Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

David Boyd

Senior Security Consultant

EXPERIENCE
David is a Security Consultant with 15+ years of experience in the technical industry. He specializes in Network Security and Penetration Testing, Vulnerability Assessments, Wireless Assessments, Physical Security Assessments, Firewall and Router Audits, Social Engineering, Regulatory Compliance, and Network/Systems Engineering. He has worked in various industries including consulting, education, military, retail, government, media, law firms, and hospitals. David started his career as a member of the United States Army and was deployed to Iraq as convoy and convoy security.

EDUCATION & CERTIFICATIONS

  • B.AS in Network Security and Forensics, Fountainhead College of Technology
  • Certified Information Systems Security Professional (CISSP)
  • Offensive Security Certified Professional (OSCP)
  • QSA
  • C|EH, Security+
  • Network+
  • A+
  • NSTISSI-4011
  • CNSSI-4012
  • CNSSI-4013
  • CNSSI-4014
  • NSTISSI-4015
  • CNSSI-4016

PROFESSIONAL AFFILIATIONS

  • East TN ISSA
  • Knoxville InfraGard
  • OWASP Knoxville
  • DC865

PASSION FOR SECURITY
David’s passion for security stems from his desire to help others be more secure. David has always had an interest in making technology do what it wasn’t meant to do. His lifelong passion for security sparked after viewing different films such as Sneakers, Hackers, and WarGames at a young age.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog October 18 2022

Dameware Mini: The Sleeper Hit of 2019?

Discover how to exploit a 4-year-old vulnerability in SolarWinds Dameware Mini Remote Control, and gain footholds on several gigs, with step-by-step guidance…

Read about this article
Blog April 28 2022

NFT Crime: From the Simple to the Ingeniously Simple

Bored Ape Yacht Club NFT theft highlights the growing threat of cryptocurrency scams, including rug pulls, social engineering, and wash trading, posing risks…

Read about this article
Blog February 10 2022

Social Engineering Basics: How to Win Friends and Infiltrate Businesses

Understanding social engineering tactics and how to defend against physical breaches, with expert insights to enhance security awareness and employee…

Read about this article
Events November 20 2025

Discord Livestream: Hunting Deserialization Vulnerabilities With Claude

Join us for an exclusive live Discord presentation and Q&A with Senior Security Consultant James Williams.

Read about this article
Events TrustedSec HQ | November 19 2025

Women in CyberSecurity (WiCyS) NEO - Secure Your Data in the Age of AI

Join WiCyS NEO as they wrap up the year with a grand finale event at the TrustedSec HQ!

Read about this article
Blog November 13 2025

Helpful Hints for Writing (and Editing) Cybersecurity Reports

When it comes to reading (and editing) (and proofreading) technical documents, it's important to remember that the details are key, and can make all the…

Read about this article
Webinars November 12 2025

Purple Team Defense Strategies

Join Senior Security Consultant Sarah Norris and Security Consultant Zach Bevilacqua for a deep dive into how to create action items for a robust defense…

Read about this article
Blog November 06 2025

CMMC Subcontractors and Service Providers

Defense contractors are preparing their systems for the start of the upcoming CMMC rollout but what they may not have considered is how their relationship with…

Read about this article
News November 05 2025

TrustedSec Names Former FBI Unit Chief Ryan Macfarlane as Incident Response Lead

Ryan Macfarlane, with over 20 years of cyber experience at the FBI, has been appointed Incident Response Practice Lead amid the rising wave of sophisticated…

Read about this article
Podcasts November 04 2025

Security Noise - Footprint Discovery for Red Teamers

On this episode of Security Noise, our team discusses footprinting and reconnaissance techniques for red teamers, including identifying a target's online…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.