Data sources encountered during my SecOps career
During my SecOps career I monitored event logs from multiple vendors. Below are concise notes on a few common sources I worked with.
During my SecOps career I monitored event logs from multiple vendors. Below are concise notes on a few common sources I worked with.
High-fidelity detection, telemetry normalization and investigative tooling to surface and contextualise threats across your estate.
SIEM platforms collect, normalise and correlate logs and events from across cloud, identity, network and endpoints to detect suspicious activity, enable investigations and support compliance.
Familiar with commercial and open-source SIEMs. I choose solutions based on scale, telemetry profiles and operational needs.
Endpoint telemetry, Windows event logs / Sysmon, network and perimeter logs, cloud audit logs, identity logs and application/container logs.
Credential misuse & lateral movement, ransomware detection, persistence and privilege escalation, data exfiltration and cloud misconfiguration monitoring.