About

AI Security, Cyber Defense & Compliance Architect

I help AI and technology teams build security programs that actually work — technically sound, audit-ready, and built to scale.

Nicholas Vidal

Nicholas Vidal

AI Security, Cyber Defense & Compliance Architect

I've spent nearly two decades working where cyber defense, incident response, infrastructure security, and risk management collide in environments where mistakes actually matter and failure has real consequences.

My background is hands-on by necessity, not theory. I've worked real incidents, operated under real constraints, and led teams responsible for keeping mission-critical systems up and running — not just looking good on paper.

I focus on helping teams bake security into how they build, not bolt it on at the end. That means practical controls, clear documentation, and security programs that support velocity instead of becoming a bottleneck.

Before shifting deeper into AI-driven systems and automation, I led and executed cybersecurity operations across global environments supporting tens of thousands of users, high-availability networks, and regulated systems aligned with NIST, RMF, and federal security standards. Today, I bring that same rigor to modern AI, cloud, and DevSecOps environments.

I'm building a repeatable approach to AI security and compliance because I keep seeing the same patterns:

  • Security treated as an afterthought
  • Compliance reduced to a checkbox exercise
  • Teams stuck between "we know this matters" and "we don't know where to start"

My goal is simple: security that enables trust, growth, and resilience — without unnecessary friction or theater.

Current Work

Active Projects

Building practical security, AI, and training systems that work in the real world.

I focus on applied security — projects that harden systems, train people, and close real gaps between policy, engineering, and operations. Below are the initiatives I'm actively building and evolving.

Human-First AI, Always

AI safety, security, and guardrails for real-world systems

A research and applied framework focused on building AI systems that are:

  • Secure by design
  • Aligned with human decision-making
  • Transparent, auditable, and failure-aware

This work explores AI threat modeling, misuse prevention, guardrails, and operational safety — especially where AI intersects with cybersecurity, compliance, and human trust.

Explore insights and writing

Zero Hour Cyber Academy

Hands-on cybersecurity & AI training — no fluff

A practical learning platform designed for:

  • Career-switchers and transitioning professionals
  • Students and early-career defenders
  • Builders who want real skills, not just theory

Training emphasizes:

  • Incident response & forensics
  • Defensive architecture
  • AI-augmented security workflows
  • Hands-on labs using Docker, GitHub, and real tooling
View the academy

PHS Cyber & AI Initiative

Workforce development starting before college

A local education initiative bringing modern cybersecurity and AI concepts to high school students through:

  • Gamified labs and CTF-style challenges
  • Real-world security scenarios
  • Ethical hacking, forensics, and defense fundamentals

The goal is early exposure to how security actually works, not just buzzwords.

See the program

Security Automation & Cyber Range Projects

Where theory meets execution

Ongoing technical projects including:

  • AI-augmented DevSecOps pipelines
  • Configuration and IaC security auditing
  • Local LLM-powered security agents
  • Enterprise-style cyber range for red/blue team simulation
  • SIEM integration and live telemetry analysis

These projects serve as both R&D and proof of execution — the same patterns I bring into client environments.

View technical projects

Background

Experience & Focus Areas

A track record of securing complex systems, leading under pressure, and translating risk into action.

Cyber Defense & Incident Response

  • Digital forensics and incident response across classified and unclassified environments
  • Post-incident analysis and remediation planning
  • Threat hunting and continuous monitoring
  • Executive-level incident leadership and reporting

Cloud, Infrastructure & Network Security

  • Secure design and operation of hybrid Windows/Linux environments
  • Network segmentation, firewalling, IDS/IPS, and VPN security
  • Proxmox, pfSense, VLAN-based architectures
  • Secure infrastructure design aligned to NIST SP 800-53 and RMF

Compliance & Risk Management

  • NIST SP 800-53 / 800-37 control implementation and assessment
  • Vulnerability management and remediation tracking
  • Inspection readiness and audit support
  • Translating compliance requirements into engineering-friendly controls

DevSecOps & Automation

  • CI/CD security using GitHub Actions
  • YAML, Docker, and configuration auditing
  • Infrastructure-as-Code security fundamentals
  • AI-assisted security analysis and reporting

AI-Augmented Security

  • Local LLM-powered security automation using Ollama (Mistral)
  • AI agents for configuration review, policy drift detection, and remediation guidance
  • AI-generated security documentation, SARs, and reports
  • Early work in AI-assisted threat modeling and control validation

Enterprise Security Operations

  • Global environments supporting tens of thousands of users
  • High-availability network security
  • Federal security standards compliance
  • Security program building and leadership

Credentials

Education & Certifications

Professional credentials that validate expertise across security, compliance, and cyber defense domains.

M.S. Digital Forensics & Cyber Investigation

University of Maryland Global Campus

In progress, 2026

B.S. Computer Networks & Cybersecurity

University of Maryland Global Campus

2023

CISSP

(ISC)²

Expected 2026

CompTIA Security+

CompTIA

Active Certification

CompTIA A+

CompTIA

Active Certification

Philosophy

How I Approach Security

Principles that guide every engagement and every recommendation.

Security Should Enable the Mission

Controls should exist to reduce risk and support outcomes — not to satisfy checklists at the expense of velocity.

Built for Reality, Not Slides

Every recommendation is shaped by operational experience, not theoretical frameworks alone.

Documentation Matters

If you can't explain your controls clearly, you don't really have them. Audit readiness starts with clarity.

Partnership Over Policing

Security works best when it integrates into how teams already build and operate.

Designed to Scale

What works today should still work as the organization grows — technically and organizationally.

Let's Build Security the Right Way

Whether you're strengthening your security foundation, building AI-aware defenses, or preparing for future compliance requirements, I focus on clear, practical, and defensible security programs. If you want security that works in the real world — not just on paper — let's talk.