Computer and Mathematical
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
This page includes information from the O*NET 28.3 Database by the U.S. Department of Labor, Employment and Training Administration (USDOL/ETA). Used under the CC BY 4.0 license. Builtneat Pty Ltd trading as Study Start, has modified all or some of this information. USDOL/ETA has not approved, endorsed, or tested these modifications.