02 // SKILL FOLDER
Security Analysis
Threat modeling, log triage, incident response and evidence-chain notes.
Threat modelingLog analysisIncident response
Articles
Log triage checklist
A reusable checklist for common investigation workflows.
Log triage checklist
1. Define the time window. 2. Identify critical assets. 3. Correlate accounts, IPs, processes and file paths. 4. Preserve the evidence chain.