Justin Bollinger

Principal Security Consultant


Justin Bollinger is a Senior Security Consultant with a focus on Network Access Control and secure network design. He has over 9 years of industry experience in designing secure networks in the various sectors including Enterprise, Manufacturing, Healthcare, Higher Education, and Retail. Justin’s specialties include Enterprise LAN/WAN, Lan to Lan and remote access VPN, and Public Key Infrastructure (PKI). Justin has expert level knowledge in Cisco security products including Identity Services Engine, ASA next-gen firewalls, Sourcefire IPS, Cloud Web Security, Ironport WSA and Ironport ESA. Aside from Justin’s experiences with Cisco Security products, he also has experience with Microsoft and Linux system administration. His level of expertise in certificates, VPNs and firewalls, gives his team an excellent source to turn to for discovering and exploiting weaknesses in an often untouched area of penetration testing, the network infrastructure itself.

Education & Certifications

  • B.S. Computer Science and Engineering Technology, University of Toledo, College of Engineering
  • Cisco Certified Network Professional (CCNP)
  • Sourcefire Certified Professional (SFCP)
  • Sourcefire SFSE-AMP
  • CNSSI-4013 Certificate
  • NSTISSI-4011 Certificate

Professional Affiliations

Theta Tau Professional Engineering Fraternity

Passion for Security

Justin started tinkering at a very young age with computers and as early as junior high was already learning how to crack passwords and bypass other security controls. Learning and understanding how things work has always been a passion and definitely proves valuable in the security profession.

Recent Blog Posts

SeeYouCM-Thief: Exploiting Common Misconfigurations in Cisco Phone Systems

1.1      Intro I spent my early IT career working for a Cisco partner that specialized in Cisco phone systems. My work wasn’t directly with the phone systems, but it was usually in an adjacent field like route/switch and security. I did, however, get to see my share of networks that used Cisco phone systems. Today,...
Credential Re-Use in the Enterprise graphic

Credential Re-Use in the Enterprise

Many of our customers follow the best practice of creating separate accounts for day-to-day tasks and administrative ones. In the event of an attack, using separate accounts is often a great way to slow things down and give security teams a little extra time for discovery and identification of an attack. Because many attacks happen...
View all posts from Justin

Recent Webinars

Network Segmentation for the Rest of Us! How to get your segmentation project moving toward zero trust.

Recorded July 24, 2019 at 1:00 P.M. EST The idea of segmenting your network is not new. However, even in 2019, we still see companies with flat networks ripe for attack. This provides a much greater opportunity for malicious actions...
View all webinars from Justin

Want to work with Justin Bollinger or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us