Back to Archive

Detection Engineering Assistant (MCP-Based)

TLP:AMBER February 2026
MCP LLM Integration Detection Engineering

Executive Summary

Designed and implemented an MCP server that indexes internal detections as code and enriches them with 7,000+ public rules for context — enabling automated MITRE coverage analysis, detection gap identification, and production-ready SPL/KQL generation to support our detection engineering lifecycle.

Public detections provide benchmarking and contextual intelligence. Internal detections remain authoritative and prioritized in all coverage analysis and recommendations.

7,000+
Public Detections Indexed
4
Detection Platforms
80+
MCP Tools Exposed

Key Achievement: Validated end-to-end workflow by generating a production-ready SIEM detection query through natural language interaction with Claude Desktop. Additionally, submitted a full vendor-style threat intelligence report and successfully received actionable detection recommendations generated through the MCP platform.

The Problem

Detection engineering requires constant cross-referencing across multiple rule libraries, MITRE ATT&CK mapping, and time-consuming gap analysis. The knowledge landscape is fragmented:

Traditional approaches involve manually browsing GitHub repositories, searching documentation, and cobbling together analysis in spreadsheets—a workflow that doesn't scale.

Technical Solution

Architecture Overview

Detection Sources Parser Layer Normalized Schema SQLite (FTS5) MCP Tool Registry LLM

Data Ingestion & Normalization

Built parsers for each detection source that extract and normalize:

All detections stored in SQLite with FTS5 (full-text search) indexing, enabling:

MCP Tool Design

Exposed 80+ specialized tools through MCP interface, organized by capability:

Key Architectural Decisions

Real-World Validation

Tested the system end-to-end to validate production viability:

  1. Connected MCP server to Claude Desktop on macOS
  2. Requested MITRE coverage gap analysis on indexed detections
  3. Asked assistant to identify missing coverage for technique T1550 (Use Alternate Authentication Material)
  4. Requested generation of a Splunk SPL detection query for the gap
  5. Received production-ready query with proper data model usage and field references
  6. Submitted vendor-style detection report and received actionable recommendations
  7. Query executed successfully in production SIEM, returning expected results

This validation proved:

Why This Matters

This project demonstrates a fundamentally different approach to detection engineering—one that treats detections as queryable intelligence rather than scattered files. By making this knowledge LLM-accessible through MCP, complex analytical workflows become natural language interactions.

Strategic Value: This isn't just "I wrote some SPL rules." This is systems thinking applied to detection engineering—data modeling, AI integration, platform design, and production-oriented architecture. It positions detection engineering as a measurable, AI-assisted discipline rather than artisanal craftsmanship.

Tech Stack

Typescript Model Context Protocol SQLite FTS5