Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 390

Ethical Hacker

What is Ethical Hacker?

Ethical HackerA security professional authorized to use offensive techniques against systems to identify weaknesses and help owners remediate them before adversaries exploit them.


An ethical hacker is a practitioner who applies adversarial thinking and offensive tooling within a clearly defined legal and contractual scope. Working as a penetration tester, red teamer, application security engineer, or bug bounty hunter, they sign engagement contracts, follow rules of engagement, respect data-protection laws, and report findings through coordinated disclosure. Ethical hackers often hold certifications such as OSCP, OSEP, CRTO, CISSP, GPEN, or CEH and adhere to professional codes of conduct from organizations like (ISC)2, EC-Council, and OffSec. The term largely overlaps with white hat hacker, but emphasizes the formalized, employed, and accountable nature of the work.

Examples

  1. 01

    An ethical hacker performing an authorized red-team engagement to test detection and response capabilities.

  2. 02

    A bug bounty researcher submitting an authentication bypass via a vendor's safe-harbor program.

Frequently asked questions

What is Ethical Hacker?

A security professional authorized to use offensive techniques against systems to identify weaknesses and help owners remediate them before adversaries exploit them. It belongs to the Defense & Operations category of cybersecurity.

What does Ethical Hacker mean?

A security professional authorized to use offensive techniques against systems to identify weaknesses and help owners remediate them before adversaries exploit them.

How does Ethical Hacker work?

An ethical hacker is a practitioner who applies adversarial thinking and offensive tooling within a clearly defined legal and contractual scope. Working as a penetration tester, red teamer, application security engineer, or bug bounty hunter, they sign engagement contracts, follow rules of engagement, respect data-protection laws, and report findings through coordinated disclosure. Ethical hackers often hold certifications such as OSCP, OSEP, CRTO, CISSP, GPEN, or CEH and adhere to professional codes of conduct from organizations like (ISC)2, EC-Council, and OffSec. The term largely overlaps with white hat hacker, but emphasizes the formalized, employed, and accountable nature of the work.

How do you defend against Ethical Hacker?

Defences for Ethical Hacker typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Ethical Hacker?

Common alternative names include: White hat hacker, Penetration tester.

Related terms

See also