Skip to content

Offensive Security Experts

Customizable solutions to educate clients, identify security risks, inform intelligent business decisions, and enable you to reduce your attack surface digitally, physically and socially.

Red Teaming®

A multi-layered attack simulation designed to measure how well a company’s people and networks, applications, and physical security controls can withstand an attack from an adversary.

Penetration Testing

Inspects your network, application, device, and physical security through the eyes of BOTH a malicious actor and an experienced cybersecurity expert.

Social Engineering

Commonly known as “people hacking,” we aim to identify venerabilities by accessing a system, device, or physical premises.

Is You're Company Compliant?

RedTeam Security are the experts in helping you meet your industry’s security compliance standards, from banking to healthcare, retail and beyond.

PCI Penetration Testing

NERC CIP Compliance

HIPAA Penetration Testing

FDIC Penetration Testing

Cryptocurrency Compliance

RedTeam Welcomes Trevor McDonald

Written by
Jeremiah Talamantes in
On-site Red Teaming

At RedTeam Security, we pride ourselves on appreciating awesome people and bringing together a great group of innovative thinkers who can come up with new ways to effectively solve security issues. We’ve recently added a member to our team of security professionals and wanted to welcome him by sharing a little about his background.

Trevor Breaks Out Of His Comfort Zone

Trevor McDonald Cyber Security Expert

Trevor McDonald holds an Associate’s in Computer Forensics from Century College (where he was also a member of the Arabic club!). He’d been planning to continue his education at Metro State, but landed a well-paying IT job and decided to go with real-world experience instead.

“No regrets about that,” he says. “But when I retire, I would love to go back for some non-IT degree, possibly medical or psychology related.”

Before joining RedTeam, Trevor was the de-facto “security guy” at Nagios, which does network monitoring and alerting software. He started as a support tech in late 2013, then in early 2015 took over management of the support team.  In late 2017, he moved into a DevOps role in which he was actively involved in security testing for products and working with any third-party reporters who might have findings to submit.

He’s spent a lot of time doing Capture The Flags (CTFs) and playing around with lab environments. He also runs the local DefCon group DC612 in the Twin Cities, related to the world’s longest running and largest underground hacking conference, which meets monthly to discuss the latest security trends, recruit, and generally network and have fun.

Eventually, he set up an LLC for doing consulting work and landed a few small pentest/vulnerability assessment jobs which taught him to report writing and interfacing with clients. You can follow him on twitter @tactifail #infosec.

Trevor is not ‘all tech, all the time,’ though. At home, he enjoys cooking and reading — at least for now since he’ll be welcoming his first child in October.

He’s jumped in feet first at RedTeam and is learning quickly. He says he’s looking forward to having security be his full-time job.

“It will be fun to do this basically all day — even the reports are something I look forward to (for now).  This job will give me the opportunity to really sharpen my skills and get out of my comfort zone.”

RedTeam’s Can Help You – Free Consultation

Moving outside of the comfort zone is part of RedTeam’s culture. We don’t want automatons who thrive in the typical 9-5 culture. Diversity, new ideas, open minds, innovation and delivering exceptional service experiences hit the top of our list.

If you want a client’s perspective, check out this review from one of our satisfied clients. And, if you’d like to take the next step in working with us, simply click below and book a time for an introductory meeting.

10-Point Offensive Security Checklist

Get A Bird's Eye View Of Your Organization's Security Readiness

Services Datasheet

Recent Posts

Featured On

National TV news and media outlets often consult with us for our expertise as a
boutique, high-touch ethical hacking firm highly trained in a narrow field of cyber
security. Please click on any logo below to view the featured story.