Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Jonathan White

Senior Security Consultant

EXPERIENCE
Jonathan White started his IT career in the United States Marine Corps as a Computer Programmer. After the Marine Corps, he started a job as a Computer Operator and advanced to serve as Manager of the company’s 24 X 7 data center. This is when he realized that providing solutions to issues and customer interaction was his passion. The next step in his career was as a Network Engineering Consultant for one of the national credit bureaus. In this role, he was responsible for the IP network for as many as 14 local offices in the Southern Region.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science in Business and Information Systems
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • System Security Certified Practitioner (SSCP)
  • Qualified Security Assessor (QSA)
  • ISO 27001 Lead Auditor

PROFESSIONAL AFFILIATIONS

  • Information Systems Audit and Control Association (ISACA)

PASSION FOR SECURITY
During his tenure at the national credit bureau, he was exposed to various regulatory compliance frameworks, developing an appreciation for the need to protect customers’ personal information. He secured a position with an Application Service Provider company as an IT Security Compliance Auditor responsible for monitoring their control environment and handling areas of both logical and physical security. He served in this capacity for over six years becoming familiar with several compliance frameworks, including SSAE18 SOC 1 and SOC2, ISO 27001, NIST, PCI DSS, and GLBA.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog August 22 2017

GDPR // Five Important Considerations

Understand GDPR: Discover how to strengthen individual rights, protect personal data, and comply with EU regulations, with expert guidance and resources.

Read about this article
Webinars August 25 2021

Cloud Compliance: Picking a Framework and Simplifying Your Approach

Join GRC Principal Security Consultant Chris Camejo and Senior Security Consultant Jonathan White as they help organizations traverse this IT-disrupting shift.

Read about this article
Events December 04 2025

Research on Windows Accessibility: Narrator.exe

Join us for our next Discord Livestream "Research on Windows Accessibility: Narrator.exe" on December 4 at 11:00AM ET! During this exclusive session, Principal…

Read about this article
Webinars December 03 2025

NIST CSF 2.0 - From Compliance to Confidence

During our next webinar, our experts will cover the latest evolution of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF),…

Read about this article
Events November 20 2025

Discord Livestream: Hunting Deserialization Vulnerabilities With Claude

Join us for an exclusive live Discord presentation and Q&A with Senior Security Consultant James Williams.

Read about this article
Events TrustedSec HQ | November 19 2025

Women in CyberSecurity (WiCyS) NEO - Secure Your Data in the Age of AI

Join WiCyS NEO as they wrap up the year with a grand finale event at the TrustedSec HQ!

Read about this article
Podcasts November 19 2025

Security Noise - C2 for Me + You

Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. Listen…

Read about this article
News November 19 2025

WWL First News with Tommy Tucker - Websites and apps are tracking your data. Here's what you need to know

Ever wonder what happens to your data when you use a website, app, or make a purchase? Advisory Solutions Director Alex Hamerstone joins WWL First News to…

Read about this article
Blog November 18 2025

Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach

Introducing a custom model for understanding privileged roles in Microsoft Entra ID, developed by TrustedSecWhenever our team conducts a Hardening Review of…

Read about this article
Blog November 13 2025

Helpful Hints for Writing (and Editing) Cybersecurity Reports

When it comes to reading (and editing) (and proofreading) technical documents, it's important to remember that the details are key, and can make all the…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.