Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Edwin David

Senior Security Consultant

EXPERIENCE
Edwin David is a Security Consultant with TrustedSec’s Cloud Force team. He has over 20 years’ experience in Information Technology. Prior to joining TrustedSec, Edwin worked in the financial services sector as a System Administrator. He enjoys working on complex problems, and his specializations are Active Directory, Group Policy, and Azure/M365 security.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Management Information Systems, Indiana State University
  • Microsoft Certified IT Professional (MCITP) Enterprise Administrator
  • Azure Fundamentals
  • M365 Security Administrator
  • Azure Security Engineer Associate
  • Security Operations Analyst Associate

PROFESSIONAL AFFILIATIONS
Indiana InfraGard Member

PASSION FOR SECURITY
Edwin’s passion for security developed while working in his previous role at a financial institution. His main focus was on Active Directory design/security engineering and OS Client/Server system hardening. In 2015, his focus shifted towards cloud security. As companies started developing plans for hybrid cloud adoption, he saw an immediate and fundamental need to understand secure cloud adoption methodologies. Edwin also enjoys working with offensive security toolsets to understand the full attack cycle on weaknesses and misconfigurations in different systems.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 13 2023

Hacking Your Cloud: Tokens Edition 2.0

Access compromised Azure credentials to bypass MFA, gain OWA access, and conduct cloud penetration testing using stolen refresh tokens and Burp Suite Pro.

Read about this article
Blog February 21 2023

Top 5 Things That Will Land an Attacker in the Azure Cloud

Unprotected cloud environments can pose significant threats to your company reputation, data, and applications, requiring robust security measures and regular…

Read about this article
Blog February 09 2023

Azure AD Kerberos Tickets: Pivoting to the Cloud

Compromising an Azure cloud presence via machine account SSO is possible, allowing attackers to impersonate any account without MFA, using compromised service…

Read about this article
Blog October 04 2022

Common Conditional Access Misconfigurations and Bypasses in Azure

Conditional Access configurations in Azure prevent unauthorized access, but common misconfigurations and bypasses can occur, leading to security risks,…

Read about this article
Blog April 26 2022

Defending the Gates of Microsoft Azure With MFA

As a cloud penetration tester, I share my expertise on bypassing Multi-Factor Authentication (MFA) in Azure and provide guidance on securing it with…

Read about this article
Webinars June 22 2022

Penetration Testing Your Cloud Environment

Discover how to validate cloud security with expert Paul Burkeland and team, exploring cloud attack surfaces, traditional vs. cloud penetration tests, and…

Read about this article
Webinars June 07 2023

Insecure by Default: The Hidden Complexities of Cloud Security

Join experts from our Cloud Security and Hardening teams to gain practical insights for how to enhance your own cloud security posture.

Read about this article
Events December 04 2025

Research on Windows Accessibility: Narrator.exe

Join us for our next Discord Livestream "Research on Windows Accessibility: Narrator.exe" on December 4 at 11:00AM ET! During this exclusive session, Principal…

Read about this article
Webinars December 03 2025

NIST CSF 2.0 - From Compliance to Confidence

During our next webinar, our experts will cover the latest evolution of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF),…

Read about this article
Events November 20 2025

Discord Livestream: Hunting Deserialization Vulnerabilities With Claude

Join us for an exclusive live Discord presentation and Q&A with Senior Security Consultant James Williams.

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.