Skip to content

Detection Engineering, Threat Hunting, and Cloud Threat Detection projects — from on-prem to the cloud, with automation and real-world simulation.

License

zoerab/YetAnotherDetectionLab

Repository files navigation

🧪 YetAnotherDetectionLab

Welcome to my detection engineering & threat hunting lab — a living portfolio that documents my journey from on-prem to cloud-native detection engineering and threat hunting.


🔍 Purpose

This repo showcases my work in:

  • 📦 Detection rule creation (Sigma, YARA, Suricata)
  • 🐍 Python automation for threat detection & enrichment
  • ⚙️ Cortex XSOAR playbook development
  • ☁️ Cloud-native threat detection and response
  • 🧪 Real-world threat simulation and hunting

Each project is built, tested, and documented as part of my transition into a Cloud Threat Detection Engineer role.


📁 Repository Structure

Folder Description
detection-engineering/ Detection rules, methodologies, and documentation
  └─documentation/ Methodology guides and templates
  └─sigma-rules/ Sigma detection rules for various platforms
  └─suricata-rules/ Suricata network detection rules
  └─yara-rules/ YARA rules for file/memory detection
  └─kql/ KQL detections and snippets
automation/ Scripts, playbooks, and CI/CD configurations
  └─scripts/ Python scripts for security automation
  └─playbooks/ Automation playbook definitions
  └─ci-cd/ CI/CD pipeline configurations
cloud-security/ Cloud-native security detection and response
  └─aws/ AWS-specific detection rules and tools
  └─azure/ Azure-specific detection rules and tools
  └─gcp/ GCP-specific detection rules and tools
  └─runtime/ Runtime security tools and configurations
packet-analysis/ Network packet analysis tools and methods
  └─wireshark/ Wireshark profiles and configurations
  └─zeek/ Zeek scripts and log analysis
  └─pcaps/ PCAP analysis methodologies (no actual PCAPs)
  └─stratoshark/ Cloud-native packet analysis
resources/ Learning resources used/worth mentioning
threat-hunting/ Threat hunting reports, methodologies, and templates
  └─hunt-reports/ Documented threat hunting exercises
  └─methodologies/ Hunting methodologies and frameworks
  └─templates/ Templates for hunt planning and reporting
xsoar-playbooks/ Cortex XSOAR playbooks for automation and response

🚀 Latest Projects

Detection Engineering

Documentation & Templates

Packet Analysis


🧠 Skills Demonstrated

  • Detection-as-Code (Sigma, YAML, Panther-style CI/CD)
  • Threat Hunting (Zeek, Suricata, JA3/JA4+, DNS tunneling, C2 detection)
  • Cloud-native detection (AWS CloudTrail, Azure Sign-In logs)
  • Python automation for detection logic
  • Security Orchestration (Cortex XSOAR)
  • Network packet analysis and forensics

🌐 Background & Experience

The work in this repository leverages my professional background as:

  • Cyber Security Analyst at Universiteit Antwerpen (2022-present)
  • Security System Administrator at AP Hogeschool (2017-2022)
  • ICT System Engineer specializing in various IT fields (2007-2014)

My career transition builds on strong foundations in Threat Hunting, Network Engineering, Endpoint Security Management, and Threat Detection.


📬 Contact & Connect


Licensed under MIT License

About

Detection Engineering, Threat Hunting, and Cloud Threat Detection projects — from on-prem to the cloud, with automation and real-world simulation.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages