Penetration Tester

Writing a great penetration tester resume is important because it is one of the first things a potential employer will see when they are considering you for a position. It is your opportunity to make a good first impression and sell yourself as the best candidate for the job.

Create your resume
Select from 7 professional resume templates

If you're looking for inspiration when it comes to drafting your own penetration tester resume, look no further than the samples below. These resumes will help you highlight your experience and qualifications in the most effective way possible, giving you the best chance of landing the penetration tester job you're after.

Resume samples

Marcus Sornberger | (913) 661-1461 | Billings, MT


I am a Penetration Tester with over 4 years of experience. I have worked in both the public and private sectors, providing my expertise to help organizations secure their systems and data. My skills include network penetration testing, web application testing, database security assessment, social engineering, and more. I am also experienced in report writing and presenting findings to clients. As a Penetration Tester, I am constantly learning new techniques and strategies to stay ahead of the curve in this ever-changing field.


Lead Penetration Tester at Sekuritee, MTApr 2022 - Present

  • Led a team of 5 penetration testers in conducting black box testing on an e-commerce website. The tests uncovered 20 security vulnerabilities, which were subsequently fixed by the development team.
  • Conducted white box testing on a banking application and discovered 15 SQL injection flaws.
  • Performed social engineering attacks against 10 employees of a company and was successful in tricking 3 people into giving up their passwords.
  • Carried out physical security assessment of 4 office buildings and identified weaknesses in the access control systems at all locations.
  • Wrote custom scripts to automate various tasks during penetration testing engagements, such as brute forcing login pages and crawling websites for sensitive information leakage.

Penetration Tester II at Secure360, MTSep 2018 - Mar 2022

  • Successfully identified and exploited over 50 security vulnerabilities in web-based applications, network systems, and wireless networks for a major financial institution.
  • Successfully completed 15 external penetration tests and 10 internal penetration tests for various clients in the healthcare, retail, manufacturing, and banking industries.
  • Conducted social engineering attacks against employees of target organizations to obtain sensitive information such as passwords and credit card numbers.
  • Created customized tools and scripts to automate testing processes and improve efficiency.
  • Authored several whitepapers on common security issues faced by businesses today.


Bachelor of Science in Computer Science at Montana State University, Bozeman, MTAug 2013 - May 2018

I have learned how to design and implement software solutions to problems, how to use various programming languages to create working software, and how to use different software development methodologies to create software efficiently and effectively.


  • Kali Linux
  • Metasploit Framework
  • Nmap
  • Burp Suite
  • SQL Injection
  • Password Cracking

Tiffney Bockey | (153) 606-6100 | Madison, WI


I am a Penetration Tester with over 4 years of experience. I have worked for both small and large companies, testing their systems for vulnerabilities. I have a strong understanding of various hacking techniques and how to exploit weaknesses in systems. I also have good communication skills, which are essential for coordinating penetration tests. In addition to my technical skills, I am also able to provide written reports detailing my findings.


Lead Penetration Tester at ISEC Partners, WIApr 2022 - Present

  • Successfully completed over 50 penetration tests, with a 95% success rate.
  • Authored and presented multiple papers on new attack methods and tools used in successful engagements.
  • Successfully identified 0-day vulnerabilities in 5 major software products.
  • Customized existing open source tools to create efficient workflows for identifying novel attack vectors.
  • Worked with developers to remediate high severity findings prior to release, ensuring secure development processes.
  • Trained other testers on effective penetration testing methodologies.

Penetration Tester II at Security Evaluation Specialists, WIAug 2018 - Mar 2022

  • Successfully completed over 100 penetration tests, across a variety of industries and company sizes.
  • Identified and exploited vulnerabilities in systems ranging from small-scale local networks to large enterprise environments.
  • Successfully compromised both Windows and Linux systems, as well as web applications and mobile devices.
  • TODO: Your answer goes here.


Bachelor of Science in Computer Science at University of Wisconsin-MadisonAug 2013 - May 2018

I have learned how to code in various programming languages, how to use different software development tools, how to develop algorithms, and how to effectively communicate with others in a team setting.


  • Kali Linux
  • Metasploit
  • Burp Suite
  • SQL Injection
  • XSS (Cross Site Scripting)
  • Nmap