Vulnerability Analyst / Penetration Tester
What Does a Professional in this Career Do?
A Vulnerability Analyst or Penetration Tester probes for and exploits security vulnerabilities in web-based applications, networks and systems. Penetration Tests are designed to achieve a specific, attacker-simulated goal and should be requested by customers who are already at their desired security posture. A typical goal could be to access the contents of the prized customer database on the internal network, or to modify a record in an HR system. Vulnerability Assessments are designed to yield a prioritized list of vulnerabilities and are generally for clients who already understand they are not where they want to be in terms of security. The customer already knows they have issues and simply need help identifying and prioritizing them.
Job Outlook
There were 155 Vulnerability Analyst / Penetration Tester job postings in North Carolina in the past year and 5776 in the United States.
In combination with other careers in the Cyber / Information Security Engineer / Analyst industry, which includes the Vulnerability Analyst / Penetration Tester career, the following graph shows the number of people employed for each year since 2015:
Salary
Many new Vulnerability Analyst / Penetration Tester jobs have salaries estimated to be in the following ranges, based on the requirements and responsibilities listed in job postings from the past year.
National
The average estimated salary in the United States for this career, based on job postings in the past year, is $100,869.
State
The average estimated salary in North Carolina for this career, based on job postings in the past year, is $94,725.
Percentiles represent the percentage that is lower than the value. For example, 25% of estimated salaries for Vulnerability Analyst / Penetration Tester postings in the United States in the past year were lower than $87,892.
Education and Experience
Posted Vulnerability Analyst / Penetration Tester jobs typically require the following level of education. The numbers below are based on job postings in the United States from the past year. Not all job postings list education requirements.
Education Level | Percentage |
---|---|
Associate's Degree | 2.58% |
Bachelor's Degree | 71.23% |
Master's Degree | 14.58% |
Doctoral Degree | 3.46% |
Other | 4.31% |
Posted Vulnerability Analyst / Penetration Tester jobs typically require the following number of years of experience. The numbers below are based on job postings in the United States from the past year. Not all job postings list experience requirements.
Years of Experience | Percentage |
---|---|
0 to 2 years | 13.69% |
3 to 5 years | 50.82% |
6 to 8 years | 22.88% |
9+ years | 12.61% |
Skills
Below are listings of the most common general and specialized skills Vulnerability Analyst / Penetration Tester positions expect applicants to have as well as the most common skills that distinguish individuals from their peers. The percentage of job postings that specifically mention each skill is also listed.
Baseline Skills
A skill that is required across a broad range of occupations, including this one.
- Communication (43.25%)
- Research (37.55%)
- Management (34.02%)
- Operations (26.21%)
- Leadership (22.59%)
- Problem Solving (21.59%)
- Information Technology (16.34%)
- Writing (15.41%)
- Presentations (12.34%)
- Troubleshooting (Problem Solving) (10.66%)
Defining Skills
A core skill for this occupation, it occurs frequently in job postings.
- Vulnerability Assessments (38.94%)
- Cyber Security (45.37%)
- Vulnerability Management (39.39%)
- Burp Suite (17.83%)
- Social Engineering (10.4%)
- Qualys (13.4%)
- Penetration Testing (53.81%)
- Kali Linux (10.86%)
- Scripting (27.55%)
- Vulnerability Scanning (25.12%)
- Vulnerability (87.04%)
- Offensive Security (11.14%)
- Red Teaming (8.43%)
- Nessus (22.67%)
- Nmap (9.72%)
- Python (Programming Language) (35.66%)
- Computer Science (38.66%)
Necessary Skills
A skill that is requested frequently in this occupation but isn’t specific to it.
