Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Costa Petros

Senior Security Consultant

EXPERIENCE
Costa Petros began his IT career by covering many facets from the ground up. While in college studying construction management, Costa’s ability to communicate, problem-solve, and collaborate awarded him his first job in IT as a dial-up Internet technical support representative.

As his career progressed, he worked his way up through technical and operational support, PC and IT infrastructure administration, compliance, and consulting roles. Costa held a position as an IT administrator at a branch of a publicly traded company that focused on reselling both Cisco and security services. Costa’s communication skills, technical aptitude, and ‘security-first’ approach opened the door to becoming a penetration tester consultant. As a penetration tester at TrustedSec, Costa specializes in social engineering and physical security assessments. He approaches his work with a ‘hope for the best, prepare for the worst’ mentality.

EDUCATION & CERTIFICATIONS

  • GIAC Penetration Tester (GPEN)
  • Microsoft Certified Professional (MCP)
  • VMware VCA-DCV

PROFESSIONAL AFFILIATIONS

  • InfraGard Northern Ohio Chapter

INDUSTRY CONTRIBUTIONS

  • DerbyCon staff and security, 2017-19

PASSION FOR SECURITY
Costa’s passion for security was evoked at a young age. Growing up in the family takeout business, Costa was taught to protect what you have. This meant locking up at all hours of the day at the family business and at home. As a kid, running in and out of the house was frustrating when he found the doors locked. It didn’t take long for him to find other ways into the house, sometimes climbing onto the roof to bypass a window lock. A curious boy, Costa constantly took apart household items in order to fix, understand, and improve them. This curiosity, his ‘prepare for the worst’ mentality, and ‘protect what you have’ focus drive him to understand and further advance secure implementations.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 19 2018

It Was the "Summerof2018" - Password Auditing for Windows Administrators

You can audit your Windows domain to identify weak passwords, such as Summer2018 or , and mitigate password spraying by extracting and cracking NTLM hashes…

Read about this article
Events TrustedSec HQ | October 28 2025

ISC2 Cleveland Chapter Member Meeting - October 2025

ISC2 Cleveland Chapter October MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Lake Buena Vista, FL | October 27 2025

InfoSecWorld 2025

TrustedSec is proud to sponsor and hold a workshop at this year's InfoSec World in Lake Buena Vista, Florida. Make sure to visit our booth if you'll be there!

Read about this article
Training Resources October 25 2025

InfoSec World Workshop - Adversary Tactics and Threat Hunting

This immersive workshop will train you to simulate attacks, hunt threats, and build detections using manual, automated, and AI-driven methods across network…

Read about this article
Events Provo, Utah | October 21 2025

SAINTCON 2025

We are proud to sponsor and have a booth at this year's SAINTCON!

Read about this article
Webinars October 15 2025

Incident Response: Lessons From the Front Lines

IR Practice Lead Carlos Perez will draw from recent, anonymized investigations to expose the most devastating failure patterns our Incident Response team has…

Read about this article
Blog October 10 2025

Skimming Credentials with Azure's Front Door WAF

A Web Application Firewall (WAF) is a powerful thing. It inspects all traffic that traverses it, seeing everything that is submitted to a page. EVERYTHING.…

Read about this article
Events Deadwood, South Dakota | October 08 2025

Wild West Hackin' Fest 2025

We are excited to return to Wild West Hackin' Fest this year!

Read about this article
Blog October 07 2025

PCI P2PE vs. E2EE – Scoping it Out

If your payment processor says they use “End-to-End Encryption” your PCI DSS compliance scope may be bigger than you expect. In this blog, we break down how…

Read about this article
Podcasts October 06 2025

Security Noise - Cybersecurity Awareness Month 2025

In this episode, we are talking cybersecurity awareness with Alex Hamerstone! This discussion covers authentication practices, compliance, IoT, and scams using…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.