Designed and implemented a security monitoring lab to simulate attacker behavior and analyze how events are captured, processed, and detected within a SIEM.
The environment consists of a Cowrie SSH honeypot generating attacker activity and a Wazuh SIEM ingesting, analyzing, and generating alerts based on that activity through custom detection rules.

Created a custom Wazuh rule to detect command execution within the honeypot environment:
Simulated attacker activity by connecting to the honeypot via SSH and executing commands:
ssh -p 2222 root@localhost
whoami
exit

Confirmed that Cowrie logs were successfully ingested and parsed by Wazuh.

Validated that custom detection rules triggered alerts based on attacker commands.

This project simulates a real-world security monitoring pipeline by integrating a honeypot with a SIEM to capture, analyze, and detect attacker behavior.
It demonstrates practical experience in log ingestion, detection engineering, and alert validation, reflecting core workflows performed by SOC analysts in identifying and responding to security events.