Open SourceMIT LicenseSelf-hosted

Open source AI
incident response platform.

SOC Beacon ingests logs, runs YARA + Sigma rules, and enriches every alert with AI analysis and threat intelligence automatically.

Focused on alerting and detection for high-severity events — not a visibility or threat hunting suite.

No $50K/yr enterprise contract. No week-long onboarding. Just open source incident response workflows your analysts can use on day one.

$0
License cost
4 AI
Analyst agents
100%
Self-hosted
SOC Beacon alert console preview
SOC Beacon logo

SOC Beacon

Open source AI incident response

Scroll

The problem

Full-visibility platforms cost $50K+ per year and take months to configure.
Your analysts still drown in uncontextualized alert noise.

What you get instead

An incident response stack for alerting and detection.
Open source. Self-hosted. Free.

Every capability a lean SOC team needs — from ingestion to AI enrichment to closed incident — in one self-hosted workflow.

Log Ingestion

Every log. Every source.

REST API and syslog ingestion with API key auth. Single-log and batch support. Raw messages are parsed and normalized automatically — no manual field mapping required.

REST APISyslogBatch

AI Enrichment

4 AI analysts. Per alert. Automatically.

Multi-agent analysis gives every alert a scored, multi-perspective investigation before your analyst opens it. Defaults to gpt-4.1-nano to keep costs near zero.

OpenAIMulti-agentCost-aware

Alert Triage

Close more incidents, faster.

Verdict and status workflow baked in. Mark alerts malicious, suspicious, or false positive. Track status from unassigned to resolved without leaving the dashboard.

VerdictsWorkflowDashboard

Threat Intelligence

IOC context, zero API keys required.

Built-in enrichment for IPs, domains, URLs, and file hashes from open sources — no registration needed. Add key-based premium feeds when you're ready.

IOC LookupOpen IntelFeeds

Detection Engines

YARA + Sigma. Out of the box.

Load your own YARA and Sigma rule sets with a configurable path. Toggle individual rules on or off. Detection runs at ingestion — no separate pipeline needed.

YARASigmaMITRE ATT&CK

Scoring & Analytics

AI score + heuristics. Per alert.

Every alert gets an AI Score and Heuristics Score displayed as visual ring indicators. High = red. Low = green. Sortable, filterable columns for high-volume queues.

AI ScoreHeuristicsVisual
Product preview

Built for analysts who need clarity.

Real SOC workflows in a clean, fast UI. The screenshots below are pulled directly from the dashboard.

Unified Alert Console
Unified Alert Console

Unified Alert Console

One queue, scored by AI and heuristics, with instant verdicting.

Alert Detail View
Alert Detail View

Alert Detail View

Tabs for raw logs, MITRE context, and intel enrichment.

AI Analyst Notes
AI Analyst Notes

AI Analyst Notes

Multi-agent summaries with confidence and recommended actions.

IOC Intelligence
IOC Intelligence

IOC Intelligence

IP, domain, and hash lookups inline — no API keys required.

End-to-End Workflow

From raw log to
closed incident.

Four automated stages turn event noise into actionable intelligence your team can act on immediately.

01

Ingest

Logs arrive via REST API or syslog. Each event is parsed, normalized, and stored with severity metadata extracted or inferred from the raw message.

POST /api/v1/logs
02

Classify

The detection engine runs YARA and Sigma rules against each event. Alert is generated with MITRE ATT&CK mapping, severity, and baseline metadata.

YARA + Sigma -> Alert
03

Enrich

Threat intelligence lookups run on IPs, domains, and hashes. Then AI agents (1–4 perspectives) analyze the alert and produce scored findings with recommended verdict.

TI Lookup + AI Analysis
04

Triage

Analysts review enriched alerts in the dashboard — AI score, heuristics score, MITRE context, threat intel, and raw log all in one tabbed view. Set verdict and close.

Dashboard -> Resolved
FAQ

Questions teams ask before they deploy.

Clear positioning on what SOC Beacon is and is not, plus key capability answers for evaluators.

Is SOC Beacon a full SIEM?

SOC Beacon focuses on alerting and detection workflows with AI enrichment. It is not positioned as a full visibility or threat hunting SIEM.

What is an AI incident response platform?

It ingests security events, runs detections, enriches alerts with AI and threat intelligence, and helps analysts triage incidents faster.

Is SOC Beacon open source?

Yes. SOC Beacon is open source and self-hosted under the MIT License.

Does it support YARA and Sigma rules?

Yes. You can load YARA and Sigma rule sets to detect malicious activity during ingestion.

Total value — clear and simple

Everything enterprise incident response platforms charge
$50,000/yr for.

You get all of it. Open source. Self-hosted. No vendor. No contract. Deploy today.

AI alert enrichment

Multi-agent, runs automatically

Included

Threat intelligence lookups

IPs, domains, hashes — no API key

Included

YARA + Sigma detection

Load your own rule sets

Included

MITRE ATT&CK mapping

Per alert, auto-generated

Included

Analyst triage dashboard

Verdict + incident status workflows

Included

Self-hosted deployment

Your infra, your data

Included

Vendor lock-in

Because it's open source

$0 risk

Ready to deploy?

Your incident response stack goes live today.
Not next quarter.

Clone the repo, add your OpenAI key, point your log sources at the API endpoint, and you're running a full AI-enriched alerting workflow.

$git clone https://github.com/PolGs/soc-beacon

No account required · No credit card · No cloud dependency · MIT License