Penetration Testing, Penetration Test, OSCE, OSCP, OSWP, CEH - Martin Voelk
Penetration Testing, Penetration Test, OSCP, OSWP, CEH - Martin Voelk
Penetration Testing, Penetration Test, OSCP, OSWP, CEH - Martin Voelk
home,page-template,page-template-full_width,page-template-full_width-php,page,page-id-14869,ajax_fade,page_not_loaded,,qode-title-hidden,qode-theme-ver-1.0,wpb-js-composer js-comp-ver-4.12,vc_responsive

Meet Martin Voelk

Thanks for visiting my website! I am a seasoned IT Security expert and Penetration Tester, who helps companies and individuals to uncover flaws and security vulnerabilities in their IT systems in order to fix them.

IT, Networking and Security Technologies have already fascinated me from a very young age. I started working in IT in 1997 and have been working as a freelancing Security Consultant for clients around the globe. My clients range from SMB to Fortune 500 companies as well as governments and the military.

Initially I started out a Windows Server Admin and then moved into Networking and Cisco technologies and I have done my Cisco CCIE certification in 2004. Later I worked as a Network Security Consultant for ISPs, banks, government agencies as well as Certified Instructor delivering Networking, Security and Wireless technology training around the globe. My career took me around the world. From Germany (where I am originally from) to the UK, all over Europe, South Africa, the Middle East,Russia, Japan, Australia, Singapore, Canada, Mexico and the United States.

In 2009, 2 partners and myself founded our Penetration Testing consulting company Cyber 51 LLC. These days I still keep hands-on and spend around 50% of my time on active IT Security consulting such as Pen Testing and my other 50% on aspects of the business. Read more…

What do I offer? Penetration Testing!

Why me?

  • Expert in Penetration Testing
  • Holding the highest industry and government security certifications
  • Experience across all sectors and business sizes
  • Pride in excellence of my work
  • Your Security is my Priority!

A Penetration Test is a method of evaluating computer and network security by simulating an attack on a computer system or network from external and internal threats. The same tools, know-how and methodologies are being used, as malicious hackers would employ, but in a Penetration Test the company being tested has granted explicit written permission to perform such testing prior to the engagement.

The Value

  • Discovery & Mitigation of vulnerabilities
  • Reducing risk to your business
  • Protecting your IT security investment
  • Protecting clients, partners and third parties
  • One-time off or recurring options

Why should you get regular Penetration Tests?

  • What would happen if a competitor or hacker would steal your digital assets?
  • What legal consequences and lawsuits would a security breach have for you?
  • What financial implications would you face if your IT systems are taken down?
  • What reputational damage would a successful hack pose to your business?
  • Did you know that 90% of all deployed IT systems have vulnerabilities?


  • Every Penetration Testing / Vulnerability Testing Service contains the following deliverables:
  • Comprehensive report (Executive summary and in-depth technical report)
  • only at agreed testing times (for example at nights, weekends etc.
  • Mitigation Advice on encountered vulnerabilities
  • Never running malicious exploits or DDoS Tests unless agreed beforehand
  • 1 Debrief call with the client over WebEx to go through the report
  • Instant notification of critical vulnerabilities found during testing phase
  • Secure report delivery by encrypted email
  • 1 Re-test after the initially encountered vulnerabilities have been mitigated (at a heavily discounted rate)



Network Penetration Testing Vulnerability Assessment

Network Penetration Testing is a security testing service that focuses on locating flaws in your

Web App Penetration Testing Vulnerability Assessment

More than 70% of all technical attacks aim at the Web Application layer. This service examines your web applications…

Wireless Penetration

Wifi Networks experience ever increasing popularity. Our Wireless Penetration Testing covers all threat vectors against Wifi…

Mobile Application
Penetration Testing

Mobile devices have surpassed desktops a while back. Mobile Application Penetration Testing covers all threat vectors…

Social Engineering

Often the latest technical perimeter defenses may be in place, yet corporate security isbeing breached. Why?

Cyber Intelligence Services

Have you heard about the dark web? This is where a lot of illegal hacking activities take place. Has your confidential data leaked out already?

Online Investigation Services

More and more criminal activity is taking place online. Our services are aimed at businesses and individuals alike…