Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Austin Coontz

Associate Security Consultant

EXPERIENCE
Austin Coontz is an accomplished Associate Security Consultant with a range of experience in IT. Having served in both Managed Service Provider (MSP) and large manufacturing company environments, Austin has cultivated a diverse skill set encompassing systems administration, threat intelligence, and end-user technical support. His hands-on experience in various IT roles has equipped him with invaluable insights into the intricacies of cybersecurity.

Austin's background is complemented by an impressive array of credentials, including a Bachelor of Science in Computer Information Systems. He holds many esteemed accreditations, and his commitment to continuous learning and professional development is evident in his pursuit of certifications like eLearnSecurity Junior Penetration Tester (eJPTv2) and GIAC Foundational Cybersecurity Technologies (GFACT). His dedication is underscored by continuing to stay at the forefront of cybersecurity practices and technologies.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science: Computer Information Systems
  • Offensive Security Certified Professional (OSCP)
  • Certified Penetration Testing Specialist (CPTS)
  • Cisco Certified Network Associate (CCNA)
  • eLearnSecurity Junior Penetration Tester (eJPTv2)
  • GIAC Foundational Cybersecurity Technologies (GFACT)
  • CompTIA Security+ (Sec+)

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog February 06 2024

A Beginner’s Guide to Mobile Application Testing

As consumers become more dependent on mobile devices, the need for application security has become more of a priority. In this blog post, I will discuss my…

Read about this article
News December 12 2025

Security Advisory: React2Shell (CVE-2025-55182) - Critical RCE Vulnerability

A critical vulnerability affecting React Server Components (RSC) is being actively exploited. Here's what to look for and what to do next.

Read about this article
Blog December 09 2025

Holy Shuck! Weaponizing NTLM Hashes as a Wordlist

Password reuse is common in Active Directory (AD). From an attacker’s perspective, it is a reliable path to lateral movement or privilege escalation. Most IT…

Read about this article
Podcasts December 05 2025

Security Noise - Hacker Family Feud

Our security experts compete to see which team can guess the most popular answers to cybersecurity industry questions on this episode of the TrustedSec…

Read about this article
Events December 04 2025

Research on Windows Accessibility: Narrator.exe

Join us for our next Discord Livestream "Research on Windows Accessibility: Narrator.exe" on December 4 at 11:00AM ET! During this exclusive session, Principal…

Read about this article
Blog December 04 2025

What is a TrustedSec Program Maturity Assessment (PMA)?

The TrustedSec PMA is a tactical approach to evaluating the components, efficiency, and overall maturity of an organization’s Information Security…

Read about this article
Webinars December 03 2025

NIST CSF 2.0 - From Compliance to Confidence

During our next webinar, our experts will cover the latest evolution of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF),…

Read about this article
News December 01 2025

KTVU Fox 2 San Francisco - Too good to be true? Cyber Monday Warning

Protect your purchases this Cyber Monday! Director of Advisory Services Chris Camejo speaks with KTVU Fox 2 to share essential tips on how to safeguard your…

Read about this article
News November 25 2025

Schwab Network | Morning Movers - Zscaler (ZS) Earnings Preview and Cybersecurity Outlook

Advisory Solutions Director Alex Hamerstone joins Morning Movers to preview Zscaler (ZS) earnings and discuss the overall cybersecurity software space. He…

Read about this article
Events November 20 2025

Discord Livestream: Hunting Deserialization Vulnerabilities With Claude

Join us for an exclusive live Discord presentation and Q&A with Senior Security Consultant James Williams.

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.