visitor@tilmana:~$ whoami --verbose
Arthur Tilman
Cybersecurity - Penetration Tester
// Professionally breaking things to improve their security
scroll to explore ↓
█ ██ █ █████
visitor@tilmana:~$ cat about.txt
Offensive security professional with experience across the full spectrum of penetration testing — web applications, APIs, external and internal networks, wireless, mobile, physical engagements, and social engineering. Has delivered 80+ full-scale assessments for clients ranging from Fortune 100 and Fortune 500 companies to organizations in regulated industries.
Focused on quality and efficiency: built internal automation tooling, improved testing workflows, and authored methodology documentation at multiple organizations. Comfortable owning engagements end-to-end — from scoping and kick-off through reporting, presentations, and remediation follow-up. Primary interest lies in web application and API security, where the complexity of modern web attack surfaces keeps the work challenging and the findings impactful.
Active on CTF platforms including DEFCON, TryHackMe, VirtualHackingLabs, and OffSec Proving Grounds with 200+ machines compromised. Hold a Master's in Cybersecurity and Information Assurance from WGU alongside certifications including OSCP, OSWE, and a broad CompTIA stack.
█ ██ █ ██████
visitor@tilmana:~$ cat skills.txt
[ Offensive Security ]
[ Tools & Frameworks ]
[ Languages & Scripting ]
█ ██ █ ████████
visitor@tilmana:~$ ls -la ./projects/
total 6
█ ██ █ ██████████
visitor@tilmana:~$ git log --oneline --all
- [+]Conducted external network penetration testing as part of a structured pod team engagement
- [+]Authored internal methodology documentation and onboarding material for new pod members
- [+]Built and maintained a multi-sheet testing tracker to organize targets, divide workload, and communicate project status to the PM
- [+]Developed Python scripts to ingest raw target lists and categorize by record validity and internal address resolution, eliminating accidental scanning of internal hosts
- [+]Deployed and configured a Nessus instance and custom scanning policy to ensure full testing coverage
- [+]Delivered web application and API penetration tests end-to-end, including scoping, testing, reporting, and client presentations
- [+]Provided pentesting across web, API, mobile, external and internal networks, physical, and social engineering engagements for clients including Fortune 100 companies
- [+]Collaborated with the Advisory team to deliver full-scope cybersecurity services and continuously improve client security posture
- [+]Built automation scripts that eliminated hours of repetitive weekly tasks and reduced human error in internal workflows
- [+]Upgraded core testing workflow to raise the quality and consistency of client deliverables
- [+]Performed 60+ full-scale penetration tests across external and internal networks, wireless, web applications, and APIs for clients including Fortune 500 companies
- [+]Delivered detailed report packages covering identified findings, risk ratings, and actionable remediation guidance
- [+]Managed full engagement lifecycle — kick-off calls, status updates, close-out presentations, and follow-up remediation assessments
- [+]Authored internal documentation to standardize and improve team processes
- [+]Onboarded new consultants by leading live engagement walkthroughs covering methodology, workflow, and client communication
- [+]Compromised 200+ machines across platforms including DEFCON, TryHackMe, VirtualHackingLabs, and OffSec Proving Grounds
- [+]Applied a broad range of exploitation techniques including SQL injection, file inclusion, code injection, privilege escalation, kernel exploitation, prompt injection, and service-specific exploits
// click a commit to expand details
█ ██ █ ██████████████
visitor@tilmana:~$ cat certifications.txt
OSCP
Offensive Security Certified Professional
OSWE
Offensive Security Web Expert
CySA+
Offensive Security Certified Professional
Security+
CompTIA Security+
Linux+
CompTIA Linux+
Project+
CompTIA Project+
Network+
CompTIA Network+
A+
CompTIA A+
ITIL 4
ITIL Version 4
█ ██ █ ███████
visitor@tilmana:~$ cat degrees.txt
[*] Found 2 records.
█ ██ █ ███████
visitor@tilmana:~$ sendmail arthur.mumble709@passmail.net
// All systems nominal. Awaiting your transmission.