The web proxies, C2 frameworks, AD-attack kits, cloud-pentest tools, recon platforms, reversing suites, and
offensive certifications a Penetration Tester resume should carry in 2026, ranked the way an offensive-security
hiring panel weighs them and worded so an ATS parser catches every token. Drawn from 12 years of recruiting
experience, including many years at Google, reading pentest and red-team resumes.
Authored by
Emmanuel Gendre
Tech Resume Writer
Last updated: May 19th, 2026 · 2,985 words · ~12 min read
What this page covers
The Penetration Tester resume skills and keywords that matter in 2026
Pentest panels screen for the attack surface you actually broke
You are tightening a Penetration Tester resume. Offensive-security hiring leads and ATS parsers are
scanning for the web proxy you ran the last 40 web-app engagements through, the C2 framework you stood
up infrastructure on, the AD-attack kit you used to walk a low-priv user to Domain Admin, the cloud-pentest
tooling you swung against AWS and Azure scopes, the recon stack you mapped attack surfaces with, the
fuzzers and reversing suites you reached for on the harder binaries, the scripting languages you author
custom tooling in, and the offensive certifications that gate the senior chairs. ATS keywords drive the
first cut. The real lift on a 2026 pentest file is which tools are non-negotiable at the tier you are
aiming for, which engagement metrics a pentest manager scans for first, which certifications still move
the needle, and how to word any of it so an offensive-security panel reading the page in ninety seconds
believes you actually broke the target rather than watched someone else do it on Twitch.
An offensive-arsenal cheat sheet, not a generic cyber list
Under this band sits the prioritized inventory: a Penetration Tester resume's hard skills, soft skills,
and ATS keywords for 2026, grouped by attack surface and laid against the offensive-security ladder. Every
call is shaped by 12 years of recruiting experience, including many years at Google. Want the editable
shell that already carries the web, network and AD, cloud, C2, and post-exploitation rows?
Open the Penetration Tester resume template.
Penetration Tester resume keywords & skills at a glance
The fast answer, two ways
Below this band is the long-form read on Penetration Tester resume skills and ATS keywords. If only a
couple of minutes is on the clock, grab one of the two helpers in this section: the ranked roster of web
proxies, C2 frameworks, AD-attack kits, cloud-pentest utilities, and offensive certs that recur across most
US pentest reqs (the safe default), or the JD scanner that lets you measure the file against the exact
posting open in your second browser tab.
The 18 web proxies, C2 frameworks, AD-attack kits, cloud-pentest utilities,
recon platforms, and offensive certifications that surface most often across US Penetration Tester
postings in 2026. With no specific posting in hand, treat this as the baseline floor. Color reads the
priority:
blue sits on the mandatory tier, teal covers the supporting evidence
a pentest hiring panel expects to spot, and grey marks the senior-tier differentiator
that tips a borderline shortlist.
1Burp Suite Pro88%
2OSCP82%
3OWASP Top 1078%
4Metasploit Framework74%
5Nmap (NSE)72%
6BloodHound68%
7Cobalt Strike60%
8Impacket / NetExec58%
9Kerberoasting / AD CS abuse54%
10Python (offensive tooling)52%
11Cloud pentest (Pacu / ScoutSuite)48%
12sqlmap / ffuf44%
13Mimikatz / Rubeus42%
14PowerShell (offensive)38%
15OSWE / OSEP / CRTO32%
16Sliver / Mythic / Havoc26%
17Frida / MobSF (mobile)22%
18Ghidra / IDA Pro20%
Extract Penetration Tester resume keywords from a JD
Drop a Penetration Tester or red-team job description into the box and the
scanner surfaces the web proxies, C2 frameworks, AD-attack tools, cloud-pentest utilities, and offensive
certifications worth keeping on the page, sorted by tier. The match happens on your machine: nothing
uploads, nothing leaves the tab.
Penetration Tester: Hard Skills
8 categories to carry in a Penetration Tester Technical Skills block
Starred chips mark the offensive tools a pentest manager actively reads the page for. Each card finishes
with a paste-ready line you can drop straight under the matching row label.
Web Application Pentesting
The proxy and toolchain you spend the bulk of any pentest week inside. Burp Suite
Pro carries the field in 2026 with deep practice on Repeater, Intruder, Collaborator, and the extension
ecosystem (AuthMatrix, Logger++, Autorize, ActiveScan++); OWASP ZAP and Caido cover the open-source and
modern-proxy slots. Round it with sqlmap for injection chains, ffuf, gobuster, and dirsearch for content
discovery, OWASP Top 10 (2021 plus the 2025 revisions) plus the OWASP Top 10 for LLMs as the methodology
spine, and source-code-assisted review on the harder business-logic, race-condition, and deserialisation
findings.
