Skip to Main Content

Jonathan White

Senior Security Consultant

EXPERIENCE
Jonathan White started his IT career in the United States Marine Corps as a Computer Programmer. After the Marine Corps, he started a job as a Computer Operator and advanced to serve as Manager of the company’s 24 X 7 data center. This is when he realized that providing solutions to issues and customer interaction was his passion. The next step in his career was as a Network Engineering Consultant for one of the national credit bureaus. In this role, he was responsible for the IP network for as many as 14 local offices in the Southern Region.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science in Business and Information Systems
  • Certified Information Security Manager (CISM)
  • Certified Information Systems Auditor (CISA)
  • System Security Certified Practitioner (SSCP)
  • Qualified Security Assessor (QSA)
  • ISO 27001 Lead Auditor

PROFESSIONAL AFFILIATIONS

  • Information Systems Audit and Control Association (ISACA)

PASSION FOR SECURITY
During his tenure at the national credit bureau, he was exposed to various regulatory compliance frameworks, developing an appreciation for the need to protect customers’ personal information. He secured a position with an Application Service Provider company as an IT Security Compliance Auditor responsible for monitoring their control environment and handling areas of both logical and physical security. He served in this capacity for over six years becoming familiar with several compliance frameworks, including SSAE18 SOC 1 and SOC2, ISO 27001, NIST, PCI DSS, and GLBA.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog August 22 2017

GDPR // Five Important Considerations

The EU General Data Protection Regulation (GDPR) is a regulation that was approved in 2016 and scheduled to be enforced by May 25, 2018. Many customers ask,…

Read about this article
Webinars August 25 2021

Cloud Compliance: Picking a Framework and Simplifying Your Approach

Join GRC Principal Security Consultant Chris Camejo and Senior Security Consultant Jonathan White as they help organizations traverse this IT-disrupting shift.

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Join Senior Security Consultant Steven Erwin and Security Consultant Caroline Fenstermacher as they cover the basics of BEC analysis, providing participants…

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Like most red teamers, I spend quite a lot of time looking for novel vulnerabilities that could be used for initial access or lateral movement. Recently, my…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article
Events TrustedSec HQ | November 20 2024

WiCyS Ransomware Panel & Networking Event

Join us for an insightful discussion with the Women in Cyber Security (WiCyS) Northeast Ohio Affiliate members!

Read about this article
Webinars November 20 2024

Navigating Compliance: FCI and CUI Requirements for Federal Contractors

TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for…

Read about this article
News November 19 2024

TrustedSec Tech Brief - November 2024

Director of Security Intelligence Carlos Perez covers vulnerabilities and zero days for November 2024.

Read about this article
Podcasts November 15 2024

Security Noise - Episode 7.6

Ghost in The Machine: Hardware Hacking w/ Rob Simon

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.