SOAR-Lite: Automating IP Triage and Risk Scoring for IR Teams
Security teams today work with powerful tools like Splunk, Cortex XSOAR, CrowdStrike, SentinelOne, and others. But even with all that firepower, every IR team has faced this:
➡️ The need to make quick decisions based on multiple external sources, in situations where not everything is automated.
It was in one of those moments that I realized how much time is still wasted on simple, repetitive, manual processes — and I decided to build something lightweight, practical, and useful that could run anywhere, with or without full integrations.
🎯 The challenge that motivated the project
During real investigations, I realized that even in well-structured environments, not every workflow is covered by full automation.
For example, when an analyst receives a list of suspicious IPs from alerts (e.g., via Splunk or an EDR), the process typically includes:
This process is repetitive, time-consuming, and often inconsistent. In organizations that don’t have full SOAR platforms, this cycle may take:
What I built
A simple but powerful system that:
🧪 Real-world scenario: no automation vs. my open-source tool
Let’s say your team receives 30 alerts in one afternoon with suspicious IPs. You don’t have Cortex XSOAR or SentinelOne Automate.
📉 Before:
⚡ With this project:
Time saved: 85 minutes Decision consistency: 100% Threat visibility by country: always up to date
What do you see when using the tool?
When you send alerts to the API:
✅ You get a JSON response like:
[
{
"src_ip": "185.220.101.17",
"event_type": "brute_force",
"risk_score": 95,
"suggested_action": "BLOCK IMMEDIATELY",
"enrichment": {
"abuse_score": 100,
"country": "RU",
"total_reports": 78,
"last_reported_at": "2025-04-06T10:00:00Z",
"usage_type": "Data Center"
}
}
]
🧠 In the IDE:
Recommended by LinkedIn
In the browser:
You visit: 📎 http://localhost:8000/report And view a clear HTML report, showing the enriched alerts, risk score, country, and recommended action — ready to be shared or archived.
💡 What I learned
🧬 Coming soon: LLMs in the Incident Response pipeline
Over the past few months, I've been diving deep into the application of Artificial Intelligence in cybersecurity — especially how Large Language Models (LLMs) can assist, explain, and automate parts of the Incident Response process.
I'm currently working on a new feature for SOAR-Lite that will integrate LLMs in a lightweight and intelligent way, focused on:
This update is already in the prototyping phase — and will soon be available in the project.
Stay tuned — SOAR-Lite is about to start thinking more like an analyst.
📂 Open source repository
If you work in IR, threat hunting, or security automation and want to see how simple tools can save time and reduce risk — feel free to explore, clone, and contribute.
🙋♂️ About me
I'm Renato Kopke, a cybersecurity professional focused on Incident Response, Threat Hunting, and Security Automation. This project was born from real-world experience and the desire to share something that helps analysts work faster and with more clarity.
Senior Support/Infrastructure Analyst | IaC | Technical leader
3wFantástico.
Bridging the gap between Product Security and AppSec | Vulnerability Management
1moIt looks like a great solution.
Cybersecurity Professional | Compliance & Risk Management Expert | CISA Candidate | Lead Auditor Certified | Turning Complex Threats Into Simple Solutions.
1moThis is brilliant!
Algosec Resident Engineer Team Leader
1moAditya Nautiyal
Algosec Resident Engineer Team Leader
1moNasir Uddin