Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

James Williams

Senior Security Consultant

EXPERIENCE
James started his career as a software developer and worked across a range of different industry sectors before moving into an information security role. He has spent the last 8 years in offensive security, with the latter half of that time spent delivering Red Team engagements.

EDUCATION & CERTIFICATIONS

  • Masters of Science: Computer Systems (Bangor University)
  • Offensive Security Certified Professional (OSCP)
  • Certified Red Team Operator (CRTO)

INDUSTRY CONTRIBUTIONS
James has presented at conferences in the United Kingdom (BSides Manchester and Steelcon) and often publishes research on employer blogs and personal blogs.  

PASSION FOR SECURITY
James has been fascinated by computers since he first broke the family PC and had to learn how to fix it in a hurry. Now, he enjoys finding new and unusual ways to make computers do things that they weren’t meant to do.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog June 12 2025

Hunting Deserialization Vulnerabilities With Claude

In this post, we are going to look at how we can find zero-days in .NET assemblies using Model Context Protocol (MCP).SetupBefore we can start vibe hacking, we…

Read about this article
Blog June 03 2025

Teaching a New Dog Old Tricks - Phishing With MCP

As AI evolves with MCP, can a new “dog” learn old tricks? In this blog, we test Claude AI’s ability to craft phishing pretexts—and just how much effort it…

Read about this article
Blog October 17 2024

Spec-tac-ula Deserialization: Deploying Specula with .NET

This post explains how.NET deserialization can be used to backdoor a workstation with Specula, making it a valuable resource for Red Team operations.

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Discovering a Deserialization Vulnerability in LINQPad, written by James Williams, reveals a novel deserialization vulnerability in a.NET application with over…

Read about this article
Events TrustedSec HQ | October 28 2025

ISC2 Cleveland Chapter Member Meeting - October 2025

ISC2 Cleveland Chapter October MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Lake Buena Vista, FL | October 27 2025

InfoSecWorld 2025

TrustedSec is proud to sponsor and hold a workshop at this year's InfoSec World in Lake Buena Vista, Florida. Make sure to visit our booth if you'll be there!

Read about this article
Training Resources October 25 2025

InfoSec World Workshop - Adversary Tactics and Threat Hunting

This immersive workshop will train you to simulate attacks, hunt threats, and build detections using manual, automated, and AI-driven methods across network…

Read about this article
Events October 23 2025

Discord Livestream - Titanis Tool Demo

Join us on Discord for a tool demo of Titanis! Titanis is a library of protocol implementations and command line utilities, written in C#, for interacting with…

Read about this article
Events Provo, Utah | October 21 2025

SAINTCON 2025

We are proud to sponsor and have a booth at this year's SAINTCON!

Read about this article
News October 17 2025

Schwab Network - Cybersecurity "Here to Stay:" Companies See Greater Spend as Risks Increase

The cybersecurity trend is "Here to Stay." Advisory Solutions Director Alex Hamerstone joins Schwab Network to explain how risk from A.I. and the shift toward…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.