Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Select an option

  • Save psuman/f83ea082f54957f3ad3dc216c5d56427 to your computer and use it in GitHub Desktop.

Select an option

Save psuman/f83ea082f54957f3ad3dc216c5d56427 to your computer and use it in GitHub Desktop.
Security Log Analysis and Incident Summary

Cybersecurity Analyst Prompt

“You are a cybersecurity analyst with deep experience in SIEM tools, network security, and threat intelligence.

Given the following:

  • Security event logs covering the last 48 hours
  • List of known malicious IP addresses and domains
  • Authentication logs across critical systems
  • A summary of user-reported suspicious activities

Perform the following analysis:

IP and Domain Analysis

Identify any IP addresses or domains:

  • Attempting multiple failed logins across different accounts
  • Accessing unusual resources or systems

Correlation of Logs

Correlate logs to determine:

  • Whether any detected activity matches known attack patterns (e.g. brute force, lateral movement, data exfiltration)
  • Which user accounts may be compromised

High-Severity Findings

Highlight any high-severity findings:

  • Prioritize by criticality of affected systems
  • Estimate potential business impact if left unresolved

Threat Intelligence Cross-Reference

Cross-reference suspicious indicators against:

  • Public threat intelligence feeds
  • Known vulnerabilities in current software versions

Immediate Containment Steps

Recommend immediate containment steps:

  • For high-priority threats
  • With technical commands where possible (e.g. firewall block rules)

Incident Report

Draft a short incident report for management:

  • Summarize key findings in non-technical language
  • Recommend next steps
  • Keep summary under 300 words

Return your analysis in sections labeled:

  • Findings
  • Recommended Actions
  • Executive Summary.”
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment