Skip to Main Content

Megan Nilsen

Practice Lead, Attack Simulation and Detection, Tactical Awareness & Countermeasures (TAC)

EXPERIENCE
Megan has over five years of experience in the Gaming & Hospitality industry working as both an Engineer and a Lead Analyst in a Security Operations Center. She has worked with a wide array of corporate security tools including IDS/IPS and vulnerability scanners. In addition, she has led the development of SIEM programs focused on actionable alerts that leverage automation to speed up response time and reduce analyst fatigue.

Her knowledge in security, business administration, and compliance (SOX/MICS/PCI) makes her well equipped to understand the challenges and needs of large enterprise environments.

EDUCATION & CERTIFICATIONS

  • Bachelor of Science: Accounting and Information Systems, University of Nevada
  • Undergraduate Certificate in Applied Cybersecurity: SANS Technology Institute
  • CompTIA Network+
  • CompTIA CySA+
  • GIAC Foundational Cybersecurity Technologies (GFACT)
  • GIAC Certified Intrusion Analyst (GCIA)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Security Essentials (GSEC)
  • Certified Azure Red Team Professional (CARTP)

PROFESSIONAL AFFILIATIONS
GIAC Advisory Board

PASSION FOR SECURITY
Megan discovered her interest in cybersecurity during college. Since then, she has fallen in love with the fast-paced and continuously evolving nature of the industry. She has especially developed a passion for all things SIEM, from building reporting to log source enrichment to system tuning and developing alerts. She is highly motivated and looks forward to applying her knowledge and skills to help organizations improve their existing security practices.

Featured Blogs And Resources

Discover the blogs, analysis, webinars, and podcasts by this team member.

Blog January 18 2024

Engagement Guide: How to Prepare for Your Purple Team

TrustedSec's Purple Team engagements prepare clients for security assessments by identifying gaps in security coverage, logging, and tooling, with offerings…

Read about this article
Blog January 09 2024

Detection Alchemy - The Purple Team Way

1.1      IntroductionAs security practitioners, we frequently extol the virtues of penetration testing and red team exercises as a way of identifying issues…

Read about this article
Blog October 17 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 3)

Configuring a SACL to prevent unauthorized changes to Active Directory attributes, enabling auditing and monitoring for potential attacks, and detecting…

Read about this article
Blog October 12 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 2)

This blog series was co-authored by Security Consultant Megan Nilsen and TAC Practice Lead Andrew Schwartz.1    IntroductionThis is a continuation of A…

Read about this article
Blog October 11 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1B)

Here is a meta description summarizing the key benefits and value proposition of this webpage, within the 150-160 character limit:

Detecting Windows SACL…

Read about this article
Blog October 10 2023

A Hitch-hacker's Guide to DACL-Based Detections (Part 1A)

blue team

Read about this article
Blog January 10 2023

A LAPS(e) in Judgement

Building Splunk queries to detect LAPS (Local Administrator Password Solution) attacks using Windows Security Log events, enabling enhanced logging and…

Read about this article
Events Columbus, OH | May 22 2025

Central Ohio ISSA InfoSec Summit 2025

Customize your Linux system with our expert guides and resources, ensuring maximum security and performance, backed by our team of experienced professionals.

Read about this article
Events TrustedSec HQ | April 29 2025

ISC2 Cleveland Chapter Member Meeting - April 2025

ISC2 Cleveland Chapter April MeetupCome join us for our meetup! The ISC2 Cleveland Chapter is hosting an exciting in-person event for all cybersecurity…

Read about this article
Events Charlotte, NC | April 27 2025

ILTA EVOLVE 2025

Customize your Linux system with TrustedSec's advanced features and discover how our secret can help you optimize performance and security.

Read about this article

Empower your business through better security design.

Talk directly with our experienced advisory consultants to learn how we can help.