Author Image

I am Carlos Marquez

Recent Posts

Projects

AZ500 Study guide
AZ500 Study guide
Creator August 2020 - October 2020

Study Material for AZ500 Certification along with demo code for deployments.

Offensive Cyber Deception
Offensive Cyber Deception
User June 2021 - Present

Cowrie is a medium to high interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker.

Threat Intel
Threat Intel
Creator January 2025 - Present

Personal repo where I host Graylog and Grafana config settings. See my blog post incase you are interested in setting up your own Threat Intel platform.

Carlos Marquez

Senior Penetration Tester at Coalfire

During the day, I’m a dedicated penetration tester, uncovering vulnerabilities and solving cybersecurity challenges. After hours, I unwind through gaming or dive into experimenting with new tech stacks, deploying them into my home lab environment to explore and learn. Every moment in between is devoted to being a proud father, embracing the balance between family and career. Whether it’s debugging code, spending time with family, or chasing high K/D ratios, I’m driven by curiosity, passion, and a love for growth.

Leadership
Team Work
Web App Pentest
API Pentest
Internal Pentest
Programming
Wireless Pentest

Skills

Job Experience

1
Coalfire

May 2021 - Present

Greenwood Village, CO

Coalfire is a cybersecurity consulting firm serving clients in the cloud and technology, financial services, government, healthcare, and retail markets. Coalfire has expertise in the areas of cloud, cybersecurity, and compliance.

Senior Consultant / Penetration Tester

May 2021 - Present

Responsibilities:
  • Mentored junior penetration testers by providing hands-on guidance in vulnerability assessment, exploitation techniques, and report writing.
  • Conducted training sessions on topics such as network penetration, web application security, and API testing to help upskill team members.
  • Performed application and API penetration tests across public and private networks.
  • Acted as a technical point of contact, assisting team members in troubleshooting complex vulnerabilities and testing challenges.
  • Conducted penetration tests aligned with the latest industry standards, including PCI DSS, FedRAMP, and other compliance frameworks, ensuring adherence to best practices for security and risk management.

Avaya

July 2016 - May 2021

Santa Clara, CA

An American multinational technology company that provides cloud communications and workstream collaboration services.

Security Engineer

July 2016 - May 2021

Responsibilities:
  • Organize and plan assessments in collaboration with project teams, performing OWASP ASVS automated testing, fuzzing, and exploitation of identified vulnerabilities. Deliver high-quality executive summaries and PoCs to help teams reproduce findings and facilitate effective remediation.
  • Establish engineering criteria for developers to help prevent common weaknesses in web applications (OWASP Top 10) and identify potential impacts.
  • Project Lead for Avaya CVE Numbering Authority (CNA), responsible for assigning CVE IDs to vulnerabilities found in Avaya products.
  • Maintain python code used to automate pulling third party advisories into a database for software bill of materials tracking.
  • Cloud Audit and Security Assurance.
2

Education

2012-2016
Computer Information Security