Jason Ashton

Practice Lead, Training & Mentorship


Jason Ashton is a Security Consultant at TrustedSec. He routinely performs internal, external, and wireless penetration tests for a wide range of customers, to include: finance, education, industrial, and corporate environments. He has worked in technology/IT for nearly 20 years, with a focus on information security for the past half decade. Jason’s extensive networking experience was developed over years of help-desk support, sysadmin, and PC repair technician, to name a few. As a systems integration engineer, he was responsible for the design and successful implementation of diverse systems, often deployed to varying sizes of customer networks.

Education & Certifications

  • Associates Electronic Engineering Technology, The University of Akron
  • Systems Security Certified Practitioner (SSCP)

Industry Contributions

Volunteers at numerous local and national security conferences to include: DerbyCon, ShmooCon, CircleCityCon, and BSides Regularly contributes to open-source tools/projects.

Passion for Security

Jason’s passion for security originated with physical security systems, where his duties included their engineering, deployment, and programming. While working at TrustedSec, Jason has provided additional perspective on these systems for their circumvention and ultimately better methods for secure installation. These interests carried over into Locksport, where he enjoys the challenge of lockpicking and physical lock bypass. In his spare time, he enjoys tinkering with all forms of technology and automation, to include a home lab environment.

Recent Blog Posts

Rekt by the REX

The request-to-exit (REX) passive infrared (PIR) sensor. You know the one. Spray canned air or smoke in its face, it becomes disoriented and unlocks the door. Spit a mist of alcohol in its face, it gets a buzz and unlocks the door. The butt of many “jokes” for how easily it provides unauthorized entry, but...
card cloner graphic

Let’s Build a Card Cloner

This post isn’t attempting to present new research or a new device—that work has already been done, a la Bishop Fox. While an overall design was created, and many others have discussed building such a device, doing so can prove to be challenging. This post will provide you with all that is needed to fully...
TrustedSec Blogs + Articles logo


This blog post isn’t directly information security related per se, but is technical in nature, so it should appeal to the geek in most of us. When Dave posted pictures of the gear being used to stream the Track talks within the Hyatt at DerbyCon this year, there was a fair amount of interest in...
View all posts from Jason

Want to work with Jason Ashton or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us