<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: gaurav kundu</title>
    <description>The latest articles on Forem by gaurav kundu (@gaurav_kundu_c6eee7120819).</description>
    <link>https://forem.com/gaurav_kundu_c6eee7120819</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3855898%2F5bcdfb0d-e713-417b-9cdd-35263e72b596.png</url>
      <title>Forem: gaurav kundu</title>
      <link>https://forem.com/gaurav_kundu_c6eee7120819</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/gaurav_kundu_c6eee7120819"/>
    <language>en</language>
    <item>
      <title>Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)</title>
      <dc:creator>gaurav kundu</dc:creator>
      <pubDate>Thu, 02 Apr 2026 02:15:06 +0000</pubDate>
      <link>https://forem.com/gaurav_kundu_c6eee7120819/why-soc-analysts-get-inconsistent-results-from-chatgpt-and-how-structured-workflows-fix-it-24mb</link>
      <guid>https://forem.com/gaurav_kundu_c6eee7120819/why-soc-analysts-get-inconsistent-results-from-chatgpt-and-how-structured-workflows-fix-it-24mb</guid>
      <description>&lt;p&gt;If you've ever handed a security alert to ChatGPT and gotten a different answer each time — you've hit the real problem.&lt;/p&gt;

&lt;p&gt;It's not the model. It's the prompt.&lt;/p&gt;

&lt;p&gt;Most analysts paste an alert and ask "what do you think?" That's like asking a junior analyst to investigate without a runbook. You'll get something back, but the quality depends entirely on how the question was framed.&lt;/p&gt;

&lt;h2&gt;
  
  
  The real problem: no structure
&lt;/h2&gt;

&lt;p&gt;Experienced SOC analysts don't wing investigations. They follow a process:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Triage the alert&lt;/li&gt;
&lt;li&gt;Map to MITRE ATT&amp;amp;CK&lt;/li&gt;
&lt;li&gt;Check for lateral movement&lt;/li&gt;
&lt;li&gt;Build a containment recommendation&lt;/li&gt;
&lt;li&gt;Write a ticket summary&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The issue is that most AI-assisted workflows skip steps 2–5 and jump straight to "is this bad?"&lt;/p&gt;

&lt;h2&gt;
  
  
  What I built
&lt;/h2&gt;

&lt;p&gt;I spent time building &lt;a href="https://socworkflows.com" rel="noopener noreferrer"&gt;SOC.Workflows&lt;/a&gt; — a free collection of structured investigation workflows for SOC analysts. Each workflow breaks an investigation into 4 steps, with specific prompts for each step, designed to run in ChatGPT or Claude.&lt;/p&gt;

&lt;p&gt;Current workflows:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing Email Investigation&lt;/li&gt;
&lt;li&gt;AWS VPC Flow Log Analysis&lt;/li&gt;
&lt;li&gt;PowerShell &amp;amp; Script Analysis&lt;/li&gt;
&lt;li&gt;Credential Dumping Investigation&lt;/li&gt;
&lt;li&gt;Ransomware Triage&lt;/li&gt;
&lt;li&gt;Identity Compromise Investigation&lt;/li&gt;
&lt;li&gt;URL &amp;amp; Domain Analysis&lt;/li&gt;
&lt;li&gt;SOC Alert Triage&lt;/li&gt;
&lt;li&gt;Explain This Alert&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How it works
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Pick a workflow matching your alert type&lt;/li&gt;
&lt;li&gt;Copy the workflow prompt&lt;/li&gt;
&lt;li&gt;Paste into ChatGPT or Claude&lt;/li&gt;
&lt;li&gt;Get structured, step-by-step analysis&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;No login. No setup. No API keys.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why structure matters
&lt;/h2&gt;

&lt;p&gt;When I ran the same phishing alert through an unstructured prompt vs. the structured workflow, the difference was clear:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Unstructured:&lt;/strong&gt; "This looks like a phishing email. Check the sender domain."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Structured:&lt;/strong&gt; SPF/DKIM validation → header analysis → sender reputation → verdict with risk score → recommended response actions&lt;/p&gt;

&lt;p&gt;Same model. Completely different output quality.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try it
&lt;/h2&gt;

&lt;p&gt;If you work in a SOC or do blue team work, I'd love feedback on which investigation types are missing.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://socworkflows.com" rel="noopener noreferrer"&gt;socworkflows.com&lt;/a&gt; — free, no login required&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>blueteam</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>SOC Workflow: How I Investigate a Phishing Alert (Step-by-Step)</title>
      <dc:creator>gaurav kundu</dc:creator>
      <pubDate>Wed, 01 Apr 2026 15:08:47 +0000</pubDate>
      <link>https://forem.com/gaurav_kundu_c6eee7120819/soc-workflow-how-i-investigate-a-phishing-alert-step-by-step-53n7</link>
      <guid>https://forem.com/gaurav_kundu_c6eee7120819/soc-workflow-how-i-investigate-a-phishing-alert-step-by-step-53n7</guid>
      <description>&lt;p&gt;Phishing alerts are one of the most common — and most time-consuming — tasks in a SOC.&lt;/p&gt;

