
Mathis Chermette contributed to the SEKOIA-IO/intake-formats repository by engineering robust data ingestion and parsing pipelines for security event logs, focusing on authentication, session modeling, and intrusion detection. He refined YAML-based parser configurations and JSON test data to align with ECS standards, improve log categorization, and support evolving UI and network event schemas. Mathis enhanced test automation, expanded compatibility for Juniper NGFW logs, and improved documentation for experimental integrations. His work emphasized configuration management, data validation, and CI/CD practices, resulting in more reliable log processing, reduced onboarding friction, and higher data quality for downstream analytics and security workflows.
In January 2026, the SEKOIA-IO intake formats repository delivered robust enhancements to the parser, expanded Juniper tag handling, introduced test coverage for numeric tags, refined RFC 5424 and BSD log formats, and tightened static rule parsing and logging. These changes improve data quality, reduce ingestion errors, and strengthen observability while delivering business value through greater compatibility with Juniper devices and more reliable log ingestion.
In January 2026, the SEKOIA-IO intake formats repository delivered robust enhancements to the parser, expanded Juniper tag handling, introduced test coverage for numeric tags, refined RFC 5424 and BSD log formats, and tightened static rule parsing and logging. These changes improve data quality, reduce ingestion errors, and strengthen observability while delivering business value through greater compatibility with Juniper devices and more reliable log ingestion.
In 2025-12, the SEKOIA-IO/intake-formats workstream delivered three key capabilities, implemented targeted test-data improvements, and strengthened overall reliability for security detections. The work prioritized business value through beta readiness, parser accuracy, and test-driven quality. Key features delivered: - Juniper NGFW Beta Release: Product beta status enabling broader testing and feedback. Commits include manifest update under d72b42cca2c58beade44a61c01ae2e2ad3dd70b5 (Co-authored by Sébastien Quioc). - Intrusion Detection ECS Categorization: Adds ECS category handling for intrusion detection in the parser configuration and updates related test data. Commits 0dfa4b0ea9daf6fd2be86e4e6f35a1d81c46d43d, 483b15751610888a91eb3075a8094888ae45c38e, 327d0b2661400aab92f5a85f55e5fc2ca43cfac0. - Parser Configuration Ignored Values Enhancements: Enhances parser config with ignored_values handling and aligns test logs. Commits 9d037185e33bc5c479e3c6fc8790bf0fe68f0dc5, 0a8aab4991817d8ef8d8fc0029e70afa286f4823, ece661b895a18033abaec5d93b4da49e64326d4d, ddfc7544ae49e6217416c51e34abfb7f58836630, b97a8a98ad2e7692a62eca8f25771b9ab19bced9. Major bugs fixed / test-data integrity: - Updated test data and outcomes to reflect intrusion_detection ECS categorization and to align RTS/RT_SCREEN_ICMP.json entries; ensured outcome type reflects current semantics (e.g., outcome success rather than info) for accurate test validation (matching 0dfa4b0e, 327d0b2...). - Parser config improvements for ignored_values improved clarity and accuracy of test results across multiple test log files (RT_FLOW_SESSION_*.json entries). Overall impact and accomplishments: - Accelerated beta readiness for Juniper NGFW integration with early feedback loops and improved stakeholder confidence. - Enhanced parsing accuracy and test coverage for intrusion detection categorization, increasing reliability of detections in downstream workflows. - Strengthened data quality and test reproducibility through systematic test-log updates and configuration handling. Technologies / skills demonstrated: - YAML-based config management (parser.yml, manifest.yml updates). - JSON test data curation and test-log alignment (RT_FLOW_*.json, RT_SCREEN_ICMP.json, RT_FLOW_SESSION_*.json). - ECS taxonomy integration for intrusion detection. - Cross-functional collaboration and co-authored commits.
