Nik Alleyne

Nik Alleyne is a SANS Certified Instructor with over 20 years in IT, with the last 10 years being more focused in cybersecurity. He is currently the Director of Business Development for a Managed Security Services Provider (MSSP), where he is responsible for leading multiple teams supporting various security technologies including IDS/IPS, Anti-Malware tools, proxies, firewalls, SIEM, Cloud, and WAF. Nik teaches both SEC503: Network Monitoring and Threat Detection In-Depth and SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling for SANS and is a published author of two books Hack and Detect and Mastering TShark Network Forensics.

More About Nik
Specialties

Profile

Nik Alleyne entered a career into IT by accident, but cybersecurity by choice. With 20 years of experience in IT and 10+ years in cybersecurity, it is Nik’s experience that puts him in the position to be the best at what he does. Bundle that experience with his continued love for learning and sharing knowledge and you have someone committed to being the best he can be. Nik’s experience in building teams from scratch, building new SOC locations, expanding existing SOCs, and supporting Fortune 150 companies, helps him demonstrate and teach this content.

As a SANS Certified Instructor, Nik teaches both SEC503: Network Monitoring and Threat Detection In-Depth and SEC504: Hacker Tools, Techniques, Exploits, and Incident Handling for SANS. Teaching at SANS allows Nik to demonstrate to the students how they can learn about these attacks, how they can detect them, and the measures they can put in place to prevent them where possible. In situations where they are unable to prevent them, he helps them understand how they can reduce the likelihood, thus reducing the impact and ultimately the risk.

Nik is the author of the book Learning By Practicing - Hack & Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics and during his free time actively writes on his blog at www.securitynik.com. He also works with local colleges through their co-op programs, to aid in the development of their cybersecurity students.

His academic credentials include a MSc Cyber Security Forensics, BSc Computer Science, along with PG Cert (Hons) specialization in VoIP and Wireless Broadband. He currently holds (and or held) various industry certifications such as CISSP, GCIA, GCIH, GCFA, CCNP Security and R&S, CCMSE +VSX, SFCA, SFCE, SWSE, MCSE, MCITP/EA, BCCPA, IBM Certified Deployment Professional - Security QRadar SIEM V7.1, ITIL, ISO9001 Internal Auditor, and Splunk Admin/Knowledge Manager.

Why is it so important to continuously learn and train yourself?


ADDITIONAL CONTRIBUTIONS BY NIK ALLEYNE:

WEBCASTS

Getting To Know Nik Alleyne, SANS DEI Webcast, May 2021

Full Packet Capturing with TShark for Continuous Monitoring & Packet Threat Intelligence via IP, Domains and URLS

Canadian Webcast Series Part 3: ICS Defense: It’s Not a “Copy-Paste” From an IT Playbook & Importance of Intrusion Detection in a Compromised Prone World

TOOLS

  • pktIntel - This tool is used to perform threat intelligence against packet data.
  • QRadar Threat Intelligence - Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious Ips.
  • DNSSpoof - Script to perform and teach how easy it is to build a DNS Spoofing tool using scapy.


BOOKS

Hack and Detect: Leveraging the Cyber Kill Chain for Practical Hacking and its Detection via Network Forensics

Learning By Practicing - Mastering TShark Network Forensics: Moving From Zero to Hero

MORE

You can read Nik's blog here.