Skip to Main Content

Philip DuBois

Security Consultant II

EXPERIENCE
Philip DuBois brings over 20 years of wide-ranging IT experience to TrustedSec, including perimeter & internal security, incident & DR recovery, vulnerability management, network architecture, hyper-converged infrastructure, database & systems architecture, and cloud design & migration. Philip has worked in a variety of sectors, including public finance, private distribution & logistics, state government, and military defense contracting.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer Science, Computer Information Systems minor, West Texas A&M University

PROFESSIONAL AFFILIATIONS
OWASP, Oklahoma City Chapter (Member)

PASSION FOR SECURITY
Philip’s security passion has grown steadily over his lengthy career. His IT journey began in Department of Defense contracting and then migrated to state government contracting, private sector logistics, and finance InfoSec. He has had a direct hand in the development, auditing, and operation of multiple complex IT systems. As a direct result, Philip has witnessed many security successes and failures across a wide variety of technologies and sectors. He has remediated and performed root-cause/corrective action for multiple enterprise security incidents, as well as observed their long-term impact and effectiveness. He brings this experience, along with the desire to help others harden and secure their IT, ultimately reducing threats and decreasing security incidents.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Events Deadwood, SD | October 09 2024

Wild West Hackin' Fest 2024

TrustedSec is happy to return as a sponsor for Wild West Hackin' Fest in 2024! Visit us at our booth at the Deadwood Mountain Grand. Principal Security…

Read about this article
Events Pittsburgh, PA | October 03 2024

Three Rivers Information Security Symposium (TRISS) 2024

TrustedSec is proud to be a sponsor for TRISS 2024! Three Rivers Information Security Symposium (TRISS) is a Pittsburgh area information technology and…

Read about this article
Events Grand Rapids, MI | September 26 2024

GrrCON 2024

TrustedSec is excited to attend GrrCON this year in Grand Rapids, Michigan! GrrCON Cyber Security Summit and Hacker Conference is put together to provide the…

Read about this article
Webinars September 25 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Events Lake Buena Vista, FL | September 24 2024

InfoSecWorld 2024

TrustedSec is proud to sponsor and hold a two-day training at this year's InfoSec World in Lake Buena Vista, Florida. Make sure to visit our booth if you'll be…

Read about this article
Events Columbus, OH | September 19 2024

BSides Columbus 2024

TrustedSec is proud to sponsor this year's BSides Columbus, held at BrewDog in Columbus, Ohio! On September 19, IR Practice Lead Tyler Hudak and Security…

Read about this article
Events Atlanta, GA | September 14 2024

BSides Atlanta 2024

TrustedSec is proud to sponsor and have a booth at BSides Atlanta at the KSU Center in Kennesaw, GA on September 14, 2024.

Read about this article
Blog September 12 2024

Putting Our Hooks Into Windows

We're back with another post about common malware techniques. This time we are talking about setting Windows hooks. This is a simple technique that can be used…

Read about this article
News September 09 2024

TrustedSec Tech Brief - Week of September 2, 2024

The new Tech Brief is out now! This week, Director of Security Intelligence Carlos Perez covers Revival Hijack, a PyPI hijack technique exploited in the wild …

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.