Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Kevin Haubris

Senior Research Analyst

EXPERIENCE
Kevin Haubris has 10+ years of experience in Information Security positions for the public and private sectors, focusing on both offensive and defensive security. During this time, he has concentrated mostly on software development, pen testing, adversarial emulation, and reverse engineering.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer and Network Security, Dakota State University

PASSION FOR SECURITY
Kevin has had a passion for security since college, when he started learning exploit development outside of class in his spare time. That started him off on a path to learning about additional complicated topics. Now he enjoys solving difficult problems, spending time in a disassembler, and loves learning how different binaries work.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog May 04 2022

ELFLoader: Another In Memory Loader Post

This project enables cross-platform ELF loading for Linux, Mac, and Windows, leveraging OS-specific libraries and Cobalt Strike internal functions for a…

Read about this article
Blog February 22 2021

COFFLoader: Building your own in memory loader or how to run BOFs

Create a generic in-memory loader for various executable file formats, including COFF, ELF, Mach-O, and PE, with built-in beacon compatibility.

Read about this article
Blog January 07 2020

SELinux and Auditd

Understanding SELinux and Auditd: A Quick Introduction to Enhancing Linux Security.

Read about this article
Blog September 18 2018

Linux: How's My Memory

Detecting In-Memory Shared Objects with Native Tools.

Read about this article
Blog April 26 2018

Malware: Linux, Mac, Windows, Oh My!

Detect and prevent Linux malware and backdoors with these 8 common checks, including verifying binaries, package files, raw sockets, and SSH access, to keep…

Read about this article
Webinars January 14 2026

Tips for Incident Response Planning: Prepare Before Crisis Strikes

During our next webinar, our Incident Response experts will cover what organizations should do to prepare so they can respond quickly and be on the way to…

Read about this article
Business Resources December 30 2025

Inside the Modern Red Team: How Attackers Think, and What Defenders Miss

Discover how modern Red Teams think like attackers, what defenders often miss, and how to strengthen your cybersecurity posture.

Read about this article
Blog December 18 2025

Limiting Domain Controller Attack Surface: Why Less Services, Less Software, Less Agents = Less Exposure

Before we dive in, let’s get all the TrustedSec Certified Absolutes out of the way:All software presents some level of inherent risk.Only required software…

Read about this article
News December 17 2025

News 5 Cleveland - Elyria Police responded to a reported restaurant robbery. But it was actually an AI prank.

AI quality is evolving rapidly, making it easier than ever to create convincing fakes from a phone. Advisory Solutions Director Alex Hamerstone spoke with News…

Read about this article
Blog December 16 2025

Top 10 Blogs of 2025

Everyone has a year-end list, and this is ours. See what our top-performing cybersecurity blogs were in 2025, there could be some you might have missed!

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.