siem

Installation
SKILL.md

siem

Purpose

This skill monitors and analyzes security events and logs in real-time to detect threats and enable incident response, focusing on blue-team operations.

When to Use

Use this skill during active security monitoring, such as investigating anomalies in network logs, responding to potential breaches, or correlating events across systems. Apply it in environments with high log volumes, like enterprise networks, to prioritize alerts over manual reviews.

Key Capabilities

  • Real-time log ingestion and parsing from sources like syslog, Windows Event Logs, or cloud APIs.
  • Threat detection rules based on Sigma or YARA formats for custom signatures.
  • Alert generation and escalation via email, Slack, or webhook integrations.
  • Correlation of events to identify patterns, such as failed logins followed by data exfiltration.
  • Dashboard visualization using tools like Kibana for quick insights into metrics like event frequency and top threats.

Usage Patterns

To set up monitoring, configure data sources first, then define queries or rules. For ongoing use, run periodic queries in scripts or integrate via API calls. Pattern 1: Query logs for specific events. Pattern 2: Automate alerts by scheduling rule checks. Always use environment variables for authentication, e.g., set $SIEM_API_KEY before operations.

Related skills
Installs
25
GitHub Stars
5
First Seen
Mar 7, 2026