Skip to content
View nichxlxs's full-sized avatar
💻
💻
  • Australia
  • 18:03 (UTC +11:00)

Block or report nichxlxs

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
nichxlxs/README.md

About Me

I am a Cyber Security Engineer and Cloud Architect focused on operational defense, client security architecture, and long-term risk reduction.

At work (MSP), I focus on:

  • Security Incident Response: triage, containment, recovery, and lessons learned.
  • Cybersecurity Stack Architecture: planning and designing layered controls across diverse client environments.
  • Automation & AI Engineering: in-house scripting and development of monitoring automations and custom security solutions.
  • Audit & Compliance Execution: working directly with auditors and evidence workflows.
  • Pentest Remediation: prioritizing and closing findings with measurable risk reduction.
  • Security Roadmaps: strategy, architecture, deployment, and implementation of security initiatives.
  • Governance, Risk, and Compliance (GRC): governance design, control mapping, policy uplift, and risk tracking.
  • Framework Alignment: ISO 27001, CIS Controls, Essential Eight, and core blue-team operations.
  • Networking & Protocol Analysis: extensive networking experience with deep-dive protocol work across TLS, SSL, DNS, and related controls.

Current Focus

Outside of work, I am building agentic AI solutions for security, including agents capable of reverse engineering and analyzing files, systems, programs, and binaries.

I am also building a browser extension to detect both MITM proxy phishing pages and generic phishing sites by combining:

  • browser heuristics,
  • CSP, DOM, and CSS signals,
  • domain and TLS intelligence,
  • and ML-driven classification to block malicious destinations in real time.

Independent Security Research Projects


Core Stack

JavaScript TypeScript Python Java Node.js Azure Docker Linux


Certifications

  • Microsoft Certified: Azure Solutions Architect Expert (AZ-305)
  • Microsoft Certified: Cybersecurity Architect Expert (SC-100)
  • Microsoft Certified: Azure Security Engineer Associate (AZ-500)
  • Microsoft Certified: Identity and Access Administrator (SC-300)
  • Microsoft Certified: Azure Administrator Associate (AZ-104)
  • Microsoft Certified: Azure Network Engineer Associate (AZ-700)
  • Microsoft Certified: Azure Virtual Desktop Specialty (AZ-140)
  • Microsoft 365 Certified: Enterprise Administrator Expert (MS-102)
  • Microsoft 365 Certified: Endpoint Administrator Associate (MD-102)
  • Microsoft 365 Certified: Fundamentals (MS-900)
  • CompTIA Network+
  • Certificate III - Information, Digital Media, and Technology

GitHub Stats

GitHub Stats Top Languages
GitHub Streak

Connect With Me


Pinned Loading

  1. nichxlxs nichxlxs Public

    2

  2. VAC-Bypass VAC-Bypass Public archive

    How VAC worked, how it was bypassed, and why the industry moved to kernel anti-cheat. Educational. Based on Daniel Krupinski's VAC/VAC-Bypass.

    Rust