Here’s my quick an dirty lab workout for Detection Engineers. I do this work out 2 to 3 times a week for about 2 hours. #CyberSecurity#infosec#BlackTechTwitter
First you’ll need a lab. I don’t romanticize the struggles of building a lab. Sure, you learn a lot but you’re trying to start building detections. So I recommend using an automated set up like this one. github.com/clong/Detectio…
Next, you’ll need a way to simulate a text to your environment. My favorite for beginners is @redcanary’s atomic request team github.com/redcanaryco/at…
Run the atomic on you target box. Analyze the logs in Splunk, velociraptor, and OSquery. Start thinking about things that you could build detections on.
Remember, if you’re too broad, then you’ll generate too many false positives. If you’re too precise, you may miss suspicious behavior. Try to find a balance. The goal is to produce high fidelity, reliable alerts.
Think about potential false positives. Maybe you can create an exception for those. Maybe you can add something to your rule that illuminates things for you
Now that you have some ideas, try writing rules in different formats. My favorite are Sigma, Yara, OSquery, SPL.
Deploy the rules and run the attack again. Did your alert fire? Try changing your attack script slightly. Run a different application or run the file from a different path or directory still work?
Don’t stress yourself out. If a rule isn’t working the way you think it should decompose the rule, and the attack to figure out why. As Detection Engineers, this is what you’ll do during every detection cycle. Things don’t always work the first time
Detection engineering is as much about eliminating brittle or inefficient rule sets as it is developing high fidelity, reliable ones.
Few of us get this right the first time. It’s an exercise of trial and error. And even after the rule is in production, it’s never finished. Good luck
• • •
Missing some Tweet in this thread? You can try to
force a refresh
🚨🔍👨💻🛡️ I got few questions about what a Detection Engineers does. Daily tasks range from monitoring security systems to designing and developing detection logic? Here are some common tasks that I perform on given day #Cybersecurity#DetectionEngineer#SecurityOperations#SIEM
1️⃣ Building SIEM Architecture
Some detection engineers build SIEM architecture to collect, process, store, analyze, and respond to security-related data from various sources to identify potential security threats and alerts the security team.
2️⃣ Monitoring Security Systems
Detection engineers monitor security systems, review logs/alerts/reports, identify potential threats, and investigate suspicious activities. Essential in security ops.
📚🔒👀 Need a good book this weekend? Want to be a Detection Engineer? Want to level up your detection game? Look no further! Check out my personal reading recommendations on the history and evolution of detection. #cybersecurity#detectionengineering#books#readinglist 🤓📖
1️⃣ First up is "An Intrusion Detection Model" by Dorothy Denning, a pioneering 1987 paper that proposes a model for intrusion detection consisting of data collection, analysis, and management.
2️⃣ "Detection Engineering: Defending Networks with Purpose" by Peter Di Giorgio discusses the importance of custom detection logic in network security.
Are you interested in becoming a Detection Engineer? 🕵️♂️🔎
Detection Engineers play a crucial role in identifying and preventing security breaches in organizations. But what skills do you need to become one? Here's a road map to guide you. #DetectionEngineer#CyberSecurity
Technical Skills: A strong foundation in network security technologies, protocols, programming languages, and tools like IDPS, firewalls, and SIEM systems is essential.
Cybersecurity Knowledge: Understanding common attack methods, threat actors, and security best practices is crucial for detecting and preventing security breaches.
My quick and dirty list of not-so-obvious complementary skills for Detection Engineers. These are the things I study on my "low-tech" days. Most of these are mindset/procces centric and require minimal technology. #infosec#CyberSecurity#DetectionEngineers#BlackTechTwitter
First up, Statistical Analysis. Statistical analysis is the process of collecting and analyzing data in order to discern patterns and trends. This is useful when establishing baselines and identifying anomalies. simplilearn.com/what-is-statis…
Second, Reasoning. Understanding the different types of reasoning and when you should apply them will allow you to efficiently analyze massive amounts of data. indeed.com/career-advice/…