Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Costa Petros

Senior Security Consultant

EXPERIENCE
Costa Petros began his IT career by covering many facets from the ground up. While in college studying construction management, Costa’s ability to communicate, problem-solve, and collaborate awarded him his first job in IT as a dial-up Internet technical support representative.

As his career progressed, he worked his way up through technical and operational support, PC and IT infrastructure administration, compliance, and consulting roles. Costa held a position as an IT administrator at a branch of a publicly traded company that focused on reselling both Cisco and security services. Costa’s communication skills, technical aptitude, and ‘security-first’ approach opened the door to becoming a penetration tester consultant. As a penetration tester at TrustedSec, Costa specializes in social engineering and physical security assessments. He approaches his work with a ‘hope for the best, prepare for the worst’ mentality.

EDUCATION & CERTIFICATIONS

  • GIAC Penetration Tester (GPEN)
  • Microsoft Certified Professional (MCP)
  • VMware VCA-DCV

PROFESSIONAL AFFILIATIONS

  • InfraGard Northern Ohio Chapter

INDUSTRY CONTRIBUTIONS

  • DerbyCon staff and security, 2017-19

PASSION FOR SECURITY
Costa’s passion for security was evoked at a young age. Growing up in the family takeout business, Costa was taught to protect what you have. This meant locking up at all hours of the day at the family business and at home. As a kid, running in and out of the house was frustrating when he found the doors locked. It didn’t take long for him to find other ways into the house, sometimes climbing onto the roof to bypass a window lock. A curious boy, Costa constantly took apart household items in order to fix, understand, and improve them. This curiosity, his ‘prepare for the worst’ mentality, and ‘protect what you have’ focus drive him to understand and further advance secure implementations.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 19 2018

It Was the "Summerof2018" - Password Auditing for Windows Administrators

You can audit your Windows domain to identify weak passwords, such as Summer2018 or , and mitigate password spraying by extracting and cracking NTLM hashes…

Read about this article
Events December 04 2025

Research on Windows Accessibility: Narrator.exe

Join us for our next Discord Livestream "Research on Windows Accessibility: Narrator.exe" on December 4 at 11:00AM ET! During this exclusive session, Principal…

Read about this article
Webinars December 03 2025

NIST CSF 2.0 - From Compliance to Confidence

During our next webinar, our experts will cover the latest evolution of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF),…

Read about this article
Events November 20 2025

Discord Livestream: Hunting Deserialization Vulnerabilities With Claude

Join us for an exclusive live Discord presentation and Q&A with Senior Security Consultant James Williams.

Read about this article
Events TrustedSec HQ | November 19 2025

Women in CyberSecurity (WiCyS) NEO - Secure Your Data in the Age of AI

Join WiCyS NEO as they wrap up the year with a grand finale event at the TrustedSec HQ!

Read about this article
Podcasts November 19 2025

Security Noise - C2 for Me + You

Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. Listen…

Read about this article
News November 19 2025

WWL First News with Tommy Tucker - Websites and apps are tracking your data. Here's what you need to know

Ever wonder what happens to your data when you use a website, app, or make a purchase? Advisory Solutions Director Alex Hamerstone joins WWL First News to…

Read about this article
Blog November 18 2025

Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach

Introducing a custom model for understanding privileged roles in Microsoft Entra ID, developed by TrustedSecWhenever our team conducts a Hardening Review of…

Read about this article
Blog November 13 2025

Helpful Hints for Writing (and Editing) Cybersecurity Reports

When it comes to reading (and editing) (and proofreading) technical documents, it's important to remember that the details are key, and can make all the…

Read about this article
Webinars November 12 2025

Purple Team Defense Strategies

Join Senior Security Consultant Sarah Norris and Security Consultant Zach Bevilacqua for a deep dive into how to create action items for a robust defense…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.