detection-engineer

Community

Turn findings into production-ready detections.

Authorgl0bal01
Version1.0.0
Installs0

System Documentation

What problem does it solve?

Create detection rules and hunting queries from malware analysis findings to drive rapid, accurate detection across SIEMs, IDS/IPS, and threat hunting workflows.

Core Features & Use Cases

  • Sigma rule generation for SIEM detection across platforms (Splunk, Elastic, QRadar)
  • Suricata/NIDS rule creation for network visibility
  • Defanging IOCs for safe sharing and interoperability
  • Hunting queries and reporting to operationalize findings for SOC teams
  • Format conversion of IOCs and detections (STIX, OpenIOC, CSV) with confidence and volatility assessment

Quick Start

Use this skill to convert a malware analysis finding into Sigma and Suricata rules, generate hunting queries, and export IOCs in standard formats for SOC deployment.

Dependency Matrix

Required Modules

None required

Components

Standard package

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: detection-engineer
Download link: https://github.com/gl0bal01/malware-analysis-claude-skills/archive/main.zip#detection-engineer

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.