Burp Suite Pro (Repeater, Intruder, Collaborator)OWASP Top 10 (2021 + 2025)OWASP ZAP / CaidoOWASP Top 10 for LLMssqlmapffuf / gobuster / dirsearchAuthMatrix, Logger++ extensionsSource-code-assisted reviewBusiness-logic, race conditions, deserialisation
Burp Suite Pro (deep: Repeater, Intruder, Collaborator, AuthMatrix, Logger++,
Autorize), OWASP ZAP, Caido, sqlmap, ffuf, gobuster, dirsearch, OWASP Top 10 (2021 and 2025), OWASP Top 10
for LLMs, source-code-assisted review, business-logic flaws, race conditions, deserialisation attacks
Network & Internal Pentesting
The scope every pentester runs on the internal side of a corporate VPN. Nmap with
deep NSE scripting plus Masscan for speed cover the discovery layer; Nessus and OpenVAS run the
vulnerability-scan baseline that you then validate by hand. Metasploit Framework still anchors a slice
of the exploitation work, but manual exploitation off public exploit code is the senior signal hiring
panels read the page for. Pair it with post-exploitation enumeration, pivoting through Chisel,
Ligolo-ng, or sshuttle, and LLMNR/NBT-NS poisoning with Responder, Inveigh, and mitm6 on the network
side.
Nmap (deep NSE), Masscan, Nessus, OpenVAS, Metasploit Framework, manual exploitation
against public exploit code, post-exploitation enumeration, pivoting through Chisel, Ligolo-ng, and
sshuttle, LLMNR and NBT-NS poisoning with Responder, Inveigh, and mitm6
Active Directory Attacks
The bread-and-butter of any internal engagement that lands inside a Windows estate.
BloodHound (with custom Cypher queries against the Neo4j graph) maps the path from a foothold user to
Domain Admin. Rubeus pulls and forges Kerberos tickets; mimikatz extracts credentials and Golden or
Silver Tickets; Certify exercises the full AD CS attack family (ESC1 through ESC11). The Impacket suite
(secretsdump, GetUserSPNs, GetNPUsers, PsExec.py, smbclient) plus CrackMapExec / NetExec are the daily
workhorses. Round it with Kerberoasting, AS-REP roasting, constrained, unconstrained, and
resource-based delegation abuse, PetitPotam, and NTLM relay.
BloodHound with custom Cypher queries, Rubeus, mimikatz, Certify (AD CS ESC1
through ESC11), Impacket (secretsdump, GetUserSPNs, GetNPUsers, PsExec.py, smbclient), CrackMapExec /
NetExec, Kerberoasting, AS-REP roasting, constrained, unconstrained, and resource-based delegation,
PetitPotam, NTLM relay
Red Team & C2
The senior-tier surface where pentest crosses into adversary simulation. Cobalt
Strike with malleable C2 profile authorship, BOFs (Beacon Object Files), and aggressor scripts is the
default at most US adversary-simulation shops; Sliver, Mythic, and Havoc cover the open-source side and
increasingly turn up on OPSEC-sensitive engagements. Custom .NET, C, Nim, and Rust implants ship on the
harder targets. AV/EDR evasion against CrowdStrike Falcon, SentinelOne, and Microsoft Defender (direct
syscall invocation, AMSI plus ETW patching, PPL bypass, process-injection variants) is the practice
senior chairs are reading the page for.
Cobalt Strike (malleable C2 profiles, BOFs, aggressor scripts), Sliver, Mythic,
Havoc, custom .NET, C, Nim, and Rust implants, AV and EDR evasion against CrowdStrike Falcon, SentinelOne,
and Microsoft Defender, direct syscall invocation, AMSI plus ETW plus PPL bypass, process-injection
variants
Cloud Pentesting
The fastest-growing scope on the engagement queue. Pacu carries the AWS side, with
CloudSplaining for IAM policy analysis and ScoutSuite for multi-cloud configuration review. MicroBurst
and AzureHound cover Azure attack paths; GCPBucketBrute and S3 enumeration tools pull misconfigured
object storage. The senior-tier work lives in IAM privilege-escalation paths (GodMode roles, role
chaining, AssumeRole abuse), serverless attack surfaces (Lambda environment variable theft,
inadequately scoped triggers), and container plus Kubernetes pentesting with kube-hunter, kubeaudit,
and kubeletmein.
Pacu (AWS), CloudSplaining, ScoutSuite, MicroBurst (Azure), AzureHound,
GCPBucketBrute, S3 enumeration, IAM privilege-escalation paths (GodMode roles, role chaining),
serverless attack surfaces, container and Kubernetes pentesting with kube-hunter, kubeaudit, and
kubeletmein
Mobile & Hardware Pentesting
The specialized scope that lifts a senior pentest file above the web-plus-AD
baseline. On mobile, Burp Suite paired with Frida for iOS and Android dynamic instrumentation, Objection
for runtime hooking, MobSF for static and dynamic analysis, Drozer for Android-side IPC fuzzing, and
Cycript for older iOS work cover the practice. Testing usually runs against a jailbroken iOS device or
a rooted Android phone. Hardware-side tooling (Bus Pirate, ChipWhisperer, Proxmark3, Flipper Zero)
shows up on the specialized hardware-pentest reqs and the IoT engagements.
Burp Suite with Frida for iOS and Android dynamic instrumentation, Objection,
MobSF (static and dynamic), Drozer (Android IPC), Cycript, jailbroken iOS testing, rooted Android,
hardware tooling (Bus Pirate, ChipWhisperer, Proxmark3, Flipper Zero) for IoT and RFID work
OSINT, Recon & Reverse Engineering
The pre-engagement layer plus the niche reversing work that turns up on harder
targets. Recon-ng, Maltego, theHarvester, Shodan, Censys, Fofa, and ZoomEye carry the OSINT side; GitHub
recon with truffleHog and gitleaks pulls leaked credentials and tokens; Google Dorking still surfaces
sensitive files no scanner finds. On the reversing side, Ghidra (free) and IDA Pro / IDA Free cover
static binary analysis; x64dbg covers dynamic Windows debugging. Wireshark handles the protocol-analysis
corner of the work whenever a custom protocol turns up on the engagement.
