

Technologies & Tools

Amazon Web Services AWS software Ansible software Apple iOS Apple macOS Bash C C# C++ Database management systems Docker Firewall software Ghidra GitHub Go Google Android Google Cloud software Hex-Rays IDA Pro HP WebInspect IBM Middleware IBM QRadar SIEM

How to Become One

Most employers require a bachelor's degree in a relevant field. Some positions may also require experience through internships, co-ops, or entry-level work to strengthen your candidacy.

Similar Careers to Explore

Also Known As

This career is known by many different job titles across industries. Here are all the variations:

Application Security Assessor Application Security Hacker Application Security Tester Certified Hacker Certified Tester Consulting Advisory Tester Cyber Assessment Tester Cyber Assessor Cyber Security Engineer Cyber Security Tester Cyber Tester Cybersecurity Engineer (Cyber Engineer) Embedded Tester Ethical Hacker Forensic Analysis Tester Hacker Hardware Hacker Information Security Analyst Information Security Assessor IT Security Tester (Information Technology Security Tester) Network Security Engineer Network Security Tester Penetration Tester Penetration Testing Consultant Risk Tester Security Application Tester Security Architect Security Assessment Tester Security Automation Tester Security Consultant Security Consulting Tester Security Engineer Security Tester Systems Security Tester Tester Vulnerability Analyst Vulnerability Assessment Analyst Vulnerability Management Analyst Vulnerability Management Engineer Vulnerability Researcher