Skip to Main Content

Christopher Paschen

Research Practice Lead

EXPERIENCE
Christopher Paschen has worked in Information Security in both the private and public sectors for more than 10 years. He has experience managing Active Directory and network services for a small team and has developed products that are used across organizational boundaries to accomplish a variety of red team tasks. Currently, he manages research direction and contributes to our internal implant and payload generation systems.

EDUCATION & CERTIFICATIONS

  • Master of Science, Applied Computer Science, Dakota State University
  • Bachelor of Arts, Computer and Network Security, Dakota State University
  • Microsoft Certified: Azure Security Engineer Associate

PASSION FOR SECURITY
Christopher has always been interested in how computers work. He started assembling his first system with birthday money when he was 13 years old and experimented with programming in high school. While pursuing his Information Security career in college, he led teams for CCDC and CTF events in order to share his love for computer security with those around him. Currently, he enjoys creating tooling and platforms that enable the TrustedSec red team to accomplish their goals.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars November 04 2020

Using Research to Gain Attack Intelligence

Come hear Carlos Perez, Practice Lead of the TrustedSec Research Unit and Chris Paschen, Senior Research Analyst, discuss how the industry has evolved, how to…

Read about this article
Blog March 28 2023

Using RPC in BOFs

In previous blog posts, I detailed how a windows programmer can develop against RPC and solidified why I feel Beacon Object Files (BOFs) have become cemented…

Read about this article
Blog March 24 2023

Disabling AV With Process Suspension

Every now and again, I see a crazy tweet that feels like it just can’t be true. Many of them are not true or are folks making overblown statements about…

Read about this article
Blog March 09 2023

Changes in the Beacon Object File Landscape

Time flies when you’re having fun! Can you believe it has been over two (2) years since the release of beacon object files (BOFs)? BOFs were released June 25,…

Read about this article
Blog March 02 2023

RPC Programming for the Aspiring Windows Developer

As EDR/AV solutions have evolved, attackers, be they malicious or hired testers, need to improve their techniques by exploring new avenues of accomplishing…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars August 07 2024

Ask Me Anything: Proactive Threat Hunting

As threat actors become more sophisticated, organizations' approaches to finding malicious activity must become more proactive and refined. Dive into the…

Read about this article
Training Resources August 03 2024

Black Hat USA Training - Applied Threat Hunting and Detection Engineering

Registration is now open for our Black Hat training on August 3-6, 2024

Read about this article
Blog August 01 2024

Lapse of Control: Applauding PCI SSC for FAQ 1572

I want to applaud the PCI Security Standards Council (PCI SSC) for FAQ 1572 published in March of 2024 for simply and effectively answering a question asked by…

Read about this article
Events TrustedSec HQ | July 30 2024

ISC2 Cleveland Chapter Member Meeting July 2024

ISC2 Cleveland Chapter July MeetupCome join us for our monthly meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.