Recon-ng, Maltego, theHarvester, Shodan, Censys, Fofa, ZoomEye, GitHub recon
with truffleHog and gitleaks, Google Dorking, Ghidra, IDA Pro and IDA Free, x64dbg, Wireshark for
protocol analysis, Amass and Subfinder for subdomain enumeration
Reporting, Scripting & Certifications
The deliverable that pays the bills and the language layer behind the custom
tooling. Pentest reports follow a standard shape: executive summary, technical findings with reproduction
steps and CVSS scoring, prioritized remediation, and a retest pass. Reports get authored in Markdown
and pushed through Pwndoc or SysReptor. Python carries the offensive-tooling scripting load; PowerShell
handles the AD-side offensive work; Bash glues the engagement together; Go and C / C++ ship the custom
implants and low-level tooling. Certifications gate the chairs: OSCP at entry, OSWE for web specialists,
OSEP and OSED at senior, OSCE3 at principal, plus CRTO, CRTL, GPEN, GWAPT, and GXPN across the wider
ladder.
Pentest reports (executive summary, technical findings with reproduction steps,
CVSS-scored severity, remediation roadmaps), report authoring in Markdown, Pwndoc, and SysReptor, Python
for offensive tooling, PowerShell for offensive AD scripting, Bash, Go and C / C++ for custom implants
and low-level work; OSCP, OSWE, OSEP, OSED, OSCE3, CRTO, CRTL, GPEN, GWAPT, GXPN
Penetration Tester: Soft Skills
How to incorporate soft skills in your Penetration Tester resume
Tossing “curious learner” or “effective communicator” onto a chip row buys you
nothing on an offensive-security file. These traits earn their keep inside the bullets that name the
chained exploit you walked, the client debrief you ran without losing the room, the junior tester you
paired through their first internal engagement, the report finding that survived a vendor pushback call,
or the rules-of-engagement boundary you held when the scope tried to creep. Five soft signals follow,
each pinned to a bullet template you can rework against your own engagement record.
Client communication under pushback
Pentest reports land on a client developer's desk who often disagrees with the
severity, the impact, or the existence of the finding. The hiring panel reads the page for the tester
who can defend a SSRF-to-RCE chain on a vendor call, walk through reproduction steps in plain language,
and hold the rating without picking a fight.
How to show it
Defended a critical SSRF-to-RCE chain on a
vendor debrief call with the client's product engineering lead and AppSec
manager, walked through Burp request and response captures plus a screen-recorded
reproduction, and held the CVSS 9.8 rating through three rounds of pushback
until the fix landed in the next sprint.
Clean, defensible report writing
Half the pentest job is the report the client reads after you log out of the
VPN. A pentest manager scoring a candidate hard on deliverable hygiene reads for the tester who ships
executive-readable summaries, technical findings with reproduction steps a junior dev can replay, and
CVSS scoring the client cannot pick apart in the readout.
How to show it
Authored the internal pentest report template rolled out
across the 22-person consultancy in SysReptor, including executive summary,
CVSS v3.1 scoring guidance, reproduction-step rubric, and remediation roadmap, cutting
report turnaround from 9 days to 4 days across the last quarter.
Scope & rules-of-engagement discipline
Senior pentest hiring panels read for the tester who treats the rules of
engagement like a contract, not a suggestion. The signal worth carrying is the moment you spotted a
tempting target outside the signed scope, paused, and called the client's project lead before swinging
a single payload.
How to show it
Held scope discipline across 40+ engagements
by escalating 3 out-of-scope subsidiary domains to the
client project lead and the consultancy partner before any active testing, expanded
the rules of engagement on two of three after written approval, and shipped a clean
audit trail to the client legal team at engagement close.
Coaching juniors through their first chain
Starting around the L2 chair, the pentest ladder rewards the tester who lifts
the bench below them. A pentest lead skimming the file for senior signal reads less for personal
engagement count and more for the count of L1 testers who walked their first internal compromise
after pairing with you.
How to show it
Paired 3 junior pentesters through their
first internal AD engagement, walking each through BloodHound graph reading,
Kerberoasting, and a clean Impacket secretsdump capture, and authored the
L1 engagement-ramp guide now handed to every new tester on their first week on the
bench.
Judgment on what to actually exploit
The trait a senior pentest manager flags is the tester who reads the engagement
objective, weighs the blast radius, and knows when popping a production database in front of the
client is the wrong move (even when the bug is real). On a red-team engagement, OPSEC and detection
avoidance matter more than raw exploit count.
How to show it
Paused a confirmed RCE on a production payments service after
reaching the foothold on a banking client engagement, escalated to the
client's IR lead inside 10 minutes, ran the exploit safely in a staging
clone the same day, and shipped a CVSS 9.6 finding the customer fixed before
the engagement closed.
ATS keywords
How ATS read your Penetration Tester resume keywords
The mechanics of how a parser stack scores an offensive-security file in 2026, the workflow for pulling
the right tool, framework, and certification names off a target posting, and the 25 keywords any
Penetration Tester resume should be able to back with a real engagement bullet.
