Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Nick Doerner

Security Consultant

EXPERIENCE
Nick Doerner is a security consultant with over seven years of experience in penetration testing and social engineering. This experience has allowed Nick to work with a number of organizations in the medical and financial sectors to help secure their networks against malicious threats.

EDUCATION & CERTIFICATIONS

  • Associate of Science: Computer Forensic Sciences, Onondaga Community College
  • Bachelor of Science: Cybersecurity, Utica University
  • Master of Science: Cybersecurity, Utica University
  • Certified Ethical Hacker (CEH)

INDUSTRY CONTRIBUTIONS
Nick is a Red Team member for CNY Hackathon, a small hacking challenge oriented towards student education in central New York. He is also a Red Team member for the C2Games national cybersecurity competition. Nick has spoken at different conferences such as Layer8Con and BSidesRoc.

PASSION FOR SECURITY
Nick’s passion for security stems from bypassing security features on his high school’s network. He has always had a passion for learning new tools and techniques while trying to think like the bad guys. His number one objective is to aid in the overall security of his clients.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog January 18 2023

Major Conference Roundup: Perspectives from Defcon, RSA, Black Hat, Gartner, and more!

The 2022 conference schedule ramped up in the second half of the year, and as you might expect, TrustedSec both attended and spoke at many of them. Within our…

Read about this article
Webinars January 19 2023

2022 Major Conference Roundup: Identifying Trends for 2023

Join TrustedSec panelists David Kennedy, Founder & Chief Hacking Officer; Alex Hamerstone, Advisory Solutions Director; and Nick Doerner, Penetration Testing…

Read about this article
Events December 04 2025

Research on Windows Accessibility: Narrator.exe

Join us for our next Discord Livestream "Research on Windows Accessibility: Narrator.exe" on December 4 at 11:00AM ET! During this exclusive session, Principal…

Read about this article
Webinars December 03 2025

NIST CSF 2.0 - From Compliance to Confidence

During our next webinar, our experts will cover the latest evolution of the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF),…

Read about this article
News November 25 2025

Schwab Network | Morning Movers - Zscaler (ZS) Earnings Preview and Cybersecurity Outlook

Advisory Solutions Director Alex Hamerstone joins Morning Movers to preview Zscaler (ZS) earnings and discuss the overall cybersecurity software space. He…

Read about this article
Events November 20 2025

Discord Livestream: Hunting Deserialization Vulnerabilities With Claude

Join us for an exclusive live Discord presentation and Q&A with Senior Security Consultant James Williams.

Read about this article
Events TrustedSec HQ | November 19 2025

Women in CyberSecurity (WiCyS) NEO - Secure Your Data in the Age of AI

Join WiCyS NEO as they wrap up the year with a grand finale event at the TrustedSec HQ!

Read about this article
Podcasts November 19 2025

Security Noise - C2 for Me + You

Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. Listen…

Read about this article
News November 19 2025

WWL First News with Tommy Tucker - Websites and apps are tracking your data. Here's what you need to know

Ever wonder what happens to your data when you use a website, app, or make a purchase? Advisory Solutions Director Alex Hamerstone joins WWL First News to…

Read about this article
Blog November 18 2025

Managing Privileged Roles in Microsoft Entra ID: A Pragmatic Approach

Introducing a custom model for understanding privileged roles in Microsoft Entra ID, developed by TrustedSecWhenever our team conducts a Hardening Review of…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.