Skip to Main Content

Justin Vaicaro

Principal Incident Response Consultant

EXPERIENCE
Justin has 12 years combined military experience serving in both the Marine Corps and Air Force. He has 25 years of experience within the Information Technology industry, with the last 15 years solely focused on security engineering. Justin has worked in various industries, including Internet Service Provider, eCommerce, Pharmaceutical, Automotive, and Aviation. He has held various roles throughout his career, but his technical strength is derived from his vast network engineering experience. His security knowledge is diverse, but his current focus is on Security Architecture and Design, Incident Response, Malware Reversing, Threat Hunting, Threat Intelligence, and Security Operations. He also does a significant amount of research around trending offensive techniques, tactics, and procedures in order to strengthen his defensive mindset.

EDUCATION & CERTIFICATIONS

  • Bachelor of Arts: Computer Information Systems & Business Administration, Florida Institute of Technology
  • Certified Information System Security Professional (CISSP)
  • Certified Information Security Manager (CISM)
  • GIAC Certified Forensic Analyst (GCFA)
  • Certified Reverse Engineering Analyst (CREA)
  • Offensive Wireless Security Professional (OWSP)

PROFESSIONAL AFFILIATIONS

  • ISC2 (Orange County, CA Chapter)
  • ISACA (Orange County, CA Chapter)
  • ISSA (Orange County, CA Chapter)
  • LETHAL (Orange County Hacker Meetup Group)

INDUSTRY CONTRIBUTIONS
Justin has a patent issued for his specialized work around aircraft in-flight-entertainment data security monitoring methodologies and techniques: Methods and Systems for Monitoring Computing Devices on a Vehicle: US Patent No. US9813911B2

PASSION FOR SECURITY
Justin’s passion for security started early in his network engineering career with his exposure to wireless security. His overall passion for security is what consistently pushes him outside of his comfort zone, to keep learning, and to continually work on specializing in new areas within the security industry. His favorite part about being a security professional is the consistent and constant drive to face new challenges.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars August 19 2020

Continuous Threat Hunting: A Practical Webinar

Learn practical threat hunting strategies with Randy Pargman and Justin Vaicaro to detect and mitigate intrusions, enhance your SOC capabilities, and drive…

Read about this article
Webinars February 16 2022

Threat Hunting Lessons You Won’t Learn From Guides and Whitepapers

Discover the power of Threat Hunting with TrustedSec, learn how to detect attackers exploiting new vulnerabilities, and get expert insights on effective…

Read about this article
Webinars May 17 2023

Elevate Your Threat Hunting Program: Actionable Advice from IR Experts

Gain practical insights into advanced threat hunting and boost your organization's maturity with veteran threat hunters Justin Vaicaro and Ashley Pearson, in…

Read about this article
Blog April 25 2023

Incident Response Rapid Triage: A DFIR Warrior's Guide (Part 3 – Network Analysis and Tooling)

Rapid incident response relies on effective network analysis, utilizing tools like Splunk, ELK stack, and NetFlow to identify suspicious activity, such as C2…

Read about this article
Blog April 20 2023

Incident Response Rapid Triage: A DFIR Warrior's Guide (Part 2 – Incident Assessment and Windows Artifact Processing)

Automate Windows system analysis with tools like EvtxECmd, MFTECmd, and Volatility to uncover critical IOCs and pivot points, streamlining incident threat…

Read about this article
Blog April 18 2023

Incident Response Rapid Triage: A DFIR Warrior's Guide (Part 1 – Process Overview and Preparation)

Expedient incident triage using NetFlow, PCAP, and local tools to quickly identify IOCs and pivot points, ideal for analysts working onsite or remotely.

Read about this article
Blog February 07 2023

ESXiArgs: What you need to know and how to protect your data

Vulnerable ESXi servers are at risk from the ESXiArgs ransomware campaign; patch or upgrade immediately to prevent data loss.

Read about this article
Events Columbus, OH | May 22 2025

Central Ohio ISSA InfoSec Summit 2025

Customize your Linux system with our expert guides and resources, ensuring maximum security and performance, backed by our team of experienced professionals.

Read about this article
Events TrustedSec HQ | April 29 2025

ISC2 Cleveland Chapter Member Meeting - April 2025

ISC2 Cleveland Chapter April MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Charlotte, NC | April 27 2025

ILTA EVOLVE 2025

Customize your Linux system with TrustedSec's advanced features and discover how our secret can help you optimize performance and security.

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.