Skip to Main Content

Travis Kaun

Senior Security Consultant

EXPERIENCE
Travis Kaun began his Information Security career-building by managing firewalls and intrusion detection systems with a managed security services provider. After time spent on the defensive side in the corporate world, Travis put on an offensive cap for a consulting role and hasn’t looked back.

Travis is a proud member of the Targeted Operations team, focusing on gaining a foothold and expanding to a large compromise while hunting for the ‘crown jewels’ and other client objectives.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science, Computer Information Systems, Herzing College
  • Offensive Security Certified Professional (OSCP)
  • Certified Red Team Operator (CRTO)
  • Certified Information Systems Security Professional (CISSP)

PASSION FOR SECURITY
Travis has contributed to open source projects and has spoken at various security conferences. Additionally, Travis co-hosts a regional InfoSec group, MadSec.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog October 20 2022

The Curious Case of the Password Database

Nowadays, password managers are king. We use password managers to secure our most sensitive credentials to a myriad of services and sites; a compromise of the…

Read about this article
Blog May 24 2022

Pwnton Pack: An Unlicensed 802.11 Particle Accelerator

This past Christmas, I received a terrific gift from my in-laws: a replica Ghostbusters Proton Pack. I was thrilled. You see, growing up in the mid 80s,…

Read about this article
Events Mesa, AZ | February 14 2025

CactusCon 2025

TrustedSec is proud to sponsor and have a booth at CactusCon this year! Three of our consultants will be giving talks as well.

Read about this article
Webinars February 11 2025

2024 Conference Roundup

Join our panelists David Kennedy, Justin Elze, Jason Lang, and Oddvar Moe for their firsthand accounts and perspectives on what people were talking about at…

Read about this article
Blog February 11 2025

From RAGs to Riches: Using LLMs and RAGs to Enhance Your Ops

1.1      IntroductionIn this blog, I will explore Retrieval-Augmented Generation (RAG) and how it can be applied to research capabilities. RAG is a framework…

Read about this article
Blog February 06 2025

The Hidden Trap in the PCI DSS SAQ A Changes

The Payment Card Industry Security Standards Council (PCI SSC) just announced a change to Self Assessment Questionnaire A (SAQ A). The change eliminates two…

Read about this article
Podcasts February 04 2025

Security Noise - Episode 7.10

Authentication in 2025

Read about this article
Blog January 23 2025

Operating Inside the Interpreted: Offensive Python

IntroductionEvery once in a while, I get the urge to go back and revisit older techniques that used to be popular but have fallen out of favor with the…

Read about this article
News January 21 2025

TrustedSec Tech Brief - January 2025

Carlos Perez walks us through several major vulnerabilities and patches from early January 2025, including a critical Fortinet FortiGate zero-day vulnerability.

Read about this article
Podcasts January 17 2025

Security Noise - Episode 7.9

On this episode of the Security Noise Podcast, we discuss user enumeration on Azure and "presence data" in Microsoft Teams with nyxgeek.

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.