Skip to Main Content

Jason Lang

Practice Lead, Targeted Operations

EXPERIENCE
With over 15 years of industry experience, Jason Lang has worked in both offensive and defensive roles. Before switching to red teaming, he spent 8 years working as a technical Security Architect for a Fortune 500 company, specializing in Active Directory and .Net/database development. After several years of penetration testing and red teaming, he now manages the Targeted Operations practice at TrustedSec.

EDUCATION & CERTIFICATIONS

  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Experienced Professional (OSEP)

PASSION FOR SECURITY
While Jason truly enjoys contributing to the InfoSec community through both public speaking and the development of new tools, his passion manifests itself in helping clients make changes to their systems (and people) in ways that truly improve their security posture. Oh, and shellz, he loves getting shellz too.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars August 02 2023

Assumed Breach 101: Planning your next offensive engagement

Join Targeted Operations Practice Lead Jason Lang for this one-hour webinar about planning your next offensive engagement.

Read about this article
Webinars October 05 2022

Navigating the “Penetration Testing” Landscape

Expert penetration testing guidance from renowned Targeted Operations experts Melvin Langvik and Jason Lang, discussing objectives and benefits of various…

Read about this article
Blog May 16 2022

Putting the team in red team

TrustedSec's red team consultants are fierce guardians of engagement value, providing thorough testing, detection, and prevention control evaluation, with a…

Read about this article
Blog May 25 2021

A Career in IT: Where Do I Start?

Get started in IT/InfoSec with a clear goal, a strong work ethic, and a willingness to learn and network, leading to a rewarding and in-demand career.

Read about this article
Webinars October 21 2020

Are You Ready for a Red Team?!

Discover the value of a Red Team simulation with renowned experts Justin Elze and Jason Lang, expertly preparing your security stack for real-world threats and…

Read about this article
Blog September 17 2020

Weaponizing Group Policy Objects Access

Use Group Policy to pull down a file from your attack machine to Domain Controllers, leveraging client-side extensions and Admin Tool Extensions to bypass GPO…

Read about this article
Blog July 28 2020

Thycotic Secret Server: Offline Decryption Methodology

Protect sensitive internal password manager data with multi-factor authentication and robust security measures, including hardware security modules for the…

Read about this article
Blog May 28 2020

Automating a RedELK Deployment Using Ansible

Automate your RedELK infrastructure deployment with Ansible, streamlining your red team operations and enhancing visibility with a scalable ELK stack, designed…

Read about this article
Blog April 14 2020

Generating SSH Config Files with Ansible

Generate SSH config files for easy cloud infrastructure connectivity with Ansible using Jinja templates and SSH include statements.

Read about this article
Blog December 05 2019

Red Team Engagement Guide: How an Organization Should React

What a Red Team engagement can teach your organization about security, preparedness, and response, through hands-on testing and real-world stress, to deliver…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.