01
Labeled Skills rows outrank buried prose every time
The parsers running across offensive-security pipelines (Greenhouse,
Lever, Ashby, Workday, iCIMS) split the file into structured chunks and grade each one against the
pentest hiring manager's keyword list the moment the req opens. Nothing kicks you out automatically;
the file just drifts down the ranked stack. A missing Burp Suite, Cobalt Strike, BloodHound, or OSCP
token is the difference between landing on page one of the screen pile and getting buried six pages
under it.
02
Position on the page changes the score
Several parsers weight a pentest tool name harder when the chip sits inside
a labeled Skills block on the upper half of page one rather than tucked into a job-paragraph sentence
two pages later. A Burp Suite or BloodHound chip near the top scores higher than the same word lost
inside a long engagement bullet on page two. Place the offensive products on the labeled Skills row
first, then echo them inside engagement bullets after the row already carries them.
03
Echo at a natural cadence, never keyword-stuff
A Burp Suite entry on the Skills row plus two engagement bullets that
reference Repeater, Intruder, or a Burp-driven SSRF chain is the cadence the parser reads as real.
Pasting Burp Suite seventeen times in a 1pt white strip flags the file for human review and routes
it to the rejection folder. An offensive tool or cert showing up twice in Skills and twice across the
engagement bullets is the tempo a parser treats as authentic.
Mining your target JD
A 3-step extraction loop for Penetration Tester postings
STEP 01
Pull five reqs at your tier and shop type
Round up five Penetration Tester or Red Team postings at the tier and shop
type you are aiming for next (consultancy, MSSP, in-house security team, banking, federal, big-tech
red team). Drop them into a single scratch document so the wording from each posting sits next to the
others instead of dispersing across five tabs you keep losing focus on.
STEP 02
Circle the recurring tools, methodologies, and certs
Mark every web proxy, C2 framework, AD-attack utility, cloud-pentest tool,
recon platform, reversing suite, scripting language, methodology (PTES, OWASP WSTG, NIST 800-115,
OSSTMM), and certification body that turns up in three or more of the five reqs. Those names belong
on the Skills rows automatically. Terms that surface in only one or two postings get a margin note:
include only if you can hold a technical screen on the tool.
STEP 03
Wire each circled tool to a real engagement bullet
Every recurring product needs a chair on the Skills row AND a backing bullet
that pins it to an engagement count, a chained-issue outcome, a privilege-escalation path, a disclosed
CVE, or an AV/EDR evasion run. When a chair carries no bullet behind it, either build the depth
honestly through a HackTheBox track, a Pro Lab, or a small home-lab project before applying, or treat
the req as a wrong-fit chair and move on to the next one in the queue.
The 25 keywords that matter
Penetration Tester ATS keywords ranked by importance, 2026
The frequency bars below were tallied off a sample of roughly 260 US Penetration Tester and Red Team
reqs I read through on LinkedIn, Indeed, and consultancy career pages over Q1 2026. The tier column
shows how heavily an initial-pass screen treats each term as a yes-or-no signal.
Keyword
Tier
Typical JD context
JD frequency
Penetration Testing
Must
“Lead web, network, and AD penetration testing engagements”
Burp Suite
Must
“Deep Burp Suite Pro on web and API assessments”
OSCP
Must
“OSCP required or strongly preferred”
OWASP Top 10
Must
“Map web findings to OWASP Top 10 categories”
Metasploit
Must
“Exploitation through Metasploit Framework”
Nmap
Must
“Service discovery and NSE scripting”
BloodHound
Must
“AD attack-path mapping with BloodHound”
Active Directory
Strong
“Internal AD pentest, Kerberoasting, ACL abuse”
Cobalt Strike
Strong
Red team C2 infrastructure
Impacket / NetExec
Strong
Windows post-ex toolchain
Kerberoasting
Strong
SPN ticket extraction and offline cracking
Python (offensive)
Strong
Custom tooling and exploit scripts
Cloud Pentest
Strong
AWS / Azure / GCP attack surface assessments
sqlmap / ffuf
Strong
Web injection and content discovery
Red Team
Strong
Adversary-simulation engagements
MITRE ATT&CK
Strong
TTP-mapped engagement reports
PowerShell (offensive)
Strong
AD-side post-ex and lateral movement
OSWE / OSEP / CRTO
Bonus
Senior-tier credential filter
AV / EDR Evasion
Bonus
Custom loaders, AMSI / ETW bypass
Sliver / Mythic / Havoc
Bonus
Open-source C2 frameworks
Pacu / ScoutSuite
Bonus
Cloud-pentest tooling
Frida / MobSF
Bonus
Mobile dynamic instrumentation
Ghidra / IDA
Bonus
Static reverse engineering
CVE Disclosure
Bonus
Vendor coordinated disclosure record
PTES / NIST 800-115
Bonus
Methodology framework on engagements
I review your technical skills for free
Send the PDF over. I will flag which web proxy, C2 framework, AD-attack tool, and offensive cert
names are missing, which engagement bullets aren't carrying an engagement count or a chained-exploit
outcome, and where your Skills block is leaking parser weight.
Free, within 12 hours, by a former Google recruiter.
