Automates the ingestion, normalization, and integration of global threat intelligence feeds into SIEM and SOC platforms.
This skill enables security teams to operationalize threat intelligence by building automated pipelines that connect STIX/TAXII, open-source, and commercial feeds directly to detection systems. It handles the complexities of data normalization into STIX 2.1 format, deduplication across multiple sources, and distribution to platforms like Splunk, MISP, or Elastic Security. By automating the flow of Indicators of Compromise (IOCs), it ensures real-time matching against network telemetry while reducing manual overhead for SOC analysts and security engineers.
主な機能
01Real-time IOC distribution to SIEM platforms
02Feed quality and match rate analytics
03Automated STIX/TAXII 2.1 feed ingestion
04Automated indicator expiration and lifecycle management
05Multi-source normalization and deduplication
064,120 GitHub stars
ユースケース
01Standardizing commercial threat data into a unified STIX 2.1 format for cross-tool compatibility
02Reducing false positives by implementing indicator scoring and health monitoring metrics
03Onboarding OSINT feeds like Abuse.ch and AlienVault OTX into a SOC environment