Loading...
Loading...
Guides SOC operations—alert triage, SIEM/EDR investigation, enrichment, playbook execution, false-positive closure, escalation decisions, and detection tuning feedback. Use when working SOC queues, investigating suspicious alerts, correlating events, documenting analyst notes, or deciding escalate vs close—not for declared incident command, timelines, evidence preservation, or regulatory comms (incident-responder), incident program design (incident-management-engineer), binary/firmware RE (reverse-engineer), red team operations (red-team-specialist), or enterprise security strategy (cybersecurity).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill soc-analystincident-responderincident-management-engineerred-team-specialistinformation-security-engineerthreat-hunterreverse-engineer| Need | Skill |
|---|---|
| Escalate declared security incident | |
| Incident program, escalation matrix | |
| Security strategy and IR policy | |
| Red team / purple team exercise design | |
| Tooling implementation (SIEM, EDR, SOAR) | |
| Cloud audit and account forensics | |
| Proactive threat hunts and hunt campaigns | |
| Detection tuning and DFIR-style investigation | |
| Disk/memory forensics and chain of custody | |
| Binary/protocol RE, patch diff, YARA from samples | |
| Vetted IOC/TTP packages and tactical intel for enrichment | |
threat-hunterincident-responderincident-responder/references/incident_declaration_and_severity.md