Pen Test Partners is a partnership of high-end penetration testers, cherry picked for their wealth of knowledge, here they are…
Alan has enjoyed many years in IT working for DERA and other government agencies. With experience as a Software Developer, Network Engineer, 0-day finder, and Application and Infrastructure tester he is a CHECK Team Leader, and Tiger Scheme Senior Tester.
Andrew joined Pen Test Partners after running his own security consultancy. He specialises in the Internet of Things, and web, and mobile applications. He has a strong background in electronic engineering, giving him an unrivalled skill set for testing hardware.
Antonio has a firm understanding of many technologies and can perform thorough penetration tests on a variety of apps, languages, platforms and technologies. He has also worked closely with Channel 4 researching and providing technical expertise and demonstrations.
Chris has a military background where he held high level clearances working in radar and military comms, then worked in data and credit card processing businesses. His free time is spent researching security vulnerabilities and building tools to exploit basic configuration flaws.
Chris has worked in a range of industries, from Critical National Infrastructure to leading edge design & manufacturing (Dyson). Doing so has given Chris a very varied array of knowledge, from designing secure SCADA networks, to penetration testing robot vacuum cleaners.
Dave has worked in most of the major industry sectors (IT, Retail, Finance, Government) and has been a developer and Unix system administrator. His security experience really gained momentum in 2000 though and is CREST CCT APP and INF, and CBEST qualified.
Iain has over 10 years of penetration testing experience and has successfully gained, and renewed his CHECK team leader status during this period. He currently has SC clearance and has held DV clearance, which has led to experience of testing classified systems at all levels.
As well as testing Ian researches various technologies and organises security community events such as the OWASP Birmingham chapter. With a firm understanding of many technologies he performs pen tests on a variety of applications, languages, platforms and technologies.
James has worked in the big 4 consulting industry as part of a penetration testing team providing services for global organisations. He has engaged with clients across multiple continents, often overcoming language barriers to make sure that deliverables are clear and requirements are met.
Joe’s start in IT security was as a web developer, responsible for writing secure code for large client sites with levels of interactivity. The skills learned in this role and his inquisitive nature led him to become a penetration tester in 2002 and has been delivering penetration tests full time since then.
Ken regularly blogs on everything from honeypots to hacking cars and also writes for various newspapers and magazines. A familiar face on the speaker circuit, Ken speaks widely on computer security, taking great pleasure in highlighting vulnerabilities in software and hardware.
Lee has experience in testing everything from straightforward networks with a mix of operating systems to bespoke systems and applications. Working within both small and large environments and from commercial entities to central government agencies.
Michael maintains a high level of technical knowledge and awareness of the latest threats to an organization and has vast experience with dealing with non-technical audiences and translating technical findings into high-level business risk.
Minh’s expertise includes network and application penetration testing, and digital forensics. He has strong interpersonal skills, works well within a pressured environment and is a good communicator, with the ability to explain complex security risks in business language.
Nick has worked in the IT and security industry for over 10 years. He has considerable system, OS and protocol experience in diverse environments that enables him to understand technical and operational restraints, and work with clients to secure their networks and systems.
With an early history in systems and network admin, and an engineering background, Pedro has amassed considerable experience and knowledge in several operating systems, network topologies, protocols and hardware, server environments and services and programming languages.
Previously a SCADA Security Manager Roger has a near-unique set of skills born of looking after and testing real-time utility systems. He has sat on the SCADA Control Systems Information Exchange (SCSIE), the CPNI industry exchange giving him a unique understanding of utilities security.