Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 812

Penetration Tester

What is Penetration Tester?

Penetration TesterAn authorized offensive-security professional who simulates real-world attacks against systems, applications, or people to find exploitable weaknesses before adversaries do.


A Penetration Tester (pentester) is an authorized offensive-security professional who emulates real-world attackers to find exploitable weaknesses in networks, cloud, applications, mobile, hardware, and people. Engagements range from black-box external assessments to assumed-breach exercises and full red-team operations, and each ends in a written report with reproducible proofs of concept and prioritized remediation guidance. Pentesters typically work in internal red teams, consultancies, or for managed-security vendors, reporting to a head of offensive security or service-line lead. Common qualifications combine deep practical skills with certifications such as OSCP, OSCE/OSEP, CRTO, GPEN, GXPN, or BSCP, and a track record of public CVEs, CTF results, or research.

Examples

  1. 01

    Web application pentest of a banking portal, exploiting an IDOR to access other customers' statements.

  2. 02

    Internal pentest that chains an unpatched print spooler bug to domain administrator.

Frequently asked questions

What is Penetration Tester?

An authorized offensive-security professional who simulates real-world attacks against systems, applications, or people to find exploitable weaknesses before adversaries do. It belongs to the Roles & Careers category of cybersecurity.

What does Penetration Tester mean?

An authorized offensive-security professional who simulates real-world attacks against systems, applications, or people to find exploitable weaknesses before adversaries do.

How does Penetration Tester work?

A Penetration Tester (pentester) is an authorized offensive-security professional who emulates real-world attackers to find exploitable weaknesses in networks, cloud, applications, mobile, hardware, and people. Engagements range from black-box external assessments to assumed-breach exercises and full red-team operations, and each ends in a written report with reproducible proofs of concept and prioritized remediation guidance. Pentesters typically work in internal red teams, consultancies, or for managed-security vendors, reporting to a head of offensive security or service-line lead. Common qualifications combine deep practical skills with certifications such as OSCP, OSCE/OSEP, CRTO, GPEN, GXPN, or BSCP, and a track record of public CVEs, CTF results, or research.

How do you defend against Penetration Tester?

Defences for Penetration Tester typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Penetration Tester?

Common alternative names include: Ethical hacker, Offensive security engineer.

Related terms

See also