Skip to Main Content

Our team

With our expertise, technical skills, and ethical character, we’ll help you secure what’s most important to you. Interested in a career at TrustedSec? Check out our careers page below for job openings!

Meet the experts

Our exceptional team of security consultants and advisors are ready to tackle your information security challenges and deliver practical results.

Matt Andreko

Senior Security Consultant

Read Matt's bio

Jessica Archer

Director of Sales

Jason Ashton

Practice Lead, Training & Mentorship

Read Jason's bio

Alex Ball

Senior Security Consultant

Shaun Bell

Senior Systems Administrator

Brian Berg

Senior Security Consultant

Read Brian's bio

Misty Berg

Accounting Clerk

Scot Berner

Principal Security Consultant

Zach Bevilacqua

Security Consultant

Read Zach's bio

Chris Boesch

VP, Sales and Marketing

Read Chris's bio

Justin Bollinger

Principal Security Consultant

Read Justin's bio

Michael Bond

Security Consultant

Read Michael's bio

Martin Bos

CSO & VP of Consulting Services

Read Martin's bio

David Boyd

Senior Security Consultant

Read David's bio

Ryan Boyle

Security Consultant

Read Ryan's bio

Luke Bremer

Senior Security Consultant II

Read Luke's bio

Rockie Brockway

Director of Advisory Innovation

Read Rockie's bio

Suzanne Burdick

Director of Finance

Read Suzanne's bio

Paul Burkeland

Practice Lead, Force Cloud Security

Read Paul's bio

John Burnheimer

Senior Account Manager

Ryan Burnheimer

VP of Business Development

Read Ryan's bio

Chris Camejo

Practice Lead, Advisory's Compliance Services

Read Chris's bio

Brian Cantrell

Chief Operating Officer

Read Brian's bio

Dylan Carr

Junior Systems Administrator

Olivia Cate

Security Consultant

Read Olivia's bio

Ricky Christoff

Junior Systems Administrator

Kevin Clark

Security Consultant

Read Kevin's bio

Christine Cline

Engagement Manager

Adam Compton

Principal Security Consultant

Read Adam's bio

Austin Coontz

Associate Security Consultant

Read Austin's bio

Art Cooper

Principal Security Consultant

Read Art's bio

Ryan Dadich

Account Manager

Edwin David

Security Consultant

Read Edwin's bio

Julie Daymut

Senior Copy Editor

Josh Deen

Security Consultant

Read Josh's bio

Kim DeSimone

Director of HR

Read Kim's bio

Nick Doerner

Security Consultant

Read Nick's bio

Philip DuBois

Senior Security Consultant

Read Philip's bio

Justin Elze

CTO, Director of Research

Read Justin's bio

Steven Erwin

Senior Security Consultant

Read Steven's bio

Paul Farley

Field CISO

Read Paul's bio

Mike Felch

Principal Security Consultant

Read Mike's bio

Caroline Fenstermacher

Security Consultant

Read Caroline's bio

Gary Fetters

Senior Copy Editor

Andrea Floro

Senior Account Manager

Eric Fry

Senior Account Manager

Linus Garin

Security Consultant

Read Linus's bio

Fatima Ghani

Associate Security Consultant

Read Fatima's bio

Jake Glomb

Senior Account Manager

Shane Hartman

Principal Security Consultant

Read Shane's bio

Alex Hamerstone

Advisory Solutions Director

Read Alex's bio

Kevin Haubris

Senior Research Analyst

Read Kevin's bio

Dylan Isaacs

Account Manager

Aaron James

Senior Security Consultant

Read Aaron's bio

Kurt Jensen

Senior Compliance Consultant

Read Kurt's bio

Shane Jones

Security Consultant

Read Shane's bio

Alex Kah

Senior Systems Administrator

Travis Kaun

Senior Security Consultant

Read Travis's bio

David Kennedy

Founder & CEO

Read David's bio

Erin Kennedy

Vice President of Finance

Read Erin's bio

Drew Kirkpatrick

Principal Security Consultant

Read Drew's bio

Paul Koblitz

Managing Director of Technical Services

Read Paul's bio

Hans Lakhan

Principal Security Consultant

Read Hans's bio

Jason Lang

Practice Lead, Targeted Operations

Read Jason's bio

Robert Lee

Detection Engineer

Read Robert's bio

Ryan Leese

Senior Security Consultant

Read Ryan's bio

Andrew Lentz

Associate Security Consultant

Read Andrew's bio

Katie Link

Senior Engagement Coordinator

Sam Link

Principal Security Consultant

Read Sam's bio

Jack Love

Senior Engagement Coordinator

Roza Maille

Content & Community Manager

Ben Mauch

Director of Organizational Training

Read Ben's bio

Patrick Mayo

Security Consultant

Read Patrick's bio

Steve Maxwell

Senior Security Consultant

Read Steve's bio

Brandon McGrath

Senior Security Consultant

Read Brandon's bio

Jared McWherter

Senior Security Consultant

Read Jared's bio

Thomas Millar

Senior Security Consultant

Read Thomas's bio

Oddvar Moe

Principal Security Consultant

Read Oddvar's bio

Kurt Muhl

Senior Security Consultant

Read Kurt's bio

Megan Nilsen

Practice Lead, Attack Simulation and Detection, Tactical Awareness & Countermeasures (TAC)

