Skip to main content
Information Technology - Careers

Information Technology

Information Technology | Vulnerability Analyst / Penetration Tester

Vulnerability Analyst / Penetration Tester

What Does a Professional in this Career Do?

A Vulnerability Analyst or Penetration Tester probes for and exploits security vulnerabilities in web-based applications, networks and systems. Penetration Tests are designed to achieve a specific, attacker-simulated goal and should be requested by customers who are already at their desired security posture. A typical goal could be to access the contents of the prized customer database on the internal network, or to modify a record in an HR system. Vulnerability Assessments are designed to yield a prioritized list of vulnerabilities and are generally for clients who already understand they are not where they want to be in terms of security. The customer already knows they have issues and simply need help identifying and prioritizing them.

Job Outlook

There were 124 Vulnerability Analyst / Penetration Tester job postings in North Carolina in the past year and 5028 in the United States.

In combination with other careers in the Cyber / Information Security Engineer / Analyst industry, which includes the Vulnerability Analyst / Penetration Tester career, the following graph shows the number of people employed for each year since 2015:

Salary

Many new Vulnerability Analyst / Penetration Tester jobs have salaries estimated to be in the following ranges, based on the requirements and responsibilities listed in job postings from the past year.

National

The average estimated salary in the United States for this career, based on job postings in the past year, is $116,327.

State

The average estimated salary in North Carolina for this career, based on job postings in the past year, is $109,577.

Percentiles represent the percentage that is lower than the value. For example, 25% of estimated salaries for Vulnerability Analyst / Penetration Tester postings in the United States in the past year were lower than $103,647.

Education and Experience

Posted Vulnerability Analyst / Penetration Tester jobs typically require the following level of education. The numbers below are based on job postings in the United States from the past year. Not all job postings list education requirements.

Education LevelPercentage
Associate's Degree0%
Bachelor's Degree71.22%
Master's Degree15.73%
Doctoral Degree3.3%
Other3.88%

Posted Vulnerability Analyst / Penetration Tester jobs typically require the following number of years of experience. The numbers below are based on job postings in the United States from the past year. Not all job postings list experience requirements.

Years of ExperiencePercentage
0 to 2 years13.24%
3 to 5 years48.54%
6 to 8 years25.44%
9+ years12.77%

Skills

Below are listings of the most common general and specialized skills Vulnerability Analyst / Penetration Tester positions expect applicants to have as well as the most common skills that distinguish individuals from their peers. The percentage of job postings that specifically mention each skill is also listed.

Baseline Skills

A skill that is required across a broad range of occupations, including this one.

  • Communication (46.96%)
  • Management (35.08%)
  • Research (32.58%)
  • Operations (26.29%)
  • Problem Solving (25.7%)
  • Leadership (22.06%)
  • Writing (17.4%)
  • Presentations (15.47%)
  • Information Technology (15.45%)
  • Security Policies (11.46%)

Defining Skills

A core skill for this occupation, it occurs frequently in job postings.

  • Qualys (14.41%)
  • Burp Suite (18.81%)
  • Penetration Testing (53.37%)
  • Attack Surface Management (9.34%)
  • Computer Science (42.74%)
  • Automation (24.76%)
  • Kali Linux (14.29%)
  • Vulnerability Assessments (41.94%)
  • Vulnerability Management (41.12%)
  • Vulnerability (89.86%)
  • Nmap (10.81%)
  • Cyber Security (49.94%)
  • Metasploit (14.84%)
  • Offensive Security (11.01%)
  • Vulnerability Scanning (26.24%)
  • Social Engineering (12.17%)
  • Nessus (23.36%)

Necessary Skills

A skill that is requested frequently in this occupation but isn’t specific to it.

