Martín Martín
Offensive security professional based in Madrid. 18+ years finding the bugs attackers would exploit.
I've been obsessed with offensive security since I was 12. By that age I was on the staff of one of the biggest Spanish-speaking cybersecurity forums of its time. At 14 I was part of a small group researching some of the first flaws in the Bluetooth protocol. Along the way I was finding bugs in the software of that era (phpBB and other mainstays) and reporting them to vendors in a time when bug bounty programs didn't exist yet. Forums, IRC channels and breaking things on my own. Self-taught the whole way.
Linux was the other obsession. That's why my professional career started as a sysadmin in 2007: servers, networks, breaking things and putting them back together. The admin side gave me infrastructure depth; the offensive side, the one I'd been doing on my own since I was a kid, is what I've spent more than two decades sharpening.
Today it's offensive security full time. Pentesting across web, mobile, cloud, API and LLM/GenAI environments. Red team and purple team programs. Bug bounty and CVE research. 6 CVEs published so far, more than 1,000 vulnerabilities reported across hundreds of organizations, and findings that have helped protect more than 127K+ websites.
In practice: I run pentests for clients, I publish what's safe to publish, and I teach. 200+ students through private training and lectures with a 9.5/10 average rating. Available for mentoring sessions, private training and conference talks on offensive security, bug bounty and security careers.
18+ years in IT & security
Corporate path
Independent path
Certifications
What people say
Executive at a fintech company"We were preparing for our ISO 27001 certification and needed a proper pentest. Martín found issues that our previous vendor and automated scans had completely missed. Clear report, zero fluff, and he took the time to walk our devs through every fix."
Former colleague, Security team"Martín is the type of teammate that makes you wonder how you managed before he joined. His work on alert and incident handling has been excellent. He ran several internal pentests and delivered detailed reports that were key to improving our overall security."