Skip to main content
Home / Services / Log Analysis & Forensic Review

Log Analysis & Forensic Review

Hands-on review of security logs to answer the questions your SIEM can't

Log Analysis & Forensic Review ASSESSMENT
2
CRITICAL
6
HIGH
11
MEDIUM
5
LOW
External perimeter testingPASSED
Application security testingPASSED
Remediation verificationIN PROGRESS
Final report deliveryPENDING
Overview

What This Engagement Covers

A comprehensive assessment tailored to your environment.

Targeted, analyst-driven review of your log data — incident triage, compromise assessments, audit support, or just "what happened last Tuesday at 2am?"

Our Process

What We Test & How

What We Test

Any log source you have — endpoint, identity, network, cloud, SaaS audit logs, email gateways, WAF, DNS. We query, correlate, and deliver a narrative.

Our Approach

Scoped engagement with a defined question. We ingest the relevant logs, run analyst-driven queries, build a timeline, and hand back a written narrative plus the queries so you can re-run them yourself.

Deliverables

What You'll Receive

Everything included in your engagement report.

Written narrative answering the scoped question

Reusable queries and dashboards

Timeline of relevant events

Indicators of compromise if found

Recommendations for future monitoring

Methodology

Our Testing Methodology

A structured approach to identifying and validating vulnerabilities.

1

Scope definition and log source identification

2

Data ingest and normalization

3

Analyst-driven querying and pivoting

4

Timeline construction

5

Findings write-up and delivery

Findings

Common Vulnerabilities We Find

Typical security issues discovered during this type of engagement.

Account takeover via token replay Insider data exfiltration patterns Dormant backdoor activity Misconfigured service accounts Audit evidence gaps
Who It's For

Ideal For

Teams needing one-off forensic review
Organizations in pre-litigation discovery
Companies with audit evidence requests
Suspected compromise triage
Compliance

Standards We Support

SOC 2 HIPAA PCI-DSS GDPR

Ready to Get Started?

$6,500

Typical engagement: 1-3 weeks per engagement

Why Us

Why Lorikeet Security

Certified Experts

OSCP, OSCE, CEH, GPEN certified professionals

Auditor Ready

Reports designed for compliance audits

Free Retesting

Validate fixes at no additional cost

Expert Support

Direct access to testing team during remediation

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!