Skip to Main Content

Megan Nilsen

Practice Lead, Attack Simulation and Detection, Tactical Awareness & Countermeasures (TAC)

EXPERIENCE
Megan has over five years of experience in the Gaming & Hospitality industry working as both an Engineer and a Lead Analyst in a Security Operations Center. She has worked with a wide array of corporate security tools including IDS/IPS and vulnerability scanners. In addition, she has led the development of SIEM programs focused on actionable alerts that leverage automation to speed up response time and reduce analyst fatigue.

Her knowledge in security, business administration, and compliance (SOX/MICS/PCI) makes her well equipped to understand the challenges and needs of large enterprise environments.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science: Accounting and Information Systems, University of Nevada
  • Undergraduate Certificate in Applied Cybersecurity: SANS Technology Institute
  • CompTIA Network+
  • CompTIA CySA+
  • GIAC Foundational Cybersecurity Technologies (GFACT)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Security Essentials (GSEC)
  • Certified Azure Red Team Professional (CARTP)

PROFESSIONAL AFFILIATIONS
GIAC Advisory Board

PASSION FOR SECURITY
Megan discovered her interest in cybersecurity during college. Since then, she has fallen in love with the fast-paced and continuously evolving nature of the industry. She has especially developed a passion for all things SIEM, from building reporting to log source enrichment to system tuning and developing alerts. She is highly motivated and looks forward to applying her knowledge and skills to help organizations improve their existing security practices.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog January 18 2024

Engagement Guide: How to Prepare for Your Purple Team

After performing many Purple Team engagements with organizations ranging from large enterprise networks to small-to-medium businesses, we've found that the…

Read about this article
Blog January 09 2024

Detection Alchemy - The Purple Team Way

1.1      IntroductionAs security practitioners, we frequently extol the virtues of penetration testing and red team exercises as a way of identifying issues…

Read about this article
Blog October 17 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 3)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIn this third and final…

Read about this article
Blog October 12 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 2)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionThis is a continuation of A…

Read about this article
Blog October 11 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1B)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIn this continuation to our first…

Read about this article
Blog October 10 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionIf you were to collectively ask any…

Read about this article
Blog January 10 2023

A LAPS(e) in Judgement

As security practitioners, we live in a time where there is an abundance of tools and solutions to help us secure our homes, organizations, and critical data.…

Read about this article
Webinars December 04 2024

BEC Basics: Your First Step to Thwarting Email Scams

Attackers never stop evolving their business email compromise (BEC) tactics, leveraging phishing, credential harvesting, and email spoofing to infiltrate…

Read about this article
Training Resources November 07 2024

Actionable Purple Team Simulation Online Training (November 7-8)

Learn how to create specific detections to identify early Indicators of Compromise (IOCs) in our online course. Designed for those looking to improve their…

Read about this article
Webinars October 16 2024

Calculating Business Impact

In today’s digital landscape, gaining a deep understanding of how cybersecurity threats can affect business-critical systems is crucial for maintaining…

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.