Loading...
Loading...
Guides defensive security analysis—alert triage, log and SIEM investigation, threat hunting, detection engineering basics, MITRE ATT&CK mapping, incident scoping, containment recommendations, and DFIR evidence handling for SOC and blue-team analysts. Use when investigating security alerts, writing detection rules, tuning false positives, analyzing EDR/network/auth logs, building timelines of suspicious activity, recommending containment steps, or documenting findings for incident command—not for enterprise security strategy (cybersecurity), CI/CD pipeline hardening (devsecops), offensive pentest execution (authorize red team separately), or LLM adversarial testing (ai-redteam), or designing on-call rotations and postmortem programs (incident-management-engineer).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill defensive-security-analystsoc-analystcybersecurityoffensive-security-analystdevsecopsincident-management-engineerinformation-security-engineer| Need | Skill |
|---|---|
| SOC queue triage, playbooks, shift turnover | |
| Security program, GRC, architecture | |
| Pipeline and IaC security | |
| Rollout during active incident | |
| Platform logs and infra forensics | |
| Incident comms documentation | |
| Authorized pentest or red-team execution | |
| Incident commander process, SEV, postmortems | |
| Outcome | Next step |
|---|---|
| False positive | Tune detection; document FP reason |
| Benign TP | Close with justification; optional allowlist |
| True positive | Open incident; begin investigation |
references/alert_triage.mdcollect sources → normalize UTC timeline → identify IOCs → map ATT&CK → hypothesis → validatereferences/investigation_timeline.mdreferences/detection_engineering.mdreferences/threat_hunting.md| Action | When |
|---|---|
| Disable user session | Compromised credentials |
| Isolate host (EDR network containment) | Active malware/C2 |
| Block IOC at proxy/firewall | Confirmed malicious comms |
| Revoke OAuth/app tokens | Token theft |
references/containment_handoff.mdreferences/investigation_timeline.mdreferences/alert_triage.mdreferences/investigation_timeline.mdreferences/detection_engineering.mdreferences/threat_hunting.mdreferences/containment_handoff.md