Skip to Main Content

Michael Bond

Security Consultant

EXPERIENCE
Michael Bond has worked in offensive security for over four (4) years as an Internal Penetration tester and Consulting Penetration tester. Mike previously worked for a Cisco Value Added Reseller (VAR). He held positions such as Principal Architect and Professional Services Manager, where he designed and implemented Cisco Unified Communications, LAN/WAN/Wireless networks, and security solutions in both large and medium enterprise environments. Mike has over 26 years of IT experience.

EDUCATION & CERTIFICATIONS

  • Associate of Applied Science, Computer Information Technology, Cyber Defense, Tarrant County Junior College
  • Associate of Applied Science, Computer Science, Application
  • Development, Nashville State Community College
  • Offensive Security Certified Professional (OSCP)
  • Offensive Security Wireless Professional (OSWP)
  • Certified Information Systems Auditor (CISA)
  • Cisco Certified Internetwork Expert Emeritus (CCIE #17963)

PROFESSIONAL AFFILIATIONS

  • DC615
  • Nashville OWASP Chapter

INDUSTRY CONTRIBUTIONS
Mike has developed several open source tools such as config-dump and VNUM. He has been a guest speaker for multiple Vanderbilt University Cybersecurity Boot Camps and internal events.

PASSION FOR SECURITY
Mike’s passion for security started when he would perform best practice assessments for enterprise networks to find misconfigurations that could lead to a device compromise. This led him to move to offensive security, where he now enjoys compromising networks and providing guidance on how to protect networking devices from compromise.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog April 06 2023

Cisco Hackery: TcL Proxy

Since moving to an offensive security role, I have always wanted to use SSH port forwarding through a Cisco router during a Penetration Test. However, the SSH…

Read about this article
Blog October 06 2022

Cisco Hackery: How Cisco Configuration Files Can Help Attackers Enumerate Your Network

1.0 Intro Prior to making a career change to offensive security, I spent over 15 years working for a Cisco partner designing and implementing enterprise and…

Read about this article
Events Mesa, AZ | February 14 2025

CactusCon 2025

TrustedSec is proud to sponsor and have a booth at CactusCon this year! Three of our consultants will be giving talks as well.

Read about this article
Webinars February 11 2025

2024 Conference Roundup

Join our panelists David Kennedy, Justin Elze, Jason Lang, and Oddvar Moe for their firsthand accounts and perspectives on what people were talking about at…

Read about this article
Blog February 11 2025

From RAGs to Riches: Using LLMs and RAGs to Enhance Your Ops

1.1      IntroductionIn this blog, I will explore Retrieval-Augmented Generation (RAG) and how it can be applied to research capabilities. RAG is a framework…

Read about this article
Blog February 06 2025

The Hidden Trap in the PCI DSS SAQ A Changes

The Payment Card Industry Security Standards Council (PCI SSC) just announced a change to Self Assessment Questionnaire A (SAQ A). The change eliminates two…

Read about this article
Podcasts February 04 2025

Security Noise - Episode 7.10

Authentication in 2025

Read about this article
Blog January 23 2025

Operating Inside the Interpreted: Offensive Python

IntroductionEvery once in a while, I get the urge to go back and revisit older techniques that used to be popular but have fallen out of favor with the…

Read about this article
News January 21 2025

TrustedSec Tech Brief - January 2025

Carlos Perez walks us through several major vulnerabilities and patches from early January 2025, including a critical Fortinet FortiGate zero-day vulnerability.

Read about this article
Podcasts January 17 2025

Security Noise - Episode 7.9

On this episode of the Security Noise Podcast, we discuss user enumeration on Azure and "presence data" in Microsoft Teams with nyxgeek.

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.