Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Caroline Fenstermacher

Security Consultant

Experience
Prior to joining the TrustedSec Incident Response Team, Caroline gained experience at an open-XDR vendor as a Security Operations Center Analyst, where she then moved into the role of a Threat Hunter and Incident Response Analyst. Her research interests have been focused on cloud security, specifically in AWS environments. Caroline also has the unique experiences of briefly working within law enforcement and the banking industry.

Education & Certifications:

  • Bachelor of Science, Cybersecurity, The University of Tampa
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Intrusion Analyst (GCIA)
  • AWS Certified Cloud Practitioner

Passion for Security
Caroline’s interest in cybersecurity spawned from constantly wanting to get to the bottom of whatever mystery presented itself to her. Tracking down an attacker’s actions and learning how to proactively look for those actions in the future perfectly satiates her curious nature.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog July 17 2025

Hiding in the Shadows: Covert Tunnels via QEMU Virtualization

Attackers are getting increasingly creative—not just with their payloads, but with how they deliver and operate them. In a recent Incident Response engagement,…

Read about this article
Blog February 25 2025

A Threat Hunter’s Guide to Decoding the Cloud

This blog will guide you through how to be a successful threat hunter in cloud environments, along with some helpful tips and advice.

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Learn to identify and combat business email compromise (BEC) threats in Microsoft 365 with expert Steven Erwin and Caroline Fenstermacher.

Read about this article
Webinars February 11 2026

Perspectives on AI in the Cybersecurity Industry in 2026

Join us for this exclusive webinar where our experts will decode the complex relationship between artificial intelligence and cybersecurity in 2026. What will…

Read about this article
News January 22 2026

News 5 Cleveland - Social Security numbers may have been exposed in data breach connected to local car dealership

A Massillon car dealership reports that an unauthorized actor accessed its network, potentially exposing customer names and Social Security numbers. Advisory…

Read about this article
Blog January 22 2026

Adventures in Primary Group Behavior, Reporting, and Exploitation

If you’ve administered Active Directory (AD) for any significant time, chances are you’ve come across the primaryGroupID attribute. Originally developed as a…

Read about this article
Blog January 20 2026

Colonel Clustered: Finding Outliers in Burp Intruder

TL;DR, gimme the goods: https://github.com/hoodoer/ColonelClusteredExtension has been submitted to the Bapp store, awaiting approval.This is a Burp Suite…

Read about this article
Events January 15 2026

Discord Livestream - Crash Course: Building an Analysis Strategy

In this livestream, we will cover the components of an incident response attack plan from a high level —including scoping, building an analysis strategy,…

Read about this article
Blog January 15 2026

CMMC Scope – Understanding the Sprawl

The CMMC program contains complex, and potentially confusing, scope requirements. Contractors that are preparing for a CMMC assessment will need to pay close…

Read about this article
News January 15 2026

WWL First News with Tommy Tucker - What to know about the big Verizon outage on Wednesday

A widespread Verizon outage left many without service, sparking conversation about digital dependence. Advisory Solutions Director Alex Hamerstone joins WWL…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.