Hazem Elbaz

From SIEMs to LLMs: Why I’m Building AI Tools for Cybersecurity

A personal reflection on why I moved from traditional log analysis tools to LLM-powered log insight engines.

From SIEMs to LLMs: Why I’m Building AI Tools for Cybersecurity

For years, I worked with SIEM platforms, firewalls, EDRs, and an endless stream of logs.

Like most security professionals, I knew the routine:

At some point, I asked myself: What if the system could “understand” what the logs are saying, not just parse them?


The Limits of Traditional SIEMs

Traditional SIEMs are excellent at:

But they lack context.
They don’t understand language.
They can’t summarize, explain, or infer like a human analyst.

That’s where Large Language Models (LLMs) come in.


Why LLMs?

LLMs, like GPT-4, bring something new to the table:

✅ They can summarize complex log entries
✅ Extract anomalies or outliers
✅ Translate logs into natural language
✅ Work across diverse sources without custom parsers

It’s not magic — it’s structured prompting, validation, and iteration.


My First Attempt: Log Analyzer LLM

That’s why I built my first prototype:
Log Analyzer with LLM

It:

It’s still early, but the potential is clear:

“I’m not replacing the SOC analyst — I’m giving them a second brain.”


What’s Next?


If you’ve ever been overwhelmed by thousands of logs and dozens of dashboards —
LLMs might be the tool you’ve been waiting for.


📬 Have thoughts? Want to collaborate?
Find me on LinkedIn or explore my next AI-for-cybersecurity projects.