Skip to Main Content

Michael Bond

Security Consultant

Michael Bond has worked in offensive security for over four (4) years as an Internal Penetration tester and Consulting Penetration tester. Mike previously worked for a Cisco Value Added Reseller (VAR). He held positions such as Principal Architect and Professional Services Manager, where he designed and implemented Cisco Unified Communications, LAN/WAN/Wireless networks, and security solutions in both large and medium enterprise environments. Mike has over 26 years of IT experience.


  • Associate of Applied Science, Computer Information Technology, Cyber Defense, Tarrant County Junior College
  • Associate of Applied Science, Computer Science, Application
  • Development, Nashville State Community College
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • Certified Information Systems Auditor (CISA)
  • Cisco Certified Internetwork Expert Emeritus (CCIE #17963)


  • DC615
  • Nashville OWASP Chapter

Mike has developed several open source tools such as config-dump and VNUM. He has been a guest speaker for multiple Vanderbilt University Cybersecurity Boot Camps and internal events.

Mike’s passion for security started when he would perform best practice assessments for enterprise networks to find misconfigurations that could lead to a device compromise. This led him to move to offensive security, where he now enjoys compromising networks and providing guidance on how to protect networking devices from compromise.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 06 2023

Cisco Hackery: TcL Proxy

Since moving to an offensive security role, I have always wanted to use SSH port forwarding through a Cisco router during a Penetration Test. However, the SSH…

Read about this article
Blog October 06 2022

Cisco Hackery: How Cisco Configuration Files Can Help Attackers Enumerate Your Network

1.0 Intro Prior to making a career change to offensive security, I spent over 15 years working for a Cisco partner designing and implementing enterprise and…

Read about this article
Training Resources May 02 2024

Actionable Purple Team Simulation Online Training (May 2-3)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Events Kennedy Space Center, Florida | April 10 2024

Hack Space Con 2024

Founder and CEO David Kennedy is the keynote speaker at this year's Hack Space Con! We are also proud to sponsor this event.

Read about this article
Webinars March 06 2024

Ask Me Anything: Securing Defense Contracts Through CMMC Compliance

Join Chris Camejo, Practice Lead, Advisory's Compliance Services, and Rick Yocum, Managing Director of Advisory Services, for an ‘Ask Me Anything’ discussion…

Read about this article
News March 01 2024

Forbes - How This Professional Hacker Built Two Cybersecurity Firms In His 30s

David Kennedy, the CEO and founder of TrustedSec, joins Rosemarie Miller on "New Money" to discuss his pivot from being in the U.S. marines to becoming a…

Read about this article
News February 28 2024

WWL First News - A cyberattack has disrupted prescription drug orders around the country

Advisory Solutions Director Alex Hamerstone spoke with WWL New Orleans about the recent cyberattack that disrupted prescription drug orders around the country.

Read about this article
Events TrustedSec HQ | February 27 2024

ISC2 February Member Meeting 2024

Join us at the TrustedSec HQ for the monthly ISC2 Cleveland Chapter member meeting!

Read about this article
Blog February 27 2024

Weaponization of Token Theft – A Red Team Perspective

This blog is the start of several deep dives into the weaponization of token theft. The focus of this blog will be on conditional access around devices and…

Read about this article
Podcasts February 23 2024

Security Noise - Episode 6.15

OSINT: Digital Detective or Cyber Stalking?

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.