Flask-Based SOC Threat Detection
Краткое
Freelancer Client is hiring: Flask-Based SOC Threat Detection.
Location: Remote
I need a lightweight Security Operations Center application that focuses on real-time threat detection. The core of the build will be a Python + Flask web dashboard that consumes data from my existing Wazuh deployment. For now I only require basic monitoring level integration: pull the alert feed, normalize it, and surface the key events.
What you'll do:
• analyze the attack through system logs,
Skills: Python, Django, Cryptography, Bootstrap, Web Development, Flask, API Development, Data Protection
Budget: $30–$250 USD
Source: Freelancer Client via Remote / Online. Apply on the source website.
Оригинал
I need a lightweight Security Operations Center application that focuses on real-time threat detection. The core of the build will be a Python + Flask web dashboard that consumes data from my existing Wazuh deployment. For now I only require basic monitoring level integration: pull the alert feed, normalize it, and surface the key events.
design and develop a Python application dedicated to ethical hacking.
The application will simulate attack and defense scenarios in a controlled environment,
with a focus on cryptography, security analysis, and best practices for data protection.
Attacker's Side:
1. Develop Python source code (Python Notebook) to simulate a controlled attack in a
laboratory environment (virtual machine such as Kali Linux or equivalent).
2. Develop a graphical user interface (GUI) application to manipulate, manage, and deploy the controlled attack (e.g., an application based on Django and/or Flask).
Victim's Side:
Develop a GUI application or install/configure an Intrusion Detection System (IDS).
The objective is to implement a Security Operations Center (SOC) that will:
• analyze the attack through system logs,
• use an intrusion detection system (IDS) and/or a firewall,
• and generate security alerts in case of suspicious behavior.
II. Deliverables:
1- Digital report (detailed)
2- Presentation + demonstration
3- Source code (.py or Notepad (.ipynb)) + web application
Conclusion: This project illustrates how applications developed by ethical hackers can strengthen cybersecurity by enabling the identification of vulnerabilities, the evaluation of defense mechanisms, and the implementation of proactive monitoring and rapid threat detection.
Локация & Details
Перейти к источнику →About this listing
This remote opportunity was imported from Freelancer and is shown here for discovery. To apply, follow the link to the original posting.