- Application Security (15.48%)
- Bash (Scripting Language) (12.84%)
- C++ (Programming Language) (13.14%)
- Debugging (7.44%)
- Automation (20.56%)
- Security Controls (9.35%)
- C (Programming Language) (15.03%)
- Ruby (Programming Language) (9.55%)
- Java (Programming Language) (12.37%)
- Linux (21.97%)
- Network Infrastructure (7.53%)
- Security Testing (9.88%)
- Incident Response (13.84%)
- Cyber Threat Intelligence (16.71%)
- Data Analysis (10.33%)
- Network Protocols (12.12%)
- Operating Systems (32.19%)
- Information Systems (15.19%)
- Microsoft Azure (10.61%)
- Computer Engineering (8.41%)
- JavaScript (Programming Language) (6.06%)
- Windows PowerShell (13.77%)
- Security Requirements Analysis (6.99%)
- Mitigation (13.21%)
- Risk Analysis (13.1%)
- Tooling (4.69%)
- Cloud Security (5.54%)
- Unix (10.26%)
- IT Security (11.96%)
- Code Review (8.5%)
- Application Programming Interface (API) (8.55%)
- Open Web Application Security Project (OWASP) (17.8%)
- Project Management (9.06%)
- Perl (Programming Language) (9.67%)
- Software Development (9.07%)
- Web Applications (7.92%)
- Auditing (18.11%)
- Amazon Web Services (13.59%)
- Mobile Application Development (6.95%)
- Dashboard (4.66%)
- Network Security (15.17%)
- Risk Management (10.6%)
- IT Security Architecture (4.33%)
Distinguishing Skills
A skill that may distinguish a subset of the occupation.
- Mobile Application Penetration Testing (2.94%)
- Common Vulnerability Scoring System (CVSS) (6.1%)
- Rapid7 (5.73%)
- Ghidra (Reverse Engineering Software) (6.2%)
- Web Application Penetration Testing (4.4%)
- OllyDBg (3.08%)
- WinDBg (3.45%)
- IDA Pro (6.2%)
- Fuzz Testing (4.01%)
- Metasploit (16.08%)
- Ethical Hacking (6.15%)
- X86-64 (4.27%)
- Binary Ninja (Reverse Engineering Software) (5.11%)
- SQL Injection (5.04%)
Salary Boosting Skills
A professional who wishes to excel in this career path may consider developing the following highly valued skills. The percentage of job postings that specifically mention each skill is listed.
- Rapid7 (7.27%)
- Qualys (17%)
- Ghidra (Reverse Engineering Software) (7.87%)
- IDA Pro (7.87%)
- Burp Suite (22.63%)
- Fuzz Testing (5.09%)
- Python (Programming Language) (45.25%)
- Social Engineering (13.2%)
- Vulnerability Management (49.99%)
- WinDBg (4.38%)
Alternative Job Titles
Sometimes employers post jobs with Vulnerability Analyst / Penetration Tester skills but a different job title. Some common alternative job titles include:
- Penetration Tester
- Vulnerability Management Analyst
- Vulnerability Analyst
- Vulnerability Researcher
- Vulnerability Assessment Analyst
- Vulnerability Management Engineer
- Ethical Hacker
- Security Analyst
- Information Security Analyst/Penetration Tester
- Principal Associate
Similar Occupations
If you are interested in exploring occupations with similar skills, you may want to research the following job titles. Note that we only list occupations that have at least one corresponding NC State Online and Distance Education program.
- Cyber Security Engineer
- Cyber Security Manager / Administrator
- Cyber Security Architect
- Incident Analyst / Responder
- Security / Defense Intelligence Analyst
Common Employers
Here are the employers that have posted the most Vulnerability Analyst / Penetration Tester jobs in the past year along with how many they have posted.
United States
- Deloitte (320)
- Leidos (205)
- Mindpoint Group (179)
- Marriott International (162)
- Raytheon Technologies (111)
- Capital One (102)
- Nelnet (98)
- Amazon (72)
- Motion Recruitment (69)
- Ryder (67)
North Carolina
- Randstad (14)
- Deloitte (10)
- Truist Financial (7)
- Mindpoint Group (7)
- Smx Corporation Limited (4)
- Verizon Communications (4)
- ManpowerGroup (4)
- Marriott International (3)
- Pearson Education (3)
- Ally Financial (3)
NC State Programs Relevant to this Career
If you are interested in preparing for a career in this field, the following NC State Online and Distance Education programs offer a great place to start!
All wages, job posting statistics, employment trend projections, and information about skill desirability on this page represents historical data and does not guarantee future conditions. Data is provided by and downloaded regularly from Lightcast. For more information about how Lightcast gathers data and what it represents, see Lightcast Data: Basic Overview on Lightcast's Knowledge Base website.