Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Jeff Pergal

Technical Solutions Director

EXPERIENCE
Jeff Pergal has 30+ years of experience in IT and security, from startups to Fortune 500 organizations. 

Jeff is a security consultant with more than 15 years of experience in the Information Security field. He most recently developed and matured a large team of security technologists at a Fortune 500 company responsible for adversarial simulation, threat hunting, detection engineering, deception technologies, and threat intelligence. Jeff and his teams pioneered approaches to decreasing active threat resolution from multiple days to a 15-minute average resolution time.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science in Business Administration, Marketing, with a concentration in Information Systems, Valparaiso University
  • Certified Information Systems Security Professional (CISSP)
  • AWS Certified Cloud Practitioner (AWS CCP)

PROFESSIONAL AFFILIATIONS

  • Adjunct Instructor, Madison College, IT and security areas for over 20 years
  • Speaker at various security and technology-focused national conferenceshttps://security-storm.com[GF1] 
  • Member of InfraGard

PASSION FOR SECURITY
Jeff is on a quest to help organizations of all sizes improve their security posture, foster security cultures, and build strong, high-functioning teams. He also has a deep understanding of and empathy for the complexity of balancing priorities, resources, budgets, and other obstacles that sometimes make these things a challenge for many organizations.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars November 12 2025

Purple Team Defense Strategies

Join Senior Security Consultant Sarah Norris and Security Consultant Zach Bevilacqua for a deep dive into how to create action items for a robust defense…

Read about this article
Events TrustedSec HQ | October 28 2025

ISC2 Cleveland Chapter Member Meeting - October 2025

ISC2 Cleveland Chapter October MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Blog October 28 2025

Hack-cessibility: When DLL Hijacks Meet Windows Helpers

In preparation for a talk, Jason Lang (@curi0usJack) and I were doing at MCTTP about mining TTPs from VX-underground, we both ended up doing research based on…

Read about this article
Events Lake Buena Vista, FL | October 27 2025

InfoSecWorld 2025

TrustedSec is proud to sponsor and hold a workshop at this year's InfoSec World in Lake Buena Vista, Florida. Make sure to visit our booth if you'll be there!

Read about this article
Training Resources October 25 2025

InfoSec World Workshop - Adversary Tactics and Threat Hunting

This immersive workshop will train you to simulate attacks, hunt threats, and build detections using manual, automated, and AI-driven methods across network…

Read about this article
Podcasts October 24 2025

Security Noise - CON Men: Wild West Hackin' Fest + GrrCON

On this episode of Security Noise, we are discussing two of our favorite cybersecurity conferences Wild West Hackin' Fest and GrrCON! Our team presented at…

Read about this article
Events October 23 2025

Discord Livestream - Titanis Tool Demo

Join us on Discord for a tool demo of Titanis! Titanis is a library of protocol implementations and command line utilities, written in C#, for interacting with…

Read about this article
News October 23 2025

Nasdaq TradeTalks - How AI Is Changing the Underground Cybercrime Economy

The cyber world is seeing a new arms race as AI powers the latest wave of Crimeware-as-a-Service. Director of Security Intelligence Carlos Perez stresses that…

Read about this article
Events Provo, Utah | October 21 2025

SAINTCON 2025

We are proud to sponsor and have a booth at this year's SAINTCON!

Read about this article
Blog October 21 2025

Detecting Password-Spraying in Entra ID Using a Honeypot Account

Password-spraying is a popular technique which involves guessing passwords to gain control of accounts. This automated password-guessing is performed against…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.