Skip to Main Content

Matt Andreko

Senior Security Consultant

EXPERIENCE
Matt has been working in Information Technology for 20 years. In a former life, Matt spent many years working at a tiny local Internet Service Provider, learning everything he could about various network protocols, hardware devices, and thinking outside the box in the days before Google. Eventually, he ended up as a software developer, writing code to automate processes and solve all of life’s problems. Using this skillset, he was able to find a new home in the security industry, writing custom tools, and solving complex problems often faced by security professionals.

EDUCATION & CERTIFICATIONS

  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Certified Expert (OSCE)

PASSION FOR SECURITY
Matt really enjoys puzzles and figuring out how things work. As a young child, he would take apart all the electronics in the house and put them back together. This sense of curiosity and the thirst for knowledge really drives him. In the more recent years, Matt has started mentoring students who show promise with security but lack a sense of direction.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars October 30 2024

Ask Me Anything: Advanced Cloud Pen Testing Scenarios

Cloud Penetration Tests are a critical component of cloud security, but integrating other testing methods can take the assessment to the next level. Adding…

Read about this article
Blog October 22 2024

Offensively Groovy

On a recent red team engagement, I was able to compromise the Jenkins admin user via retrieving the necessary components and decrypting credentials.xml. From…

Read about this article
Podcasts October 18 2024

Security Noise - Episode 7.4

Who's On My Network?

Read about this article
Blog October 17 2024

Spec-tac-ula Deserialization: Deploying Specula with .NET

Earlier this year, I gave a talk at Steelcon on .NET deserialization and how it can be used for Red Team ops. That talk focused on the theory of .NET…

Read about this article
Webinars October 16 2024

Calculating Business Impact

In today’s digital landscape, gaining a deep understanding of how cybersecurity threats can affect business-critical systems is crucial for maintaining…

Read about this article
Blog October 15 2024

Let’s Clone a Cloner - Part 2: You Have No Power Here

Previously on Let's Clone a Cloner, I needed a long-range RFID badge cloner. There are many walkthroughs out there on how to build a cloner that are fantastic,…

Read about this article
Events Deadwood, SD | October 09 2024

Wild West Hackin' Fest 2024

TrustedSec is happy to return as a sponsor for Wild West Hackin' Fest in 2024! Visit us at our booth at the Deadwood Mountain Grand. Principal Security…

Read about this article
News October 09 2024

Miami Herald - Why are pro-Trump posts popping on a Haitian-American Facebook page? It’s been hacked

A Haitian-American Facebook page with nearly 500k followers was hacked using a sophisticated phishing scam which began with an invitation to a podcast…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.