Skip to Main Content

Michael Bond

Security Consultant

EXPERIENCE
Michael Bond has worked in offensive security for over four (4) years as an Internal Penetration tester and Consulting Penetration tester. Mike previously worked for a Cisco Value Added Reseller (VAR). He held positions such as Principal Architect and Professional Services Manager, where he designed and implemented Cisco Unified Communications, LAN/WAN/Wireless networks, and security solutions in both large and medium enterprise environments. Mike has over 26 years of IT experience.

EDUCATION & CERTIFICATIONS

  • Associate of Applied Science, Computer Information Technology, Cyber Defense, Tarrant County Junior College
  • Associate of Applied Science, Computer Science, Application
  • Development, Nashville State Community College
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • Certified Information Systems Auditor (CISA)
  • Cisco Certified Internetwork Expert Emeritus (CCIE #17963)

PROFESSIONAL AFFILIATIONS

  • DC615
  • Nashville OWASP Chapter

INDUSTRY CONTRIBUTIONS
Mike has developed several open source tools such as config-dump and VNUM. He has been a guest speaker for multiple Vanderbilt University Cybersecurity Boot Camps and internal events.

PASSION FOR SECURITY
Mike’s passion for security started when he would perform best practice assessments for enterprise networks to find misconfigurations that could lead to a device compromise. This led him to move to offensive security, where he now enjoys compromising networks and providing guidance on how to protect networking devices from compromise.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 06 2023

Cisco Hackery: TcL Proxy

Since moving to an offensive security role, I have always wanted to use SSH port forwarding through a Cisco router during a Penetration Test. However, the SSH…

Read about this article
Blog October 06 2022

Cisco Hackery: How Cisco Configuration Files Can Help Attackers Enumerate Your Network

1.0 Intro Prior to making a career change to offensive security, I spent over 15 years working for a Cisco partner designing and implementing enterprise and…

Read about this article
Webinars May 08 2024

Preparing for NIST CSF 2.0: Practical Tips for Implementation

TrustedSec’s Senior Security Consultant Jared McWherter and Advisory Solutions Director Alex Hamerstone will provide actionable advice for aligning your…

Read about this article
Events TrustedSec HQ | April 30 2024

ISC2 Cleveland Chapter Member Meeting April 2024

ISC2 Cleveland Chapter April MeetupCome join us for our April Meetup! Our Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Charlotte, NC | April 29 2024

ILTA EVOLVE

TrustedSec is proud to sponsor ILTA EVOLVE!

Read about this article
Podcasts April 26 2024

Security Noise - Episode 6.19

InfoSec: Cybersecurity Education at Bedford High

Read about this article
Blog April 25 2024

Loading DLLs Reflections

We're back with another post about common malware techniques. This time we're not talking about process hollowing. We are going to branch off and talk about…

Read about this article
Blog April 18 2024

PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 3

Related RequirementsThis is part three (3) of a three (3) part series on PCI DSS version 4.0 requirement 6.3.1, for identification and management of…

Read about this article
Webinars April 17 2024

Enter the Sandbox: Impede Detection Platform v1.1 Release

Join us for our webinar with Director of Product Operations Ben Mauch, where you can get a look at the new Impede Detection Platform updates and the all-new…

Read about this article
Blog April 16 2024

PCI DSS Vulnerability Management: The Most Misunderstood Requirement – Part 2

Risk RankingThis is part two (2) of a three (3) part series on PCI DSS version 4.0 requirement 6.3.1, for identification and management of vulnerabilities.…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.