What L1, L2, L3, and Principal Pentesters are expected to list
The tooling reads similar from L1 through L4. The real lift between tiers is the scale around it:
engagements led per year, severity counts on the findings shipped, exploit chains demonstrated, CVEs
disclosed against vendor products, junior testers mentored, and the kind of red-team work you can carry
end to end without a senior on the bridge.
L1 · JUNIOR
Junior Penetration Tester
0 to 2 years. Shadows on 8 to 18 engagements per year under a senior lead, runs
web-app and internal vulnerability scans through Burp Suite and Nessus with senior review on the
findings, picks up BloodHound graph reading and basic AD attacks, holds OSCP or is studying for the
exam, and ships first-draft technical findings the senior tester edits.
8 to 18 engagements / yearBurp Suite (consumer)Nessus / NmapBloodHound basicsOSCP (or studying)First-draft reportsPython scriptingHackTheBox / TryHackMe
L2 · MID
Mid Penetration Tester
2 to 5 years. Lead tester on 30 to 60 web-app, API, and internal AD engagements
per year, drafts the technical-findings section independently with CVSS scoring, chains 4 to 8 high or
critical issues per engagement (SSRF to RCE, IDOR to admin takeover, Kerberoasting to lateral movement),
and supports occasional red-team work under a senior operator.
30 to 60 engagements / year4 to 8 high/crit per engagementBurp Suite Pro (deep)Impacket / NetExecCobalt Strike (consumer)Independent reportsCVSS v3.1 scoringOSWE or OSEP (in progress)
L3 · SENIOR
Senior Penetration Tester
5 to 8 years. Lead consultant on the harder engagements (full-domain compromise
via AD CS abuse, cloud-plus-on-prem hybrid attacks, web chains walked end-to-end), holds OSEP, OSWE, or
CRTO, mentors 2 to 4 juniors on the bench, leads scoping calls with client security leads, contributes
2 to 5 CVE disclosures across the career arc, and writes the report templates the rest of the team
consumes.
Full-domain compromise leadCloud + on-prem hybrid attacksOSEP / OSWE / CRTOMentor 2 to 4 juniorsScoping calls with clients2 to 5 CVEs disclosedReport-template authorshipAV/EDR evasion (mid)
L4 · PRINCIPAL
Principal / Red Team Lead
8+ years. Owns end-to-end adversary-simulation engagements (initial access via
phishing or supply-chain pivot through lateral movement, persistence, and exfil), authors custom
implants in C, Nim, or Rust, ships novel AV/EDR evasion techniques, holds OSCE3 or equivalent, manages
a 5 to 9 person red team and pentest bench, and presents engagement findings directly to the client
CISO and audit committee.
End-to-end adversary simulationCustom C / Nim / Rust implantsNovel AV/EDR evasionOSCE3 (or equivalent)5 to 9 person teamCISO / audit-committee briefingsMulti-year program ownershipHiring & bar-setting
Placement & format
How to list these skills on your resume
One Technical Skills block, sliced into 7 to 9 row labels, sits right under the Profile Summary on page
one. Each offensive product on those rows then turns up again inside an engagement bullet that proves you
actually swung it on a client target.
01
Placement
Park the Technical Skills block under the Profile Summary and before
Work Experience. A pentest hiring manager reads top-down on the first pass, and a slice of the
parsers favoured by offensive-security pipelines (Greenhouse, Lever) weight a Burp Suite or
BloodHound token harder when it sits inside the upper third of page one rather than further down
the file.
02
Format
Slice the block into 7 to 9 row labels rather than a single comma blob.
Pull the labels off the actual attack surfaces you cover (Web & API, Network & AD, Cloud,
Mobile, C2 & Post-Ex, Recon & OSINT, Reverse Engineering, Scripting, Methodology &
Certifications). Each row holds one line and runs 4 to 8 names long.
03
How many to include
Keep the page to 30 to 46 specific offensive tools, methodologies, and
certifications. Drop below 22 and the page reads like a CTF hobbyist with no client work behind it;
push past 50 and the rows start reading like a Hack The Box flag list. Carry only tools you can
defend on a technical screen.
04
Weaving into bullets
Each engagement bullet should pair a named offensive product with the
engagement count, the chained-issue outcome, the privilege-escalation path, the disclosed CVE ID,
or the AV/EDR evasion run that came out of it. The shape that survives both a pentest manager's
read and a parser pass looks like this:
Weak
Performed penetration tests against web applications and corporate
networks, identified vulnerabilities, and wrote findings reports.
Strong
Led 40 web-app and 8 internal AD pentests across 22 client
engagements over the year on Burp Suite Pro and BloodHound, chained
5 high-severity issues into full-domain compromise on the largest target via
Kerberoasting and ADCS ESC1 abuse, and disclosed 3 CVEs against a vendor
product chain covering deserialisation and auth-bypass classes.
The two lines cover the same role, but the strong version carries
six offensive signals (engagement count, scope split, tool names, technique chain, full-domain
outcome, CVE disclosure) and reads as engagement ownership rather than a vague vuln-finding verb.
Quality checks
Mirror the JD's spelling character-for-character on every chip. If the posting prints “Burp Suite
Pro” with the Pro, carry the Pro; if it spells out “Cobalt Strike” in full,
skip the “CS” shorthand; write “CrackMapExec / NetExec” at least once on
the row so the parser catches both legacy and current tool names.
Skip the proficiency labels (“Expert Burp Suite”, “Advanced Cobalt Strike”).
