Interactive Demo
This demonstration page allows you to test out the Web Services API by sending a request and viewing the JSON data returned. See the Reference Manual for a complete guide to the available services.
Request
Response
Send a request to see the response.
Loading...
The request could not be completed (). Please try again.
URL:
https://api-v2.onetcenter.org/veterans/careers/15-1299.04/
Status:
200 OK
Content-Type:
application/json
{
"code": "15-1299.04",
"title": "Penetration Testers",
"tags": {
"bright_outlook": true
},
"sample_of_military_titles": {
"air_force": [
"Cyber Defense Operations",
"Cyber Defense Operations Superintendent",
"Spectrum Defense Operations",
"Spectrum Defense Operations Apprentice",
"Spectrum Defense Operations Apprentice, Spectrum Operations",
"Spectrum Defense Operations Helper",
"Spectrum Defense Operations Helper, Spectrum Operations"
],
"army": [
"Cyber Capabilities Development Officer",
"Cyber Network Defender",
"Cyberspace and Electromagnetic Activities (CEMA) Senior Sergeant (CEMA Sr SGT)",
"Network Systems Engineering"
],
"coast_guard": [
"Cyber Mission Specialist"
],
"marine_corps": [
"Cryptologic Cyberspace Analyst",
"Cyberspace Warfare Operator",
"Defensive Cyberspace Warfare Officer",
"Exploitation Analyst",
"Host Analyst",
"Network Analyst"
],
"navy": [
"Access Network Operator",
"Basic Offensive Cyber Operator",
"Computer Network Capability Development",
"Cryptologic Technicians (Collection)",
"Cyber Defense Analyst – Host (CDA-Host)",
"Cyber Network Defense Infrastructure Specialist (CNDIS)",
"Cyber Threat Emulation Operator",
"Cyber Warfare Technician",
"Interactive Operator",
"Navy Interactive On-Net (ION) Operator (Windows)"
],
"space_force": []
},
"what_they_do": "Evaluate network system security by conducting simulated internal and external cyberattacks using adversary tools and techniques. Attempt to breach and exploit critical systems and gain access to sensitive information to assess system security.",
"on_the_job": [
"Assess the physical security of servers, systems, or network devices to identify vulnerability to temperature, vandalism, or natural disasters.",
"Collect stakeholder data to evaluate risk and to develop mitigation strategies.",
"Conduct network and security system audits, using established criteria."
],
"word_cloud_terms": [
"system",
"procedure",
"information",
"security",
"computer",
"activity",
"critical system",
"feature of products",
"test computer system operation",
"criminal activity"
],
"career_video": true
,
"contents": [
{
"href": "https://api-v2.onetcenter.org/veterans/careers/15-1299.04/in_the_military",
"title": "In the military"
},
{
"href": "https://api-v2.onetcenter.org/veterans/careers/15-1299.04/personality",
"title": "Personality"
},
{
"href": "https://api-v2.onetcenter.org/veterans/careers/15-1299.04/technology",
"title": "Technology"
},
{
"href": "https://api-v2.onetcenter.org/veterans/careers/15-1299.04/education",
"title": "Education"
},
{
"href": "https://api-v2.onetcenter.org/veterans/careers/15-1299.04/job_outlook",
"title": "Job Outlook"
},
{
"href": "https://api-v2.onetcenter.org/veterans/careers/15-1299.04/check_out_my_state",
"title": "Check Out My State"
},
{
"href": "https://api-v2.onetcenter.org/veterans/careers/15-1299.04/explore_more",
"title": "Explore More"
}
]
}