Skip to Main Content

Justin Bollinger

Principal Security Consultant

EXPERIENCE
Justin Bollinger is a Principal Security Consultant with a focus on Network Access Control and secure network design. He has over 10 years of industry experience in designing secure networks in the various sectors including Enterprise, Manufacturing, Healthcare, Higher Education, and Retail. Justin's specialties include Enterprise LAN/WAN, LAN to LAN and remote access VPN, and Public Key Infrastructure (PKI). Justin has expert-level knowledge in Cisco security products including Identity Services Engine, ASA next-generation firewalls, Sourcefire IPS, Cloud Web Security, and Ironport WSA and ESA. Aside from His experiences with Cisco Security products, he also has experience with Microsoft and Linux system administration. His level of expertise in certificates, VPNs and firewalls, gives his team an excellent source to turn to for discovering and exploiting weaknesses in often untouched areas of penetration testing, the network infrastructure itself.

EDUCATION & CERTIFICATIONS

  • B.S. Computer Science and Engineering Technology, University of Toledo, College of Engineering
  • Cisco Certified Network Professional (CCNP)
  • Sourcefire Certified Professional (SFCP)
  • Sourcefire SFSE-AMP
  • CNSSI-4013 Certificate
  • NSTISSI-4011 Certificate

PROFESSIONAL AFFILIATIONS
Theta Tau Professional Engineering Fraternity

PASSION FOR SECURITY
Justin started tinkering at a very young age with computers and as early as junior high and was already learning how to crack passwords and bypass other security controls. Learning and understanding how things work has always been a passion and has proven to be very valuable in the security profession.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Events Columbus, OH | May 22 2025

Central Ohio ISSA InfoSec Summit 2025

Come visit us at our booth at COISSA! We are a proud sponsor of this event.

Read about this article
Webinars April 30 2025

Don't Burn Your Money: Top 5 Ways to Maximize Your Next Red Team

Join Targeted Operations Practice Lead Jason Lang and CTO Justin Elze as they go through the best (and worst) things you can do before, during, and after a red…

Read about this article
Events TrustedSec HQ | April 29 2025

ISC2 Cleveland Chapter Member Meeting - April 2025

ISC2 Cleveland Chapter April MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Charlotte, NC | April 27 2025

ILTA EVOLVE 2025

TrustedSec is proud to sponsor ILTA EVOLVE!

Read about this article
Events April 24 2025

Live Discord Event – JS-Tap Demo and Updates

Join us for an exclusive live Discord session on Thursday, April 24 at 11:00AM ET/10:00AM CT with Principal Security Consultant Drew Kirkpatrick (@Hoodoer)!…

Read about this article
Blog April 24 2025

The Necessity of Active Testing – Detection Edition

Most security teams understand the importance of log collection and building detections to provide early indicators of anomalous or potentially malicious…

Read about this article
News April 22 2025

WWL First News - It can be easy to fall victim to an online scam. Here's how to stay safe.

JPSO recently fell victim to a large phishing scam. What IS a phishing scam? Advisory Solutions Director Alex Hamerstone spoke with WWL First News about how…

Read about this article
Blog April 22 2025

How Far Should You Let Penetration Testers Go?

How far should you let penetration testers go once they have a finding or foothold on a penetration test of your organization?As far as they can!The goal is to…

Read about this article
Blog April 17 2025

Discovering Your Baud

I'm still pretty new to hardware hacking and find myself going through a lot of media (both text and moving pictures) about various techniques to interact with…

Read about this article
Webinars April 16 2025

Not in My Domain: Preparing for Your Next Penetration Test

In this webinar, our experts will dig into best practices and common issues they identified during recent penetration testing engagements, the latest attack…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.