Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Scott Nusbaum

Principal Research Analyst

EXPERIENCE
Scott Nusbaum has over 25 years of experience in software development and 16 years in Information Security. He has experience ranging from material handling and banking to the defense industry.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer Engineering, University of Cincinnati
  • Master of Science, Computer Science, Cyber Informatics, University of Cincinnati
  • Offensive Security Certified Expert (OSCE)
  • Offensive Security Exploit Developer (OSED)
  • Offensive Security Experienced Professional (OSEP)
  • GIAC Reverse Engineering Malware (GREM)

INDUSTRY CONTRIBUTIONS
Scott has contributed to InfoSec conferences to share his knowledge with the community, including Queen City Con 2023, Texas Cyber Summit 2023, the Ohio Information Security Forum, and as an Adjunct Instructor at the University of Cincinnati.

PASSION FOR SECURITY
Scott has always been fascinated with computers and software. He started programming in elementary school and has never stopped. Scott is passionate about learning the internal workings of software and systems. This led to reverse engineering, malware, exploits, and CTF.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog January 30 2024

Burrowing a Hollow in a DLL to Hide

1    Burrowing a Hollow in a DLL to Hide In this post about common malware techniques, we are still talking about hollowing—but this time, instead of hollowing…

Read about this article
Webinars July 01 2021

The Ransomware Environment: Going Beyond the Headlines

Learn how to counter ransomware attacks and stay ahead of emerging threats from TrustedSec's expert panel, featuring CEO David Kennedy and Incident Response…

Read about this article
Webinars March 08 2023

Who’s Winning the Red vs. Blue Team Arms Race

Experts Adam Compton, Phil Rowland, and Scott Nusbaum discuss the Red vs. Blue team arms race, sharing insights on the past, current, and future of…

Read about this article
Blog June 16 2023

Obfuscation Using Python Bytecode

Learn how to compile Python code into bytecode for malicious purposes, including downloading and executing files, creating in-memory loaders, and obfuscating…

Read about this article
Blog May 30 2023

PPID Spoofing: It’s Really this Easy to Fake Your Parent

Understanding Parent Process ID (PPID) Spoofing to Hide Functions and Malicious Code.

Read about this article
Blog February 08 2023

ESXiArgs: The code behind the ransomware

This ransomware uses a simple encryption method, encrypting files in sections with a fast stream cipher, before demanding payment to restore access.

Read about this article
Blog January 31 2023

New Attacks, Old Tricks: How OneNote Malware is Evolving

Malware authors exploit OneNote's file execution feature to download and execute malicious scripts, posing a phishing threat to users, warning users to…

Read about this article
Events TrustedSec HQ | October 28 2025

ISC2 Cleveland Chapter Member Meeting - October 2025

ISC2 Cleveland Chapter October MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Lake Buena Vista, FL | October 27 2025

InfoSecWorld 2025

TrustedSec is proud to sponsor and hold a workshop at this year's InfoSec World in Lake Buena Vista, Florida. Make sure to visit our booth if you'll be there!

Read about this article
Training Resources October 25 2025

InfoSec World Workshop - Adversary Tactics and Threat Hunting

This immersive workshop will train you to simulate attacks, hunt threats, and build detections using manual, automated, and AI-driven methods across network…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.