Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Private for profit
State and local government
Private not for profit
Federal Government
Self-employed
No data available for this section.
Data supplied by Bureau of Labor Statistics, National Center of Education Statistics, Defense Manpower Data Center (View our update schedule). Contact any business, college or military service branch to answer additional questions.