Ohio.gov Logo
It's a bright outlook for
This career will grow rapidly in the next few years.
Learn more about what they do.
Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.
Related: Computer Systems Engineers/Architects Information Security Analysts Information Security Engineers Software Developers Software Quality Assurance Analysts & Testers
Industries: Professional, Science, & Technical Government
Answer a few questions to determine your target salary. Use this target salary to help choose the right occupation for you.
The Workforce Supply Tool provides statistics for the occupations in highest demand throughout Ohio.
You can view statewide statistics as well as more region specific information.