Incident Response Playbook
Build a step-by-step incident response playbook for a specific attack type, covering detection, containment, eradication, recovery, and lessons learned.
Cyber Security AnalystClaude +3
Multi-Framework Compliance Gap Analysis
Perform a regulatory compliance gap analysis across multiple frameworks simultaneously, mapping control overlaps and producing a unified remediation roadmap.
Cyber Security AnalystCo-Pilot +3
Penetration Test Findings Report
Produce a professional penetration test findings report with an executive summary, technical findings ranked by CVSS score, and remediation guidance.
Cyber Security AnalystChatGPT +3
Security Awareness Briefing
Draft a clear, jargon-free security awareness briefing on a specific threat for a non-technical audience, including real-world examples and actionable advice.
Cyber Security AnalystClaude +3
Security Posture Gap Analysis
Evaluate an organisation's current security posture against a chosen framework (NIST, ISO 27001, CIS) and produce a gap analysis with remediation priorities.
Cyber Security AnalystClaude +3
SIEM Alert Investigation
Investigate a cluster of SIEM alerts and determine whether they represent a genuine threat, a false positive, or a coordinated attack pattern requiring escalation.
Cyber Security AnalystClaude +3
STRIDE Threat Modelling
Conduct a comprehensive threat modelling exercise for a new system or application using the STRIDE framework, producing a full risk register and mitigation plan.
Cyber Security AnalystClaude +3
Threat Assessment & IOC Analysis
Analyse a suspicious file or email and produce a structured threat assessment with indicators of compromise and recommended containment actions.
Cyber Security AnalystClaude +3
Vulnerability Scan Triage
Triage a batch of vulnerability scan results by severity, exploitability, and business impact and generate a prioritised remediation backlog.
Cyber Security AnalystClaude +3
Zero Trust Architecture Review
Design a Zero Trust security architecture review for an existing network, identifying trust assumptions, lateral movement risks, and a phased implementation roadmap.
Cyber Security AnalystGemini +3