A pentest manager has no way to verify them on a screen, and the row real estate pays off harder
when spent on a fourth or fifth tool name.
Order rows by attack surface (Web & API, Network & AD, Cloud, Mobile, C2 & Post-Ex,
Recon, Reversing, Scripting, Certifications), never alphabetically. A pentest hiring panel reads
the row label first and only digs into the tools when the label matches the scope they need next.
Every product on the Skills row needs to resurface inside a bullet that pins it to an engagement
count, a chained-exploit outcome, a privilege-escalation path, a CVE ID, or an AV/EDR evasion run.
The chip names the tool; the engagement scope, the vendor target, and the chained outcome are
what prove you actually swung it on a real target.
Skills in action
Five real bullets, with the Penetration Tester skills wired in
Each bullet below pulls triple duty: it names the offensive tool, it pins the engagement scope or chain
outcome, and it carries a measurable result. The chips underneath flag what a pentest manager (and the
parser) catches on a quick scan.
01
Led red team and adversary-emulation engagements for
Fortune 500 and high-growth SaaS clients across 3 to 12 week runs
covering internal AD, external infrastructure, and cloud and web surfaces, delivering
40+ full-scope engagements across the year.
Red teamAdversary emulationMulti-week scopesInternal AD
02
Drove web application and API penetration testing across
60+ assessments on Burp Suite Pro, walked the full OWASP Top 10
alongside SSRF, IDOR, and business-logic chains with manual review backing the
automated Burp scans, and shipped 180+ confirmed high or critical findings.
Burp Suite ProOWASP Top 10SSRF / IDORBusiness logic
03
Owned internal network and Active Directory pentesting
using BloodHound, Mimikatz, and Impacket to execute Kerberoasting, AS-REP
roasting, NTLM relay, and coerced authentication, achieving full domain compromise on
22 of 25 internal engagements across the past year.
BloodHoundImpacketKerberoastingNTLM relay
04
Stood up command-and-control infrastructure on Cobalt Strike
with malleable C2 profiles plus Sliver for OPSEC-sensitive operations, shipped
custom Python and C# loaders with AMSI and ETW bypass, and evaded
CrowdStrike Falcon and SentinelOne EDR detection on 14 red-team engagements.
Cobalt StrikeSliverAMSI / ETW bypassEDR evasion
05
Delivered cloud, mobile, and specialized assessments
across AWS, Azure, and GCP estates, exercising IAM privilege-escalation paths,
S3 and blob misconfiguration hunting, and metadata-service abuse on Pacu and
ScoutSuite, closing the year with 14 cloud and 6 mobile assessments delivered
plus 3 disclosed CVEs against a vendor product chain.
PacuScoutSuiteIAM priv-escCVE disclosure
Pitfalls
Six common mistakes on Penetration Tester resumes
The same half-dozen patterns turn up across pentest file reviews week after week. Each one closes back
inside a single editing pass once you can spot the shape on your own page.
Reading like a Hack The Box scoreboard, not a client engagement record
Bullets that lead with CTF rankings, machine counts on HTB and TryHackMe, and
badge collections (with a single “client engagement” line bolted on) miss the
consultancy-grade signal a pentest hiring manager is reading the page for. The file ends up in the
hobbyist pile even when the technical depth is real.
Fix: Lead with the engagement count, the client vertical, the
scope split (web, AD, cloud, mobile), the chained-exploit outcomes, the disclosed CVEs, and the report
cadence. Park the CTF and HTB credentials in a small “Continued learning” row near
Education, not in the work-history bullets.
No engagement count, no severity numbers, no chain outcomes
“Performed penetration tests” or “identified
vulnerabilities” with no engagement count, no high-or-critical tally, and no chained-exploit
story reads as unverifiable to a pentest panel. Those lines are the easiest to invent when no concrete
number anchors them to a real client.
Fix: Pin the engagement count (40 web-app and 8 AD pentests
across 22 client engagements), the scope (web, internal, cloud, red team), the chained outcome (5
high-severity issues walked into full-domain compromise on the largest target), the CVE count
disclosed (3 CVEs against a vendor product chain in 2025), and the report turnaround.
A 25-tool skills row with no engagement bullet behind any of it
Lining up Burp Suite, ZAP, Caido, Metasploit, Cobalt Strike, Sliver, Mythic,
Havoc, BloodHound, Rubeus, mimikatz, Impacket, NetExec, sqlmap, ffuf, Frida, MobSF, Pacu, ScoutSuite,
Ghidra, IDA, x64dbg, Wireshark, and Nessus on a single comma row reads as a tool-vendor flashcard pile.
A pentest manager skims it for thirty seconds and moves on.
Fix: Trim each row to the tools that anchor at least one
engagement bullet on the page. Two web proxies named with real depth (Burp Suite Pro with extension
list plus Caido) beat seven shallow proxy chips, especially when one of them carries a chained-exploit
outcome and a high-or-critical finding count.
Frameworks named with no methodology pattern
Listing OWASP WSTG, PTES, NIST 800-115, OSSTMM, and MITRE ATT&CK on a row
with no mention of a real hunt phase, an engagement step you ran, or a TTP you mapped reads as
box-ticking. Pentest panels screen for the practice inside the framework, not the acronym sitting on
its own.
