Principal Security Consultant
Justin Bollinger is a Senior Security Consultant with a focus on Network Access Control and secure network design. He has over 9 years of industry experience in designing secure networks in the various sectors including Enterprise, Manufacturing, Healthcare, Higher Education, and Retail. Justin’s specialties include Enterprise LAN/WAN, Lan to Lan and remote access VPN, and Public Key Infrastructure (PKI). Justin has expert level knowledge in Cisco security products including Identity Services Engine, ASA next-gen firewalls, Sourcefire IPS, Cloud Web Security, Ironport WSA and Ironport ESA. Aside from Justin’s experiences with Cisco Security products, he also has experience with Microsoft and Linux system administration. His level of expertise in certificates, VPNs and firewalls, gives his team an excellent source to turn to for discovering and exploiting weaknesses in an often untouched area of penetration testing, the network infrastructure itself.
Education & Certifications
- B.S. Computer Science and Engineering Technology, University of Toledo, College of Engineering
- Cisco Certified Network Professional (CCNP)
- Sourcefire Certified Professional (SFCP)
- Sourcefire SFSE-AMP
- CNSSI-4013 Certificate
- NSTISSI-4011 Certificate
Theta Tau Professional Engineering Fraternity
Passion for Security
Justin started tinkering at a very young age with computers and as early as junior high was already learning how to crack passwords and bypass other security controls. Learning and understanding how things work has always been a passion and definitely proves valuable in the security profession.
Recent Blog Posts
1.1 Intro I spent my early IT career working for a Cisco partner that specialized in Cisco phone systems. My work wasn’t directly with the phone systems, but it was usually in an adjacent field like route/switch and security. I did, however, get to see my share of networks that used Cisco phone systems. Today,...
Many of our customers follow the best practice of creating separate accounts for day-to-day tasks and administrative ones. In the event of an attack, using separate accounts is often a great way to slow things down and give security teams a little extra time for discovery and identification of an attack. Because many attacks happen...
Recorded July 24, 2019 at 1:00 P.M. EST The idea of segmenting your network is not new. However, even in 2019, we still see companies with flat networks ripe for attack. This provides a much greater opportunity for malicious actions...