Skip to Main Content

Sarah Norris

Senior Security Consultant

EXPERIENCE
Sarah Norris is a Security Consultant for TrustedSec. Sarah is starting her career in Information Security after conducting PCI audits for Trustwave. Before Trustwave, Sarah worked on Linux systems writing and debugging custom Python modules for Zenoss, the open source network monitoring software.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Cybersecurity, Utica College
  • Certified Information Systems Security Professional (CISSP)

PROFESSIONAL AFFILIATIONS
Sarah Norris is a member of AHA (Austin Hackers Anonymous), Austin 2600, and lolctf.

PASSION FOR SECURITY
Sarah became interested in information security shortly after starting college. She realized that there was nothing more thrilling than picking a lock, cracking a password, or winning a CTF challenge.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog June 25 2020

MSBuild: A Profitable Sidekick!

This blog post highlights some good techniques to use when restricted to testing an up-to-date Windows system with low-level user privileges (no local admin)…

Read about this article
Blog March 06 2018

Take Your Employees Phishing!

Because Phishing attacks are becoming more advanced in their exploitation of social engineering techniques, it may be overwhelming to attempt a defense against…

Read about this article
Webinars January 15 2025

DOD Contract Compliance: DFARS 7012 and CMMC

Advisory Compliance Practice Lead Chris Camejo will take a deep dive into the Department of Defense requirements for protecting FCI and CUI.

Read about this article
Blog January 07 2025

Solving NIST Password Complexities: Guidance From a GRC Perspective

Not another password change! Isn’t one (1) extra-long password enough? As a former Incident Response, Identity and Access Control, and Education and Awareness…

Read about this article
Podcasts December 20 2024

Security Noise - Episode 7.8

Farewell 2024

Read about this article
Blog December 19 2024

Malware Series: Process Injection Mapped Sections

We're back with another post about common malware techniques. This time, we are talking about using shared memory sections to inject and execute code in a…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Blog December 17 2024

Top 10 Blogs of 2024

At TrustedSec, we are all about leveraging our collective intelligence and knowledge to uplift the cybersecurity community. One of our most popular educational…

Read about this article
News December 10 2024

TrustedSec Tech Brief - December 2024 Year-End Top 3 Roundup

We are rounding up our top Tech Brief stories of 2024! Director of Security Intelligence Carlos Perez goes over what we have seen the most of this year and his…

Read about this article
Podcasts December 06 2024

Security Noise - Episode 7.7

Amazing Stories in InfoSec

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.