Fix: Pair each named framework with the operational pattern
(OWASP WSTG categories you mapped against on web engagements, MITRE ATT&CK TTPs your red-team
simulations exercised, PTES phases your engagement reports follow) and the engagement count behind
the pattern.
AD-attack depth treated as a single chip
From L2 upward, a pentest file with a single “Active Directory”
chip and no BloodHound graph, no Kerberoasting, no AD CS abuse, and no delegation-attack mention reads
as half-trained for 2026 internal work. Senior chairs want to see the AD attack family on the page.
Fix: Carry a Network & AD row that names BloodHound (with
Cypher queries), Impacket, NetExec, Rubeus, mimikatz, and Certify (AD CS ESC1-ESC11), then back it
with one bullet that pins the domain-compromise success rate (22 of 25 internal engagements ended in
full domain compromise) and the technique chain that landed it.
Soft-skills row left at the corporate-buzzword level
“Strong communicator,” “attention to detail,” and
“curious learner” in a Soft Skills row do nothing on a pentest file in 2026. A hiring panel
has already read the same three phrases on 70 percent of the resumes that morning before yours arrived.
Fix: Replace the buzzwords with the engagement evidence that
proves the trait: the vendor debrief call where you defended a CVSS 9.8 chain through three rounds of
pushback, the report template you authored that cut turnaround from 9 to 4 days, the scope-discipline
escalation that kept three out-of-bounds subsidiary domains untouched, the junior tester you paired
through their first AD compromise.
Worried your engagement record reads thin on the page?
Send the resume over. I will flag which offensive tools and certs are missing, which engagement
bullets are filler, and which lines aren't carrying an engagement count, a chained-exploit outcome,
or a CVE disclosure.
Free, line-by-line feedback within 12 hours, by a former Google recruiter.
Carry roughly 30 to 46 named offensive tools and methodologies on the page: the web proxy you
spent the last year inside (Burp Suite Pro with its extensions, or Caido), the C2 framework you
ran your last engagement on (Cobalt Strike, Sliver, Mythic, Havoc), the AD-attack tooling that
cracked your last domain (BloodHound, Rubeus, Impacket, NetExec, Certify), the cloud-pentest kit
you reached for on the last AWS or Azure scope (Pacu, ScoutSuite, MicroBurst, AzureHound), the
recon stack (Amass, Subfinder, Shodan, Censys), the scripting languages you write tooling in
(Python, PowerShell, C, Go), and the certs that gate offensive-security shortlists (OSCP at
minimum, plus OSWE or OSEP at senior tier). Sort it all under 7 to 9 row labels. Below 22 the
file reads like a CTF hobbyist; over 50 it reads like a Hack The Box badge wall with no
engagement story holding it up. Every chip needs a war-story you can defend on a technical
screen: the SSRF chain you escalated to RCE, the unconstrained-delegation path you walked from a
low-priv user to Domain Admin, the EDR evasion you wrote when CrowdStrike kept killing your
beacon. The row carries the arsenal; engagements led per year, CVEs disclosed, exploit chains
demonstrated, and clean reports clients still quote are what prove you actually swung the hammer.
Slot it right after the Profile Summary and ahead of Work Experience. Pentest managers at
consultancies and in-house red teams scan a stack of files in single-coffee bursts between client
meetings, and the parsers riding the recruiter side of offensive-security pipelines (Greenhouse,
Lever, Ashby, Workday) pick up a Burp Suite, Cobalt Strike, or BloodHound token with higher
confidence when the chip sits inside a labeled Skills block on the upper half of page one. Bury
it on page two and your web-plus-AD-plus-cloud arsenal disappears into prose, the parser misses
half the tools, and the engagement bullets lose the keyword echo they need to score. Hold the
page to 7 to 9 grouped rows so a pentest lead reads your offensive surface area in one downward
sweep before opening the first engagement bullet.
Drop the req into a scratch doc and ring every named web proxy, C2 framework, AD-attack tool,
cloud-pentest utility, recon platform, fuzzer, reverse-engineering suite, scripting language,
certification, and methodology the posting mentions. Star the names that recur two or three times
across the page. Place the starred list beside your Skills rows and check for missing chips. When
a tool keeps surfacing in the JD but is absent from your file, fold it onto the matching row only
when you can hold a technical screen on it (a Cobalt Strike chip with no malleable-profile story
attached gets caught on the first interview), then make sure at least one engagement bullet pins
the same product to an engagement count, a chained-exploit outcome, a privilege-escalation path,
or a disclosed CVE. Once the rows look right, push the file through an
ATS Checker as the closing pass so the parser
still reads the labels and the structured fields cleanly without an exotic tool name getting
swallowed by the layout.
Pentester is the offensive seat: you sit at a Kali box (or the consultancy equivalent), open Burp
Suite, fire BloodHound, write a Cobalt Strike malleable profile, chain a SSRF into a metadata-service
abuse into a cross-account IAM takeover, and ship a report that names every chain you walked and
every fix the client now owes. The engagement is scoped, the rules of engagement are signed, the
goal is finding weaknesses before a real attacker does. Security Engineer is the builder of
controls on the other side: a Snyk rollout across product squads, a Wiz deployment across 80 AWS
accounts, Okta conditional-access policy authorship, Sigma and KQL detections written for the SIEM,
secrets-vault migrations, WAF tuning. SOC Analyst is the operator inside those controls: Splunk and
Sentinel alert triage by tier, CrowdStrike RTR sessions, phishing-queue closures, NIST 800-61 IR
work, ATT&CK-aligned hunts. If your day is breaking things by contract for a written-up client
deliverable, the file belongs in the Pentester pile. If your day is rolling controls or working
the alert queue, the
Security Engineer or
SOC Analyst guides are the right
destination. Trying to wear all three hats on one resume thins the offensive evidence a pentest
hiring panel reads the page for.
