Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

Shane Hartman

Principal Security Consultant

EXPERIENCE
Shane has been working in computer technology and information security for over 20 years. Some of his recent work includes performing specialized incident analysis on the latest cybercrime activities, producing actionable threat intelligence.

EDUCATION & CERTIFICATIONS

  • BA, Business and E-Commerce, University of Phoenix
  • MS, Digital Forensics, University of Central Florida
  • Certified Information Security Professional (CISSP)

PROFESSIONAL AFFILIATIONS

  • Tampa Bay Chapter of (ISC)²

INDUSTRY CONTRIBUTIONS

  • Author, Android Malware and Analysis – 2014
  • BSides Tampa Presentation – Android Malware and Analysis – 2015
  • BSides Tampa Presentation – NFC Your Smart Phone’s Best Friend or Worst Nightmare – 2017
  • Video Course – Metasploit Unleashed – 2020
  • BSides Tampa Presentation – IOT Insecurities – 2022

PASSION FOR SECURITY
Shane continually shares his industry knowledge through publications and public presentations. Additionally, he is a part-time adjunct professor at the University of South Florida, teaching classes such as Ethical Hacking and Digital Forensics.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Webinars July 27 2022

Adding Value to a Traditional Penetration Test

Leaders from TrustedSec's Advisory, Remediation, and Incident Response teams discuss how to optimize penetration testing, revealing common security challenges,…

Read about this article
Blog July 25 2023

Prefetch: The Little Snitch That Tells on You

Investigators can use prefetch file contents to identify malicious directory paths, binaries, and data files, aiding in exfiltration and malware analysis.

Read about this article
Blog February 07 2023

ESXiArgs: What you need to know and how to protect your data

Vulnerable ESXi servers are at risk from the ESXiArgs ransomware campaign; patch or upgrade immediately to prevent data loss.

Read about this article
Blog October 11 2022

Back to Basics: The TrustedSec Guide to Strong Cyber Hygiene—Part 2

In the first Back to Basics blog we discussed cyber hygiene and some fundamental security practices one can take to quickly assess their current cybersecurity…

Read about this article
Webinars February 11 2026

Perspectives on AI in the Cybersecurity Industry in 2026

Join us for this exclusive webinar where our experts will decode the complex relationship between artificial intelligence and cybersecurity in 2026. What will…

Read about this article
Blog January 22 2026

Adventures in Primary Group Behavior, Reporting, and Exploitation

If you’ve administered Active Directory (AD) for any significant time, chances are you’ve come across the primaryGroupID attribute. Originally developed as a…

Read about this article
News January 22 2026

News 5 Cleveland - Social Security numbers may have been exposed in data breach connected to local car dealership

A Massillon car dealership reports that an unauthorized actor accessed its network, potentially exposing customer names and Social Security numbers. Advisory…

Read about this article
Blog January 20 2026

Colonel Clustered: Finding Outliers in Burp Intruder

TL;DR, gimme the goods: https://github.com/hoodoer/ColonelClusteredExtension has been submitted to the Bapp store, awaiting approval.This is a Burp Suite…

Read about this article
Events January 15 2026

Discord Livestream - Crash Course: Building an Analysis Strategy

In this livestream, we will cover the components of an incident response attack plan from a high level —including scoping, building an analysis strategy,…

Read about this article
News January 15 2026

WWL First News with Tommy Tucker - What to know about the big Verizon outage on Wednesday

A widespread Verizon outage left many without service, sparking conversation about digital dependence. Advisory Solutions Director Alex Hamerstone joins WWL…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.