In 2025-12, the SEKOIA-IO/intake-formats workstream delivered three key capabilities, implemented targeted test-data improvements, and strengthened overall reliability for security detections. The work prioritized business value through beta readiness, parser accuracy, and test-driven quality. Key features delivered: - Juniper NGFW Beta Release: Product beta status enabling broader testing and feedback. Commits include manifest update under d72b42cca2c58beade44a61c01ae2e2ad3dd70b5 (Co-authored by Sébastien Quioc). - Intrusion Detection ECS Categorization: Adds ECS category handling for intrusion detection in the parser configuration and updates related test data. Commits 0dfa4b0ea9daf6fd2be86e4e6f35a1d81c46d43d, 483b15751610888a91eb3075a8094888ae45c38e, 327d0b2661400aab92f5a85f55e5fc2ca43cfac0. - Parser Configuration Ignored Values Enhancements: Enhances parser config with ignored_values handling and aligns test logs. Commits 9d037185e33bc5c479e3c6fc8790bf0fe68f0dc5, 0a8aab4991817d8ef8d8fc0029e70afa286f4823, ece661b895a18033abaec5d93b4da49e64326d4d, ddfc7544ae49e6217416c51e34abfb7f58836630, b97a8a98ad2e7692a62eca8f25771b9ab19bced9. Major bugs fixed / test-data integrity: - Updated test data and outcomes to reflect intrusion_detection ECS categorization and to align RTS/RT_SCREEN_ICMP.json entries; ensured outcome type reflects current semantics (e.g., outcome success rather than info) for accurate test validation (matching 0dfa4b0e, 327d0b2...). - Parser config improvements for ignored_values improved clarity and accuracy of test results across multiple test log files (RT_FLOW_SESSION_*.json entries). Overall impact and accomplishments: - Accelerated beta readiness for Juniper NGFW integration with early feedback loops and improved stakeholder confidence. - Enhanced parsing accuracy and test coverage for intrusion detection categorization, increasing reliability of detections in downstream workflows. - Strengthened data quality and test reproducibility through systematic test-log updates and configuration handling. Technologies / skills demonstrated: - YAML-based config management (parser.yml, manifest.yml updates). - JSON test data curation and test-log alignment (RT_FLOW_*.json, RT_SCREEN_ICMP.json, RT_FLOW_SESSION_*.json). - ECS taxonomy integration for intrusion detection. - Cross-functional collaboration and co-authored commits.
This month focused on delivering ECS-aligned session modeling and robust parser improvements to SEKOIA-IO data pipelines, with a strong emphasis on business value through accurate, standardized event data and automated CI-ready documentation.
This month focused on delivering ECS-aligned session modeling and robust parser improvements to SEKOIA-IO data pipelines, with a strong emphasis on business value through accurate, standardized event data and automated CI-ready documentation.
Summary for 2025-10: Focused on stabilizing the intake formats pipeline and aligning data models with evolving UI and security events. Delivered parser configuration cleanup that eliminates noise, hardened defaults, and clarified docs, resulting in more predictable data pipelines and reduced maintenance. Updated UI schemas and fields to reflect current UI events and command structures, enabling faster integration and fewer data-model mismatches. Expanded metadata and filename handling, improving data enrichments for downstream analytics and security workflows. Improved test fixtures for admin authentication events, boosting test coverage and reliability. Overall, these changes reduce data quality risk, accelerate onboarding of new events, and demonstrate strong proficiency in YAML/configuration management, JSON schema, fixtures, and cross-team collaboration.
Summary for 2025-10: Focused on stabilizing the intake formats pipeline and aligning data models with evolving UI and security events. Delivered parser configuration cleanup that eliminates noise, hardened defaults, and clarified docs, resulting in more predictable data pipelines and reduced maintenance. Updated UI schemas and fields to reflect current UI events and command structures, enabling faster integration and fewer data-model mismatches. Expanded metadata and filename handling, improving data enrichments for downstream analytics and security workflows. Improved test fixtures for admin authentication events, boosting test coverage and reliability. Overall, these changes reduce data quality risk, accelerate onboarding of new events, and demonstrate strong proficiency in YAML/configuration management, JSON schema, fixtures, and cross-team collaboration.
September 2025 monthly summary focusing on the SEKOIA-IO/documentation repo. Delivered targeted documentation enhancements for Broadcom SiteMinder, including removal of outdated 'Further readings' links and a beta usage warning to set expectations and collect user feedback. These changes improve onboarding, reduce support inquiries, and provide clearer guidance for an experimental integration format.
September 2025 monthly summary focusing on the SEKOIA-IO/documentation repo. Delivered targeted documentation enhancements for Broadcom SiteMinder, including removal of outdated 'Further readings' links and a beta usage warning to set expectations and collect user feedback. These changes improve onboarding, reduce support inquiries, and provide clearer guidance for an experimental integration format.
August 2025 (2025-08): Delivered reliability, configurability, and guidance improvements for SEKOIA-IO/intake-formats. Core work focused on authentication test fixtures and acceptance flows, parser/configuration alignment, and project manifest/guidance updates. These changes increased test stability, improved parsing correctness, and streamlined deployment/configuration, delivering business value through faster iteration cycles and reduced risk in authentication-related features and data processing.
August 2025 (2025-08): Delivered reliability, configurability, and guidance improvements for SEKOIA-IO/intake-formats. Core work focused on authentication test fixtures and acceptance flows, parser/configuration alignment, and project manifest/guidance updates. These changes increased test stability, improved parsing correctness, and streamlined deployment/configuration, delivering business value through faster iteration cycles and reduced risk in authentication-related features and data processing.

Overview of all repositories you've contributed to across your timeline