Skip to content

This project demonstrates hands-on experience and practical applications from SOC Level 1 training on Cybrary. It covers key aspects of security operations, including Defensive Security Fundamentals, Log Analysis, Host-Based Detection,

Notifications You must be signed in to change notification settings

Joe-kag/SOC-L1-Analyst-Project

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 

Repository files navigation

SOC-L1-Analyst-Project

Overview πŸ›‘οΈ

This project demonstrates hands-on experience and practical applications from SOC Level 1 training on Cybrary. It covers key aspects of security operations, including Defensive Security Fundamentals, Log Analysis, Host-Based Detection, and Network-Based Detection. The project utilizes industry-standard tools such as Wazuh, Elastic Stack, Kibana, The Hive, and Linux to analyze security events, detect threats, and respond to incidents. πŸ–₯️

Table of Contents πŸ“‘

Overview

Tools Used

Project Structure

Defensive Security Fundamentals

Log Analysis

Host-Based Detection

Network-Based Detection

Installation & Setup

Use Cases

Contributions

License

Tools Used πŸ› οΈ

Wazuh - Open-source SIEM and threat detection tool

Elastic Stack (Elasticsearch, Logstash, Kibana) - Log analysis and visualization

Kibana - Data visualization and dashboarding

The Hive - Security incident response platform

Linux - Host-based analysis and security monitoring

Project Structure πŸ“‚πŸ“πŸ—„

### SOC_L1_Project/ │── defensive_security_fundamentals/ │── log_analysis/ │── host_based_detection/ │── network_based_detection/ │── setup/ │── use_cases/ │── README.md

Defensive Security Fundamentals πŸ”’πŸ›‘

Covers core functions of defensive security, including:

Security Operations Center (SOC) roles and responsibilities

Cyber risk management and threat modeling

Security ticketing and incident tracking

Log Analysis πŸ“œπŸ”

Focuses on analyzing logs to detect security events:

Windows Event Logs analysis

SIEM fundamentals and log correlation

Incident response based on log patterns

Host-Based Detection πŸ–₯οΈπŸ”ŽπŸ›‘

Extends log analysis to detect threats at the endpoint level:

Endpoint Detection and Response (EDR) tools

Persistence mechanisms in Windows environments

Local and domain-based authentication events

Network-Based Detection πŸŒπŸ“‘βš οΈ

Analyzes network traffic for anomalies and malicious activity:

Identifying network observables and indicators of compromise (IoCs)

Web activity logs and network packet analysis

Detecting and analyzing spearphishing attacks

Installation & Setup βš™οΈπŸ”§πŸ–₯️

Step-by-step setup for the tools used in this project:

Install Wazuh SIEM and configure log forwarding

Set up Elastic Stack for log processing and visualization

Deploy The Hive for incident management

Configure Linux-based monitoring for endpoint security

Use Cases πŸŽ―πŸ”πŸš¨

Use Case 1: Suspicious Authentication Event πŸ΄β€β˜ οΈπŸ”“βš οΈ

Detect failed login attempts in Windows Event Logs

Correlate logs with SIEM to identify brute force attempts

Investigate user behavior and take remediation actions

Use Case 2: Spearphishing Attack Detection πŸ“§πŸŸπŸš¨

Analyze email headers and attachments for phishing indicators

Identify network traffic anomalies using Elastic Stack

Respond using The Hive for incident tracking and mitigation

Use Case 3: Malware Execution on Endpoint πŸ¦ πŸ’»πŸ”

Monitor process execution logs in Wazuh

Detect persistence mechanisms using Windows security logs

Isolate the affected host and conduct forensic analysis

Contributions 🀝πŸ“₯πŸ”§

Contributions are welcome! Feel free to submit pull requests or open issues to improve this project.

License πŸ“œβš–οΈπŸ”“

This project is licensed under the MIT License.###

Image

Image

Image

About

This project demonstrates hands-on experience and practical applications from SOC Level 1 training on Cybrary. It covers key aspects of security operations, including Defensive Security Fundamentals, Log Analysis, Host-Based Detection,

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published