Browse Definitions :
Definition

growth hacker

Contributor(s): Ivy Wigmore

A growth hacker is a marketing professional with high-level IT skills whose main focus is increasing an organization's reach, brand recognition or revenues. 

Depending on the particular company, growth hacking skills may include software development, business analytics (BA) and web design, among other possibilities. Growth hackers are often sought by startups.

Sean Ellis originally coined the term "growth hacker" in a blog post in 2010. According to Ellis, a growth hacker is "a person whose true north is growth. Everything they do is scrutinized by its potential impact on scalable growth. Is positioning important? Only if a case can be made that it is important for driving sustainable growth…" 

Growth hackers are among a growing number of professions whose requirements have traditionally been thought of as part of separate career paths. Other examples of IT jobs with converged skill sets include quant (quantitative analyst), chief marketing technologist (CMT), DevOp and WebOp

This was last updated in July 2014

Continue Reading About growth hacker

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance as a service (CaaS)

    Compliance as a Service (CaaS) is a cloud service service level agreement (SLA) that specified how a managed service provider (...

  • data protection impact assessment (DPIA)

    A data protection impact assessment (DPIA) is a process designed to help organizations determine how data processing systems, ...

SearchSecurity

  • identity provider

    An identity provider is a system component that is able to provide an end user or internet-connected device with a single set of ...

  • firewall

    A firewall is software or firmware that enforces a set of rules about what data packets will be allowed to enter or leave a ...

  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning. The ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close