Riley Park Senior Penetration Tester
Seattle, WA • pentester@gmail.com • +1 206-555-0177
Profile Summary
- Senior Penetration Tester with 7 years of experience running offensive security consulting engagements across fintech, SaaS, and federal contractor environments, specializing in red team operations, web application testing, and Active Directory exploitation.
- Hands-on coverage across reconnaissance (Amass), vulnerability scanners (Burp Suite Pro, Nessus), C2 frameworks (Cobalt Strike, Sliver), AD exploitation (BloodHound, Mimikatz), and scripting (Python, PowerShell) with strong fundamentals in MITRE ATT&CK mapping, OPSEC discipline, and audit-ready engagement reporting.
- Deep expertise in objective-based red team operations, TTP-driven adversary emulation, manual exploitation rigor beyond scanner output, and stealth and OPSEC discipline, leveraging methodologies such as MITRE ATT&CK-aligned engagement plans and purple-team debrief cycles to drive findings that map to real business risk and drive measurable security improvements.
- Engaged collaborator working closely with client blue teams, Detection Engineering, and AppSec partners in PTES- and OSSTMM-aligned engagements, contributing to scoping calls, retest cycles, and purple-team debriefs with a calm, evidence-first temperament.
- Emerging leader who shares technical excellence and fosters a culture of report clarity and reproducible proof-of-exploit through peer report reviews and tooling sessions, while leading internal red-team craft sessions and authoring widely used playbook and report templates.
Technical Skills
- Recon & OSINT:
- Amass, Subfinder, Recon-ng, Maltego, theHarvester, Shodan, Censys, GitHub dorking
- Web App & API Testing:
- Burp Suite Pro, OWASP ZAP, Caido, sqlmap, ffuf, dirsearch, OWASP Top 10, API pentest
- Network & AD Pentest:
- Nessus, Nmap, Impacket, NetExec (CrackMapExec), Responder, BloodHound, Rubeus, Kerberoasting
- Cloud & Mobile Testing:
- Pacu, ScoutSuite, Prowler, CloudGoat, MobSF, Frida, Objection, AWS / Azure / GCP IAM
- C2 & Exploit Frameworks:
- Cobalt Strike, Sliver, Mythic, Havoc, Metasploit, Brute Ratel C4 (familiarity)
- Post-Exploitation & Evasion:
- Mimikatz, Rubeus, SharpHound, Certify, Seatbelt, Process Hollowing, AMSI/ETW bypass
- Frameworks & Methodology:
- MITRE ATT&CK, OWASP WSTG, PTES, NIST 800-115, OSSTMM, CVSS v3.1, OSCP, OSEP
- Languages & Scripting:
- Python, PowerShell, C#, Go, Bash, Ruby, x86/x64 assembly (basic)
Education
Work Experience
- Led red team and adversary emulation engagements for Fortune 500 and high-growth SaaS clients across 3- to 12-week engagements, covering internal Active Directory, external infrastructure, and cloud and web surfaces across 40+ red team and full-scope engagements.
- Drove web application and API penetration testing across 60+ web app and API assessments on Burp Suite Pro, working full OWASP Top 10 coverage, SSRF, IDOR, and business-logic exploit chains, and authenticated and unauthenticated Burp scans backed by manual review, delivering 180+ confirmed high or critical findings.
- Owned internal network and Active Directory penetration testing using BloodHound, Mimikatz, and Impacket to execute Kerberoasting and AS-REP roasting, BloodHound attack-path analysis, NTLM relay and coerced-auth abuse, and Constrained Delegation exploitation, compromised the domain on 22 of 25 internal engagements.
- Built reconnaissance and OSINT-driven attack-surface mapping on Amass and Shodan, running DNS and subdomain enumeration at scale, leaked-credential pivoting via public dumps, and employee and infrastructure profiling, surfaced shadow IT and forgotten assets in 70% of external engagements.
- Executed post-exploitation, lateral movement, and privilege escalation through Mimikatz credential extraction, Golden and Silver Ticket forging, and pivoting through tiered admin networks, reached crown-jewel data stores in 18 engagements.
- Stood up command-and-control infrastructure and custom tooling using Cobalt Strike beacons with malleable C2 profiles, Sliver implants for OPSEC-sensitive operations, and custom Python and C# loaders with AMSI and ETW bypass, evaded CrowdStrike and SentinelOne EDR detection across 14 engagements.
- Delivered cloud, mobile, and specialized assessments across AWS, Azure, and GCP estates, exercising IAM privilege escalation, S3 and blob misconfiguration hunting, and metadata service abuse, delivered 14 cloud and 6 mobile assessments.
- Ran the vulnerability assessment and safe exploitation engagements across 90+ vulnerability assessments combining Nessus and Nuclei automated scanning, manual validation beyond scanner output, and safe exploitation to demonstrate real impact, delivering 220+ validated vulnerabilities with CVSS-scored impact.
- Designed and executed social engineering and phishing campaigns across 16 multi-channel campaigns including phishing email crafting with custom infrastructure, vishing and pretexting call scripts, and physical and badge-cloning assessments, achieving 28% click and 14% credential capture across the program.
- Authored client engagement reports and remediation guidance including executive summaries written for non-technical readers, CVSS-scored technical detail per finding, proof-of-exploit screenshots and commands, and prioritized remediation roadmaps partnering with client AppSec, IT, and Detection Engineering across 22 client engagements, validated fixes through retesting on 60+ high/critical findings and onboarding 3 junior pentesters.