  • Ruby (Programming Language) (10.32%)
  • Defense In Depth (6.72%)
  • Cyber Threat Intelligence (18.32%)
  • Workflow Management (7.98%)
  • Application Programming Interface (API) (14.49%)
  • Patch Management (6.6%)
  • Data Analysis (8.44%)
  • Risk Mitigation (5.19%)
  • C (Programming Language) (13.15%)
  • Authentications (4.71%)
  • Application Security (11.43%)
  • Microsoft Azure (12.31%)
  • Bash (Scripting Language) (13.25%)
  • Computer Networks (6.96%)
  • Operating Systems (31.28%)
  • Information Systems (13.25%)
  • Cloud Security (9%)
  • Incident Response (16.72%)
  • Linux (20.55%)
  • Perl (Programming Language) (7.18%)
  • Key Performance Indicators (KPIs) (5.07%)
  • Risk Management (9.68%)
  • Application Development (2.45%)
  • Amazon Web Services (14.05%)
  • Java (Programming Language) (12.03%)
  • Auditing (19.71%)
  • Software Development (7.58%)
  • Risk Analysis (15.44%)
  • Code Review (6.96%)
  • Unix (8.36%)
  • C++ (Programming Language) (11.33%)
  • Security Controls (10.63%)
  • Dashboard (4.97%)
  • TCP/IP (8.02%)
  • Web Applications (6.48%)
  • Computer Engineering (8%)
  • Firewall (8.76%)
  • Threat Modeling (4.89%)
  • Mitigation (14.21%)
  • Python (Programming Language) (38.79%)
  • Network Security (11.23%)
  • Project Management (8.28%)
  • Red Teaming (6.84%)
  • Network Protocols (13.59%)
  • Open Web Application Security Project (OWASP) (17.84%)
  • Payment Card Industry (PCI) Data Security Standards (8.04%)
  • Windows PowerShell (13.97%)
  • Physical Security (4.97%)
  • Security Testing (9.42%)
  • Process Improvement (8.78%)
  • Tooling (5.11%)
  • Scripting (24.16%)
  • ServiceNow (8.16%)
  • IT Security (13.63%)
  • Programming Languages (6.6%)

Distinguishing Skills

A skill that may distinguish a subset of the occupation.

  • Rapid7 (5.67%)
  • Nexpose (Vulnerability Scanning Software) (2.19%)
  • Ghidra (Reverse Engineering Software) (6.46%)
  • X86-64 (4.21%)
  • Binary Ninja (Reverse Engineering Software) (4.87%)
  • IDA Pro (4.87%)
  • Fuzz Testing (3.99%)
  • SQL Injection (3.49%)
  • Common Vulnerability Scoring System (CVSS) (5.03%)
  • Ethical Hacking (7.96%)
  • Web Application Penetration Testing (6.46%)
  • Cross-Site Scripting (1.7%)
  • Kenna Security (4.49%)

Salary Boosting Skills

A professional who wishes to excel in this career path may consider developing the following highly valued skills. The percentage of job postings that specifically mention each skill is listed.

  • Rapid7 (6.43%)
  • Qualys (16.35%)
  • Web Application Penetration Testing (7.32%)
  • Red Teaming (7.75%)
  • Nexpose (Vulnerability Scanning Software) (2.48%)
  • Ghidra (Reverse Engineering Software) (7.32%)
  • Attack Surface Management (10.6%)
  • Binary Ninja (Reverse Engineering Software) (5.53%)
  • X86-64 (4.77%)
  • Burp Suite (21.33%)
  • Common Vulnerability Scoring System (CVSS) (5.71%)
  • Cyber Security (56.64%)
  • Ethical Hacking (9.03%)
  • Kali Linux (16.21%)
  • Vulnerability Scanning (29.76%)
  • Offensive Security (12.48%)
  • Social Engineering (13.8%)
  • HP WebInspect (2.86%)
  • Scripting (27.4%)
  • Nessus (26.49%)

Alternative Job Titles

Sometimes employers post jobs with Vulnerability Analyst / Penetration Tester skills but a different job title. Some common alternative job titles include:

  • Penetration Tester
  • Vulnerability Management Analyst
  • Vulnerability Analyst
  • Vulnerability Researcher
  • Vulnerability Assessment Analyst
  • Ethical Hacker
  • Vulnerability Management Engineer
  • Information Security Analyst/Penetration Tester
  • Cybersecurity Associate
  • Cybersecurity Analyst

Similar Occupations

If you are interested in exploring occupations with similar skills, you may want to research the following job titles. Note that we only list occupations that have at least one corresponding NC State Online and Distance Education program.

Common Employers

Here are the employers that have posted the most Vulnerability Analyst / Penetration Tester jobs in the past year along with how many they have posted.

United States

  • Marriott International (276)
  • Leidos (137)
  • Nelnet (130)
  • Deloitte (108)
  • Raytheon Technologies (101)
  • Lumen Technologies (79)
  • Ryder (67)
  • Booz Allen Hamilton (64)
  • Amazon (63)
  • Mindpoint Group (59)

North Carolina

  • Smx Corporation Limited (7)
  • Marriott International (4)
  • Insight Global (4)
  • Deloitte (4)
  • MetLife (4)
  • Randstad (4)
  • Digital Technology Solutions (3)
  • First Citizens Bank And Trust Company (3)
  • TEKsystems (3)
  • Truist Financial (3)

NC State Programs Relevant to this Career

If you are interested in preparing for a career in this field, the following NC State Online and Distance Education programs offer a great place to start!