This project simulates real-world Security Operations Center (SOC) activities by combining SIEM, digital forensics, and network traffic analysis. The goal is to detect, analyze, and investigate potential security incidents within a network environment.
This task was completed as a part of my Vulnerability Assessment and Penetration Testing (VAPT) Internship at Cyart Technologies in March 2026.
- To understand SOC workflows and operations
- To detect security incidents using SIEM concepts
- To perform basic digital forensics
- To analyze network traffic for threat detection
- Log monitoring and analysis
- Network traffic inspection
- Incident detection and investigation
- Basic forensic analysis techniques
- SIEM Tool (Splunk / ELK Stack) (if used)
- Wireshark (Traffic Analysis)
- Autopsy / Forensics Tools (if used)
- Kali Linux / Linux Environment
- Configured SIEM and monitoring tools
- Prepared system for log collection
- Collected logs from system/network
- Monitored events for suspicious activity
- Captured and analyzed network packets
- Identified anomalies in communication
- Detected suspicious patterns and alerts
- Correlated logs and traffic data
- Investigated system artifacts
- Analyzed evidence for potential compromise
- Documented incidents and findings
- Suggested remediation steps
- Identified suspicious log patterns
- Detected anomalies in network traffic
- Correlated multiple indicators of compromise
- Understanding of SOC workflows
- Hands-on experience with SIEM concepts
- Basic digital forensics investigation
- Ability to correlate logs and traffic data
- Handling large volumes of logs
- Understanding SIEM configurations
- Correlating multiple data sources
- Interpreting forensic artifacts
- SIEM is critical for centralized monitoring
- Early detection reduces damage
- Forensics helps in root cause analysis
- Continuous monitoring improves defense
This project provided practical exposure to SOC operations, including monitoring, detection, and investigation of security incidents. It strengthened the understanding of real-world cybersecurity workflows.
- Implement advanced SIEM rules
- Automate incident response
- Integrate threat intelligence
- Perform deep forensic investigations
Aditya Mehta
Cybersecurity Enthusiast | SOC Analyst Aspirant