Building a self-hosted attack simulation environment with automated detections, replayable scenarios, and weekly control validation runs.
Tucker Clark
senior red team operator · security engineer
Senior Red Team Operator and Security Engineer with 5+ years of experience in red team operations and penetration testing across networks, cloud, and web applications. 2+ years leading consulting projects and technical teams with a background in AI, data science, and software engineering.
Documenting practical offensive test cases for prompt injection, tool abuse, data exfiltration, and weak authorization patterns in agentic workflows.
Expanding payload libraries and benchmarking bypass behavior across rule sets to track defensive drift over time.
Scaled continuous automated penetration testing across 4 tenancies (~137K hosts), integrated findings into SOC and BAS pipelines, and led PCI DSS testing across 200K+ hosts.
Launched Mandiant's first LLM penetration testing service line, emulated advanced threat actor TTPs, and co-authored AI red teaming research published in M-TRENDS 2024.
Ran BAS programs, managed a government vulnerability disclosure program via HackerOne, and automated mobile risk analysis for 3,880 users and applications.
Personal lab for continuous attack simulation, detection validation, and report generation across cloud and internal environments.
Payload testing framework for measuring allow/block behavior by vulnerability class and tracking baseline control effectiveness over time.
Independent environment for evaluating prompt injection, data leakage, and abuse scenarios in LLM-backed applications.
B.S. in Computer Science (Data Science), University of Tennessee at Chattanooga (May 2020). Teaching Assistant for Intro to Machine Learning; recipient of NSF S-STEM scholarship and UTC Freshman Mathematics Award.