Skip to Main Content

Edwin David

Security Consultant

Edwin David is a Security Consultant with TrustedSec’s Cloud Force team. He has over 20 years’ experience in Information Technology. Prior to joining TrustedSec, Edwin worked in the financial services sector as a System Administrator. He enjoys working on complex problems, and his specializations are Active Directory, Group Policy, and Azure/M365 security.


  • Bachelor of Science, Management Information Systems, Indiana State University
  • Microsoft Certified IT Professional (MCITP) Enterprise Administrator
  • Azure Fundamentals
  • M365 Security Administrator
  • Azure Security Engineer Associate
  • Security Operations Analyst Associate

Indiana InfraGard Member

Edwin’s passion for security developed while working in his previous role at a financial institution. His main focus was on Active Directory design/security engineering and OS Client/Server system hardening. In 2015, his focus shifted towards cloud security. As companies started developing plans for hybrid cloud adoption, he saw an immediate and fundamental need to understand secure cloud adoption methodologies. Edwin also enjoys working with offensive security toolsets to understand the full attack cycle on weaknesses and misconfigurations in different systems.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 13 2023

Hacking Your Cloud: Tokens Edition 2.0

Office and Microsoft 365 tokens can add some interesting dynamics to Azure and Microsoft 365 services penetration testing. There are a few different ways of…

Read about this article
Blog February 21 2023

Top 5 Things That Will Land an Attacker in the Azure Cloud

  1. Misconfigured Cloud Infrastructure What type of misconfigurations can exist in a cloud infrastructure? Vulnerable front-facing webservers, unpatched…

Read about this article
Blog February 09 2023

Azure AD Kerberos Tickets: Pivoting to the Cloud

If you've ever been doing an Internal Penetration test where you've reached Domain Admin status and you have a cloud presence, your entire Azure cloud can…

Read about this article
Blog October 04 2022

Common Conditional Access Misconfigurations and Bypasses in Azure

Conditional Access is widely used in Azure to prevent unauthorized access. When it works, it can shut down attacks, even if the user's password is known.…

Read about this article
Blog April 26 2022

Defending the Gates of Microsoft Azure With MFA

Since Russia’s invasion of Ukraine, companies based in the United States have been on alert for potential cyberattacks on IT infrastructure. Multi-Factor…

Read about this article
Webinars June 22 2022

Penetration Testing Your Cloud Environment

Join Cloud Practice Lead Paul Burkeland and Cloud Security Consultants Edwin David and Patrick Mayo as they review the ins and outs of examining the security…

Read about this article
Webinars June 07 2023

Insecure by Default: The Hidden Complexities of Cloud Security

Join experts from our Cloud Security and Hardening teams to gain practical insights for how to enhance your own cloud security posture.

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Training Resources August 03 2024

Black Hat USA Training - Applied Threat Hunting and Detection Engineering

Registration is now open for our Black Hat training on August 3-6, 2024

Read about this article
Events TrustedSec HQ | June 25 2024

ISC2 Cleveland Chapter Member Meeting June 2024

ISC2 Cleveland Chapter June MeetupCome join us for our April Meetup! Our Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.