0% found this document useful (0 votes)
52 views2 pages

TCM Security - Sample Resume Template (2025)

The document is a resume for a cybersecurity professional with extensive experience in ethical hacking, penetration testing, and network security. It highlights the individual's education, certifications, work experience, military background, and contributions to cybersecurity training and community initiatives. The candidate has a strong technical skill set and has been involved in various projects and speaking engagements within the cybersecurity field.

Uploaded by

sakarutuka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views2 pages

TCM Security - Sample Resume Template (2025)

The document is a resume for a cybersecurity professional with extensive experience in ethical hacking, penetration testing, and network security. It highlights the individual's education, certifications, work experience, military background, and contributions to cybersecurity training and community initiatives. The candidate has a strong technical skill set and has been involved in various projects and speaking engagements within the cybersecurity field.

Uploaded by

sakarutuka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

FIRST MIDDLE LAST

address • number • email

OBJECTIVE Cybersecurity professional with a strong interest in ethical hacking, penetration testing, vulnerability
analysis, and network security. Hard-working, energetic, personable, and technical-minded
individual. Currently in a cybersecurity role where I continue to develop and learn new abilities
while contributing to the overall success of the organization. I also possess:

● Experience in scripting languages including Python and Bash.


● Excellent task management. Ability to handle multiple projects simultaneously.
● Experience with security toolkits such as Kali Linux, Metasploit, and Burp Suite Pro.
● Proficient in translating information from technical to executive/management terminology.

EDUCATION College – MBA, Computer Information Systems, 3.76 GPA

College – Bachelor’s, Accounting (Honors), 3.52 GPA

CERTIFICATIONS ● ISC2 Certified Information Systems Security Professional (CISSP)


● GIAC Systems and Network Auditor (GSNA)
● Practical Network Penetration Tester (PNPT)
● Offensive Security Certified Professional (OSCP) and Wireless Professional (OSWP)
● eLearnSecurity Penetration Tester eXtreme (eCPTX)
● eLearnSecurity Web Application Penetration Tester (eWPT)
● CompTIA A +, Network +, Security +, Linux +, Pentest+

EXPERIENCE Work 1, Remote/Charlotte, NC June 2019 to Present


Founder & CEO
● Engage in a variety of penetration testing assessments including network (internal and
external), web application, wireless, red and purple team, physical, social engineering, and
more.
● Instructor at TCM Security Academy which provides cybersecurity and ethical hacking training
to over 200,000 students.

Work 2, Remote/Charlotte, NC March 2018 to June 2019


Senior Penetration Tester II
● Perform external, internal, physical, wireless, web, SOC, and malware assessments on
Fortune 500 companies.
● Utilize platforms and tools such as Kali Linux, Metasploit Framework, Burp Suite Pro, and
Cobalt Strike.
● Interact with clients on high and technical levels to discuss findings and resolutions.
● Involved in internal team tool and script development, utilizing Bash and Python, and recently
developed a tool that has led to several breaches on external assessments.

Work 3, Albuquerque, NM June 2017 to March 2018


Senior Network Engineer
● Involved in the development and implementation of secure physical security networks
including design, installation, and vulnerability assessments at various work sites across the
world.
● Conducted penetration tests against virtualized live systems to determine current
system/network vulnerabilities and apply appropriate patching.
● Introduced the use of security metrics to mitigate vulnerabilities by analyzing historical threats,
addressing risks, gaps, and violations, performing SCAP/STIG scans, and implementing
improved protocols.
● Performed as a Linux system administrator (Red Hat/CentOS) for an internal classified
system providing Nessus vulnerability scans and patching, adhering to DISA STIG
compliance standards, developing Bash and Python installation scripts for increased
automation, and involved in writing and development of the security plan to comply with the
NIST 800-53 framework.
MILITARY Lieutenant, Santa Fe, NM February 2014 to March 2018
EXPERIENCE United States Army Reserves
● Platoon leader of 20 senior NCOs and junior enlisted in charge of soldier success, training,
medical readiness, and combat readiness.

PROJECTS TCM Security Academy (https://academy.tcm-sec.com) December 2019 to Present


• Instructor of five best-selling ethical hacking classes that have a combined 400,000 students
and 4.8/5.0 rating on the platform

The Cyber Mentor (https://www.thecybermentor.com/) March 2018 to Present


• Actively post cybersecurity training videos on YouTube to over 300,000 subscribers
(https://www.youtube.com/c/thecybermentor) and stream ethical hacking lessons on Twitch
to 25,000 subscribers (https://www.twitch.tv/thecybermentor).

Co-Founder & Board Member March 2018 to December 2019


VetSec, Inc (www.veteransec.com)
● Ran and operated a non-profit initiative for current and former military members looking to
transition into cyber security. Served as board member under one-term limit.

INE, Online December 2017 to Present


Instructor
• Currently the instructor for the Offensive Security Certified Professional (OSCP) Prep
Course.

TALKS
Hack at the Harbor April 2022
Keynote, “Hiring and Getting Hired in Cybersecurity”

BSides Ahmedabad November 2021


Keynote, “Becoming a Practical Ethical Hacker (on a Budget)”

CIA Conference December 2020


Keynote, “Bridging the Gap Between Corporate Cyber Security Researchers and Hackers”

Hackerone H@cktivitycon July 2020


Talk, “Pentest Story Time: My Favorite Hacks from the Past Year”

BSides Greenville June 2020


Panelist, Pentest Firing Squad

BSides Charleston December 2019


Talk, “The Top 5 Ways I Owned Your Internal Network”

Wild West Hackin’ Fest October 2019


Talk, “What I’ve Learned After a Year as a Cybersecurity Mentor”

BSides RDU October 2019


Talk, “The Top 5 Ways I Owned Your Internal Network”

BSides Charlotte September 2019


Talk, “The Top 5 Ways I Owned Your Internal Network”

CarolinaCon April 2019


Talk, “Much Ado About Stuffing”

BSides Greenville March 2019


Panelist, Pentest Firing Squad

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy