Skip to content

Nikki-65/Nikki-65.github.io

Repository files navigation

Banner

Nikki Sadvand

Cybersecurity Analyst | SOC Monitoring | Incident Response | SIEM Engineering

Cybersecurity Analyst with hands-on experience in SIEM operations, alert triage, endpoint and network telemetry validation, and structured incident investigations aligned with MITRE ATT&CK and NIST 800-61.

🔗 Live Site: https://nscybersecurity.com/
📄 Resume: Nikki_Sadvand_Cybersecurity_Analyst_Resume.pdf


Professional Summary

Cybersecurity Analyst experienced in designing and operating an Elastic-based SIEM environment for endpoint and network visibility.

Practical experience includes:

  • Windows authentication anomaly investigations (Event ID 4624, 4625, 4672)
  • Endpoint telemetry validation using Sysmon v15+
  • Network telemetry analysis using Zeek
  • Alert triage, escalation, and structured case documentation
  • Detection validation using KQL and Kibana Discover
  • Incident response aligned with NIST 800-61 lifecycle

M.S. Cybersecurity Technology (UMGC, GPA 4.0, President’s List)


Core Competencies

SIEM & Monitoring

Elastic SIEM
Splunk
Kibana Discover
KQL log validation
Alert triage & escalation

Endpoint Telemetry

Sysmon v15+
Windows Event Logs
Process & authentication analysis
PowerShell monitoring

Network Telemetry

Zeek (Ubuntu 24.04)
DNS & connection log analysis
Filebeat ingestion
Wireshark

Incident Response

NIST 800-61 lifecycle
MITRE ATT&CK behavioral mapping
IOC validation
Structured case documentation

DFIR & Analysis

Autopsy
FTK Imager
Autoruns
Artifact and log analysis


Professional Experience

NS Cybersecurity (Independent Lab Environment)

Security Operations Engineer | Remote | Dec 2024 – Present

  • Designed and deployed Fleet-managed Elastic SIEM endpoint pipeline using Sysmon v15+.
  • Deployed Zeek network monitoring on Ubuntu and ingested structured DNS/HTTP telemetry into Elastic.
  • Validated detection reliability using targeted KQL queries and Kibana Discover analysis.
  • Analyzed Windows authentication events, process execution logs, firewall logs, and outbound network activity.
  • Executed structured SOC investigations aligned with NIST 800-61.
  • Performed tiered alert triage and documented full investigation workflows.

Sunset Auto Sales

Cybersecurity & IT Support Technician | March 2019 – Present

  • Supported and secured 60+ Windows endpoints in an Active Directory-based environment.
  • Resolved 25–30 weekly tickets involving MFA enforcement, malware triage, and endpoint remediation.
  • Reduced recurring malware incidents by approximately 50% through security hardening and policy enforcement.
  • Maintained structured incident and operational documentation.

Security Projects

Elastic SIEM + Fleet + Sysmon (Endpoint Pipeline)

Endpoint event ingestion, enrichment, and SIEM validation.

Artifacts:


Zeek + Filebeat → Elastic (Network Telemetry)

Network sensor deployment, log ingestion, and detection validation.

Artifacts:


SOC Dashboarding & Alert Triage (Splunk)

Authentication anomaly monitoring and escalation workflows.

Artifacts:


Network Reconnaissance & SOC Automation (Python)

Nmap automation wrapper with structured output for security reporting.


Threat Intelligence & Malware Analysis

Processed 30,000+ threat indicators from open-source feeds and malware sandboxes. Extracted actionable IOCs for detection use cases.


DFIR Incident Investigation

Simulated web server intrusion investigation including:

  • IIS log analysis
  • Base64 decoding
  • SSH exfiltration review
  • Persistence analysis (Autoruns, scheduled tasks)
  • Autopsy and FTK artifact review

Artifacts:


Technical Stack (Portfolio Site)

Frontend: HTML5, CSS3
Layout: CSS Grid, Flexbox, Responsive Design
Hosting: GitHub Pages
Tooling: GitHub, SEO meta tags


Certifications

  • Python Basics for Data Science (IBM)

Contact

Location: Matthews, NC
Email: sadvandniknaz0@gmail.com
GitHub: github.com/Nikki-65
Portfolio: nscybersecurity.com