Skip to Main Content

Costa Petros

Senior Security Consultant

EXPERIENCE
Costa Petros began his IT career by covering many facets from the ground up. While in college studying construction management, Costa’s ability to communicate, problem-solve, and collaborate awarded him his first job in IT as a dial-up Internet technical support representative.

As his career progressed, he worked his way up through technical and operational support, PC and IT infrastructure administration, compliance, and consulting roles. Costa held a position as an IT administrator at a branch of a publicly traded company that focused on reselling both Cisco and security services. Costa’s communication skills, technical aptitude, and ‘security-first’ approach opened the door to becoming a penetration tester consultant. As a penetration tester at TrustedSec, Costa specializes in social engineering and physical security assessments. He approaches his work with a ‘hope for the best, prepare for the worst’ mentality.

EDUCATION & CERTIFICATIONS

  • GIAC Penetration Tester (GPEN)
  • Microsoft Certified Professional (MCP)
  • VMware VCA-DCV

PROFESSIONAL AFFILIATIONS

  • InfraGard Northern Ohio Chapter

INDUSTRY CONTRIBUTIONS

  • DerbyCon staff and security, 2017-19

PASSION FOR SECURITY
Costa’s passion for security was evoked at a young age. Growing up in the family takeout business, Costa was taught to protect what you have. This meant locking up at all hours of the day at the family business and at home. As a kid, running in and out of the house was frustrating when he found the doors locked. It didn’t take long for him to find other ways into the house, sometimes climbing onto the roof to bypass a window lock. A curious boy, Costa constantly took apart household items in order to fix, understand, and improve them. This curiosity, his ‘prepare for the worst’ mentality, and ‘protect what you have’ focus drive him to understand and further advance secure implementations.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 19 2018

It Was the "Summerof2018" - Password Auditing for Windows Administrators

You can audit your Windows domain to identify weak passwords, such as Summer2018 or , and mitigate password spraying by extracting and cracking NTLM hashes…

Read about this article
Events TrustedSec HQ | May 27 2025

ISC2 Cleveland Chapter Member Meeting - May 2025

ISC2 Cleveland Chapter May MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Columbus, OH | May 22 2025

Central Ohio ISSA InfoSec Summit 2025

Come visit us at our booth at COISSA! We are a proud sponsor of this event.

Read about this article
Webinars May 21 2025

Attack and Defense: Hard-Won Insights From Purple Team Operations

Join Security Consultants Mike Spitzer, Zach Bevilacqua, and Travis Steadman to learn how to navigate what comes next after your Purple Team engagement.

Read about this article
Events Hyatt Centric - New Orleans | May 16 2025

NolaCon 2025

We are proud to sponsor and have a booth at this year's NolaCon!

Read about this article
Events May 15 2025

NEO ISACA Annual General Meeting & Presentation

Founder and CEO David Kennedy and Advisory Solutions Director Alex Hamerstone will be speaking at the annual ISACA Northeast Ohio Chapter meeting in…

Read about this article
Podcasts May 12 2025

Security Noise - Episode 7.16

In this episode of Security Noise, we talk with Senior Research Analyst Alex Ball about his new open-source tool DIT Explorer. Watch it now to learn what it…

Read about this article
Blog May 08 2025

I Got 99 Problems But a Log Ain’t One

1.1 IntroductionHere at TrustedSec, one of the goals of the Tactical Awareness & Countermeasures (TAC) team is to assess and enhance our partners' security…

Read about this article
Blog May 06 2025

Application Layer Encryption with Web Crypto API

OverviewIn web and mobile applications, we’ve been fortunate over the years to have such widespread use of HTTPS by way of TLS. The proliferation of HTTPS is…

Read about this article
Blog May 01 2025

Why the WAF

In my experience, most organizations are prepared to discuss the scope of penetration tests when preparing for an External or Internal Penetration Test, but…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.