Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Paul Sems

Managing Director of Remediation Services

EXPERIENCE
Before joining TrustedSec, Paul Sems excelled at leading organizations in technology and executive leadership roles. He is a lifelong hacker with extensive experience assisting a wide range of organizations in meeting technology and security challenges. 

Paul was the senior executive responsible for IT at Vitamix, a manufacturer and marketer of high-end blending products for both the foodservice industry and the consumer market. While at Vitamix, Paul built a world-class IT organization to support a half-billion dollar global enterprise. He initiated and managed the implementation of multiple business solutions that have been the foundation for significant growth and stability within the organization. Under his leadership, the organization selected, implemented, and supported solutions that proved to be a significant business enabler, supporting the massive growth that Vitamix experienced during his 10-year tenure.

At TrustedSec, Paul built and currently leads the Remediation Services team, which focuses on hardening environments before security incidents happen and helping firms remediate issues after a real or simulated breach. The team is focused on providing pragmatic solutions that improve clients' security postures.

EDUCATION & CERTIFICATIONS
Throughout this career, Paul has held other roles, including business owner, CTO, COO, network engineer, and product development engineer. He received a Master of Business Administration degree from Case Western Reserve University and a Bachelor of Science degree in Computer Science from The University of Akron. He is an inventor of U.S. Patent US20160220973A1.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars February 15 2023

Securing Cloud Native Applications With DevSecOps

Discover DevSecOps solutions for securing cloud-native applications, learn from experts Paul Sems and Mitch Parish, and elevate your organization's security…

Read about this article
Webinars June 07 2023

Insecure by Default: The Hidden Complexities of Cloud Security

Join experts from our Cloud Security and Hardening teams to gain practical insights for how to enhance your own cloud security posture.

Read about this article
Webinars August 23 2023

A More Efficient Attack Path Effectiveness Assessment

Understanding risk assessments with FAIR and threat intelligence is crucial for aligning security risk with real-life threats, leveraging TCAP, Attack…

Read about this article
News September 21 2023

Oklahoma's News 4 - Edmond man receives scary threatening phone call scam

Protect yourself from voice cloning scams! Learn actionable tips from TrustedSec's Managing Director of Remediation Services.

Read about this article
Webinars January 19 2022

Defending Backups Against Ransomware

Learn how to defend backups against ransomware, a unique threat targeting backup systems, and discover hands-on best practices to harden your backup…

Read about this article
Blog February 10 2026

Securing Entra ID Administration: Tier 0

Entra ID (formerly Azure AD) is the core service upon which Microsoft 365 applications rely for directory and authentication services. This makes Entra ID…

Read about this article
Blog February 05 2026

Keys to JWT Assessments - From a Cheat Sheet to a Deep Dive

The Cheat Sheet section is for quick reference.The Learn section is for those who have never touched the topic before.The Implement section is for more…

Read about this article
Blog February 03 2026

MCP in Burp Suite: From Enumeration to Targeted Exploitation

MCP-ASD Burp extension has been submitted to the BApp Store and is awaiting approval.MCP OVERVIEWMCP (Model Context Protocol) servers are becoming more common…

Read about this article
Blog January 29 2026

LDAP Channel Binding and LDAP Signing

With Microsoft “enforcing” Lightweight Directory Access Protocol (LDAP) Signing by default in Server 2025, it once again seems like a good time to revisit our…

Read about this article
Blog January 22 2026

Adventures in Primary Group Behavior, Reporting, and Exploitation

If you’ve administered Active Directory (AD) for any significant time, chances are you’ve come across the primaryGroupID attribute. Originally developed as a…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.