Read Megan's bio

Sarah Norris

Senior Security Consultant

Read Sarah's bio

Scott Nusbaum

Principal Research Analyst

Read Scott's bio

Mike Owens

Senior Security Consultant

Read Mike's bio

Mitchel Parish

Security Consultant

Read Mitchel's bio

Christopher Paschen

Research Practice Lead

Read Christopher's bio

Carlos Perez

Director of Security Intelligence and Practice Lead, Incident Response

Read Carlos's bio

Jeff Pergal

Technical Solutions Director

Read Jeff's bio

Costa Petros

Senior Security Consultant

Read Costa's bio

Whitney Phillips

Senior Security Consultant

Read Whitney's bio

Dominick Pissini

Associate Security Consultant

Read Dominick's bio

Lee Quinton

Senior Security Consultant

Read Lee's bio

Esteban Rodriguez

Senior Security Consultant

Read Esteban's bio

Luis Rodriguez

Security Consultant

Read Luis's bio

Phil Rowland

Practice Lead, Remediation Services

Read Phil's bio

Lou Scicchitano

Senior Security Consultant

Read Lou's bio

Kelsey Segrue

Senior Security Consultant

Read Kelsey's bio

Steph Saunders

Senior Security Consultant

Read Steph's bio

Paul Sems

Managing Director of Remediation Services

Read Paul's bio

Brandi Shaffer

Team Lead, Quality Assurance

Read Brandi's bio

Dennis Shannon

Associate Security Consultant

Read Dennis's bio

Jessica Sheneman

Senior Graphic Designer

Rob Simon

Practice Lead, Mobile and Hardware Security

Read Rob's bio

Mike Spitzer

Senior Security Engineer

Read Mike's bio

Larry Spohn

Practice Lead, Force

Read Larry's bio

Travis Steadman

Security Consultant

Read Travis's bio

Joe Sullivan

Senior Security Consultant

Read Joe's bio

David Thompson

Senior Account Manager

Nicole Tsakoumagos

Senior Copy Editor

Skyler Tuter

Senior Security Consultant

Read Skyler's bio

Justin Vaicaro

Principal Incident Response Consultant

Read Justin's bio

Geoff Walton

Practice Lead, Application Security

Read Geoff's bio

Jonathan White

Senior Security Consultant

Read Jonathan's bio

Scott White

Director of Software Security

Read Scott's bio

James Williams

Senior Security Consultant

Read James's bio

Esra Yagan

Senior Account Manager

Charles Yost

Senior Software Engineer

Read Charles's bio

Making a difference in security

We set out to change security by assembling the most technically advanced team of consultants and advisors.

“Our collaborative culture and reputation has attracted the most passionate, highly skilled professionals in the industry. It's incredible to see that the work we are doing is changing the industry.”
Larry SpohnPractice Lead, Force
“For me it’s more of a life choice and a passion than anything else. I don’t consider it work at all. I get to work with some of the best, most talented hackers in the world, literally.”
Jason LangPractice Lead, Targeted Operations
“It's an incredible, collaborative environment where I can rely on anyone for support, and that's truly priceless.”
Martin BosCSO, VP of Consulting Services

Learn more about our services from an expert.

Let our experts tailor solutions to your security challenges.

Blog December 19 2024

Malware Series: Process Injection Mapped Sections

We're back with another post about common malware techniques. This time, we are talking about using shared memory sections to inject and execute code in a…

Read about this article
Webinars December 18 2024

The Lost Underground

Join TrustedSec Principal Security Consultant Mike Felch for an eye-opening journey into the lost underground, where ingenuity, disobedience, and complexity…

Read about this article
Blog December 17 2024

Top 10 Blogs of 2024

At TrustedSec, we are all about leveraging our collective intelligence and knowledge to uplift the cybersecurity community. One of our most popular educational…

Read about this article
Blog December 05 2024

On-Demand BOF

From the team that brought you COFF Loader, CS-Situational-Awareness-BOF, CS-Remote-OPs-BOF, and numerous blogs on BOFs, we are excited to release our first…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Join Senior Security Consultant Steven Erwin and Security Consultant Caroline Fenstermacher as they cover the basics of BEC analysis, providing participants…

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Like most red teamers, I spend quite a lot of time looking for novel vulnerabilities that could be used for initial access or lateral movement. Recently, my…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article
Events TrustedSec HQ | November 20 2024

WiCyS Ransomware Panel & Networking Event

Join us for an insightful discussion with the Women in Cyber Security (WiCyS) Northeast Ohio Affiliate members!

Read about this article
Webinars November 20 2024

Navigating Compliance: FCI and CUI Requirements for Federal Contractors

TrustedSec Advisory Compliance Services Practice Lead Chris Camejo provides a comprehensive overview of the definition, scope, and protection requirements for…

Read about this article
Blog November 14 2024

Attacking JWT with Self-Signed Claims

JSON Web Tokens (JWTs) are a widely used format for applications and APIs to pass authorization information. These tokens often use a JSON Web Signature (JWS)…

Read about this article
Work with us

Be part of the TrustedSec story

Learn how you can join our team.