OSCP from Offensive Security is the field's entry filter: most pentest reqs in 2026 list it as
required or strongly preferred at the L1 and L2 chair, and HR routes the resume through it before
a hiring manager ever sees the page. OSWE (Offensive Security Web Expert) carries the web-app
pentest specialization and pairs naturally with a Burp Suite plus source-code-assisted bullet.
OSEP (Offensive Security Experienced Pentester) is the AV/EDR evasion and lateral-movement
credential most senior pentest hiring leads check for at L3, because it maps onto custom-loader
and AMSI-bypass work on the page. OSED (exploit dev) and OSCE3 sit at the principal tier where
binary exploitation and custom implant authorship are on the daily ladder. CRTO (Certified Red
Team Operator) from Zero Point Security has gained ground for adversary-simulation chairs and
pairs cleanly with a Cobalt Strike engagement bullet. GPEN, GWAPT, and GXPN from SANS hold weight
in federal and large-bank pipelines where the rest of the team carries GIAC credentials. List the
credentials on a single Certifications row near Education, name the issuing body (Offensive
Security, Zero Point, SANS, eLearnSecurity), and leave any in-progress lines off the page unless
the sit date is locked.
Yes, on both counts, with caveats. Disclosed CVEs are one of the cleanest signals a pentest
hiring panel reads on the page: a CVE ID, the affected vendor and product version, the bug class
(SSRF, deauth, deserialisation, auth bypass), and the disclosure date carry weight that no skills
chip can replicate. List two to five of the highest-impact CVEs in a dedicated Disclosures row
near Education or inside the Profile Summary; skip the laundry-list of low-severity self-XSS
reports. Bug-bounty findings on HackerOne, Bugcrowd, Intigriti, or Synack carry similar weight
when the program names are real and the payout band is named, but treat the row as a depth
signal rather than a substitute for client engagement work. A senior pentest panel reads the
disclosure pair (CVE plus bounty) as proof that the offensive intuition holds up outside a scoped
client environment; what closes the panel is the engagement record on the work-history side of
the page.
Six number families do the heavy lifting on a 2026 Penetration Tester page. Engagements led per
year with the scope split named (lead tester on 40 web-app, 8 AD, and 4 cloud assessments across
22 client engagements over the past year). Domain-compromise success rate on internal scopes
(full-domain compromise on 22 of 25 internal pentests via Kerberoasting, AS-REP roasting, and
ADCS ESC1 abuse). High-and-critical findings shipped with the chained-issue count (delivered 180
high or critical Burp findings, including 5 multi-issue chains walked from a low-impact SSRF to
RCE on the largest target). CVEs disclosed against vendor products with the ID and bug class
named (disclosed CVE-2025-XXXX through CVE-2025-XXXX against a vendor product chain covering
deserialisation, IDOR, and auth-bypass classes). AV/EDR evasion runs landed against named products
(evaded CrowdStrike Falcon and SentinelOne on 14 of 16 red-team engagements via custom Nim loaders,
direct syscalls, and AMSI plus ETW patching). Report-cycle outcome with the remediation-pass rate
(retested 60 high or critical findings after client fix windows with an 88 percent first-pass
pass rate). Bare numbers stripped of a tool, a vendor, a CVE ID, or a chain context land as
filler in 2026; a credible bullet pins one or two of those figures to a named offensive product
and a real engagement outcome.
Next steps
From skill list to finished Penetration Tester resume
The Skills rows on their own carry the arsenal; what lifts the page into a real pentest file is the
engagement scaffolding around them. Once the chip names and row labels settle, four next moves push the
rest of the page through an offensive-security hiring read.
Long-form companion read on the Penetration Tester resume build: how to
write the profile summary so it lands the chair you want, the four moving parts of an engagement bullet
(tool, scope, technique chain, outcome), the reading order a pentest manager scans down the page in,
and the panel questions that fire in the seconds after the Skills row. In drafting now.
Every guide on the library runs the same shell, the same ATS scoring rigor, and the same recruiter-side
read. What changes between pages is the tool stack, the seniority ladder, and the screening signals each
specific job title actually clears.
Tech LeadStaff EngineerEngineering ManagerDirector of EngineeringCTO
Game DevelopmentComing soon
Game DeveloperEngine ProgrammerGraphics EngineerTechnical Artist
Solutions & Sales EngineeringComing soon
Sales EngineerSolutions Architect
DesignComing soon
UX/UI Designer
The tier labels and frequency bars above were tallied off a sample of roughly 260 US Penetration Tester and
Red Team reqs I worked through on LinkedIn, Indeed, and offensive-security consultancy career pages over Q1
2026. The weight on any single tool shifts between quarters as the offensive-security toolchain evolves: run
a fresh count against the postings open in your application queue this week before locking in any one C2
framework or web proxy as the load-bearing chip on the row.