&lt;p&gt;But the problem is not the alert itself.&lt;/p&gt;

&lt;p&gt;The problem is &lt;strong&gt;lack of structured workflow&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Without a clear process, analysts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Miss important signals&lt;/li&gt;
&lt;li&gt;Waste time switching tools&lt;/li&gt;
&lt;li&gt;Produce inconsistent results&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So here’s the exact &lt;strong&gt;step-by-step workflow I use to investigate a phishing alert&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 Step 1: Initial Triage
&lt;/h2&gt;

&lt;p&gt;Start with the basics:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Who reported the email?&lt;/li&gt;
&lt;li&gt;Internal or external sender?&lt;/li&gt;
&lt;li&gt;Subject line / urgency indicators&lt;/li&gt;
&lt;li&gt;Any attachments or links?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 Goal: Quickly understand if this is likely phishing or just noise&lt;/p&gt;




&lt;h2&gt;
  
  
  🔗 Step 2: Extract Indicators (IOCs)
&lt;/h2&gt;

&lt;p&gt;Pull all possible IOCs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sender email address&lt;/li&gt;
&lt;li&gt;Domain&lt;/li&gt;
&lt;li&gt;URLs&lt;/li&gt;
&lt;li&gt;File hashes (attachments)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 This becomes your investigation base&lt;/p&gt;




&lt;h2&gt;
  
  
  🌐 Step 3: Reputation Check
&lt;/h2&gt;

&lt;p&gt;Check:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;VirusTotal&lt;/li&gt;
&lt;li&gt;MalwareBazaar&lt;/li&gt;
&lt;li&gt;URL reputation tools&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Look for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Known malicious domains&lt;/li&gt;
&lt;li&gt;Newly registered domains&lt;/li&gt;
&lt;li&gt;Low reputation signals&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧪 Step 4: Email Analysis
&lt;/h2&gt;

&lt;p&gt;Analyze headers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SPF / DKIM / DMARC status&lt;/li&gt;
&lt;li&gt;Sender spoofing&lt;/li&gt;
&lt;li&gt;Reply-to mismatch&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Impersonation attempts&lt;/li&gt;
&lt;li&gt;Display name abuse&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🖥️ Step 5: Endpoint Impact
&lt;/h2&gt;

&lt;p&gt;Did the user:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click the link?&lt;/li&gt;
&lt;li&gt;Download attachment?&lt;/li&gt;
&lt;li&gt;Execute anything?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check EDR:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Process activity&lt;/li&gt;
&lt;li&gt;PowerShell / script execution&lt;/li&gt;
&lt;li&gt;Network connections&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔐 Step 6: Account Activity
&lt;/h2&gt;

&lt;p&gt;Check identity logs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Suspicious login attempts&lt;/li&gt;
&lt;li&gt;MFA prompts&lt;/li&gt;
&lt;li&gt;Impossible travel&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 Especially important for credential phishing&lt;/p&gt;




&lt;h2&gt;
  
  
  📊 Step 7: Scope &amp;amp; Impact
&lt;/h2&gt;

&lt;p&gt;Answer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Is it isolated or widespread?&lt;/li&gt;
&lt;li&gt;More users affected?&lt;/li&gt;
&lt;li&gt;Any lateral movement?&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🚨 Step 8: Response Actions
&lt;/h2&gt;

&lt;p&gt;Depending on severity:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Block domain / URL&lt;/li&gt;
&lt;li&gt;Quarantine email&lt;/li&gt;
&lt;li&gt;Reset user credentials&lt;/li&gt;
&lt;li&gt;Isolate endpoint (if needed)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  📝 Step 9: Documentation
&lt;/h2&gt;

&lt;p&gt;Always document:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Timeline&lt;/li&gt;
&lt;li&gt;Indicators&lt;/li&gt;
&lt;li&gt;Actions taken&lt;/li&gt;
&lt;li&gt;Final verdict&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 This improves future detection&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚡ Final Thought
&lt;/h2&gt;

&lt;p&gt;SOC work becomes easier when you stop reacting to alerts…&lt;/p&gt;

&lt;p&gt;…and start following &lt;strong&gt;repeatable workflows&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This is exactly why I started building structured workflows for investigations:&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://socworkflows.com" rel="noopener noreferrer"&gt;https://socworkflows.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It’s a growing library of step-by-step SOC workflows designed to reduce investigation time and improve consistency.&lt;/p&gt;




&lt;p&gt;If you're a SOC analyst, I'd love to know:&lt;/p&gt;

&lt;p&gt;👉 Do you follow a structured workflow or investigate ad-hoc?&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49er99rey5sog2zfourn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49er99rey5sog2zfourn.png" alt=" " width="800" height="413"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>threathunting</category>
      <category>ai</category>
      <category>phishing</category>
    </item>
  </channel>
</rss>
