Skip to Main Content

Edwin David

Security Consultant

EXPERIENCE
Edwin David is a Security Consultant with TrustedSec’s Cloud Force team. He has over 20 years’ experience in Information Technology. Prior to joining TrustedSec, Edwin worked in the financial services sector as a System Administrator. He enjoys working on complex problems, and his specializations are Active Directory, Group Policy, and Azure/M365 security.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Management Information Systems, Indiana State University
  • Microsoft Certified IT Professional (MCITP) Enterprise Administrator
  • Azure Fundamentals
  • M365 Security Administrator
  • Azure Security Engineer Associate
  • Security Operations Analyst Associate

PROFESSIONAL AFFILIATIONS
Indiana InfraGard Member

PASSION FOR SECURITY
Edwin’s passion for security developed while working in his previous role at a financial institution. His main focus was on Active Directory design/security engineering and OS Client/Server system hardening. In 2015, his focus shifted towards cloud security. As companies started developing plans for hybrid cloud adoption, he saw an immediate and fundamental need to understand secure cloud adoption methodologies. Edwin also enjoys working with offensive security toolsets to understand the full attack cycle on weaknesses and misconfigurations in different systems.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 13 2023

Hacking Your Cloud: Tokens Edition 2.0

Office and Microsoft 365 tokens can add some interesting dynamics to Azure and Microsoft 365 services penetration testing. There are a few different ways of…

Read about this article
Blog February 21 2023

Top 5 Things That Will Land an Attacker in the Azure Cloud

  1. Misconfigured Cloud Infrastructure What type of misconfigurations can exist in a cloud infrastructure? Vulnerable front-facing webservers, unpatched…

Read about this article
Blog February 09 2023

Azure AD Kerberos Tickets: Pivoting to the Cloud

If you've ever been doing an Internal Penetration test where you've reached Domain Admin status and you have a cloud presence, your entire Azure cloud can…

Read about this article
Blog October 04 2022

Common Conditional Access Misconfigurations and Bypasses in Azure

Conditional Access is widely used in Azure to prevent unauthorized access. When it works, it can shut down attacks, even if the user's password is known.…

Read about this article
Blog April 26 2022

Defending the Gates of Microsoft Azure With MFA

Since Russia’s invasion of Ukraine, companies based in the United States have been on alert for potential cyberattacks on IT infrastructure. Multi-Factor…

Read about this article
Webinars June 22 2022

Penetration Testing Your Cloud Environment

Join Cloud Practice Lead Paul Burkeland and Cloud Security Consultants Edwin David and Patrick Mayo as they review the ins and outs of examining the security…

Read about this article
Webinars June 07 2023

Insecure by Default: The Hidden Complexities of Cloud Security

Join experts from our Cloud Security and Hardening teams to gain practical insights for how to enhance your own cloud security posture.

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars October 16 2024

Calculating Business Impact

In today’s digital landscape, gaining a deep understanding of how cybersecurity threats can affect business-critical systems is crucial for maintaining…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.