Justin Elze

CTO, Director of Research


Justin Elze is a Principal Security Consultant with TrustedSec’s Force practice with over ten years of experience in the Information Technology industry. His areas of specialty are in enterprise penetration testing, network security, social engineering, red teaming. Prior to joining TrustedSec Justin was a senior penetration tester for Accuvant LABs, Dell SecureWorks and Redspin where he leads numerous red team engagements, penetration tests, and HIPAA risk assessments. Justin has worked in various industries including Internet Service Providers, hosting, DoD contracting, and services consulting companies. Justin has a broad range of experience in information technology implementation and solutions. The diverse environments and a broad range of technology solutions have given Justin a wide variety of skills and experience that applies to his current role.

Education & Certifications

  • Offensive Security Certified Professional (OSCP)
  • Certified Ethical Hacker (CEH)
  • Mile2 Certified Penetration Testing Engineer (CPTE)
  • Citrix Certified Administrator (CCA)
  • Apple Certified Support Professional (ACSP)

Professional Affiliations

Buffalo InfraGard Member Buffalo ISSA Member Guest lecturer/Advisor for the University of Buffalo’s Net Defense program

Passion for Security

Justin’s passion for security originated with network security and now includes a wide variety of other topics including the internet of things, automobile hacking, and malware reverse engineering. Justin regular looks for new techniques and tactics to help emulate real-world threats as well as researching new methods to bypass security controls.

Recent Blog Posts

Putting the team in red team

One of the more common questions we receive during a red team scoping call or RFP Q&A call is, how many dedicated consultants will be involved in the assessment? There is no “correct” answer to this question, and ultimately, the answer as to how red team engagements are staffed comes down to how the consultancy...
digital and realistic sword graphic

From Scans to Adversary Emulation, Pentesting is Evolving Rapidly

Traditional pentesting is evolving as many companies are rapidly maturing their information security programs. Additionally, improvements in operating system hardening, endpoint protection agents, and security appliances are raising the bar for successful compromise and lateral movement. If you talk with pentesters across the industry, you will hear more and more positive stories about client security...
TrustedSec Blogs + Articles logo

Welcome to 2018! A Meltdown and Spectre Run-Through

Welcome to 2018! It’s only been a few days into the new year and we already have newly named bugs, thanks to the Google Project Zero, Cyberus Technology, and the Graz University of Technology. Jann Horn, Werner Haas, Thomas Prescher, Daniel Gruss, Moritz Lipp, Stefan Mangard, Michael Schwarz, Paul Kocher, Daniel Genkin, Mike Hamburg, Moritz...
View all posts from Justin

Recent Webinars

Log4j: Live Update Webcast

Presented by TrustedSec & Binary Defense on December 14, 2021. During this live webcast we are covering the latest news and guidance on the Log4j vulnerability and what organizations can do to detect and respond to it. We will discuss...

Attack Masterclass: How to Beat the Phishing and Ransomware Surge

With attacks getting harder to spot and ransomware taking center stage, learn from security trailblazers, including our own CTO Justin Elze, on how they leverage AI and human-centric strategies to prevent breaches at their organizations. Spear phishing attacks are surging,...

Are You Ready for a Red Team?!

Recorded on October 21st, 2020 Understanding the real-world effectiveness of your security controls is a crucial element in constructing a robust security posture.  Red Team engagements (or “Adversarial Attack Simulations” as they’re known at TrustedSec) are extended, goal-oriented engagements using...
View all webinars from Justin

Want to work with Justin Elze or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us