Scott Nusbaum

Senior Incident Response & Research Consultant

Experience

Over 14 years of experience in software development and 10 years in Information Security. Experience range from Material Handling, Banking, to the Defense Industry.

Education & Certifications

BS in Computer Engineering and Masters in Computer Science with a focus on Cyber Informatics from the University of Cincinnati. GIAC Reverse Engineering Malware (GREM)

Passion for Security

Scott has always been fascinated with computers and software. He started programming in Elementary and has never stopped. Scott is passionate about learning the internal workings of software and systems. This led to Reverse Engineering, Malware, exploits and CTF.

Recent Blog Posts

holiday phishing graphic

Holiday Phishing: Office 365

  It’s that time of year again, Merry Phishmas!! Holidays are the prime time of the year for attackers to send Phishing campaigns. Whether you are looking for the best deal on Black Friday, the best Christmas gift for that special family member, or a Holiday greeting from employees, employers, or costumers, there are plenty...
Read
Dumping Embedded Java Classes graphic

Dumping Embedded Java Classes

A few months ago, I came across a piece of Java malware. This was a nice change of pace for me, since most of what I see is written in C/C++. The malware was heavily obfuscated using a common tool, Allatori v5.3. After working my way manually through decoding, I came to a point where...
Read
PROXMOX logo

Malware Analysis is for the (Cuckoo) Birds – Working with Proxmox

This post will be on how to setup and modify Cuckoo to work with a non-supported hypervisor, Proxmox. “Proxmox VE is a complete open-source platform for all-inclusive enterprise virtualization that tightly integrates KVM hypervisor and LXC containers, software-defined storage and networking functionality on a single platform, and easily manages high availability clusters and disaster recovery...
Read
View all posts from Scott
Scott Nusbaum

Want to work with Scott Nusbaum or someone like him?

The TrustedSec team is comprised of experienced and qualified security professionals. Contact us to learn more about our services, our team, and how we can help you.
Contact Us