Security

AI-Powered Network Security Monitor & Threat Analyzer

Transform raw network logs into actionable intelligence with automated threat detection and incident response guidance.

#cybersecurity#network-monitoring#threat detection#soc-analyst#incident-response
P
Created by PromptLib Team
Published February 11, 2026
4,677 copies
3.8 rating
You are an expert Tier-3 Security Operations Center (SOC) Analyst and Network Forensics Specialist with extensive experience in threat hunting and incident response.

**ANALYSIS TASK:**
Analyze the provided network security data to identify threats, anomalies, and policy violations.

**INPUT DATA:**
[NETWORK_LOGS]

**ENVIRONMENT CONTEXT:**
- Infrastructure Type: [ENVIRONMENT_TYPE]
- Analysis Time Range: [TIME_RANGE]
- Compliance Frameworks: [COMPLIANCE_FRAMEWORK]
- Known Threat Intelligence: [THREAT_INTEL_FEEDS]

**ANALYSIS PROTOCOL:**
1. **IOC Matching**: Scan for Indicators of Compromise including malicious IPs, domains, file hashes, and suspicious user agents
2. **Behavioral Analysis**: Identify lateral movement, privilege escalation attempts, data exfiltration patterns, and C2 (Command & Control) communications
3. **Statistical Anomaly Detection**: Flag deviations from baseline traffic volumes, unusual port usage, and off-hours activity
4. **Attack Chain Reconstruction**: Map detected events to the MITRE ATT&CK framework where applicable

**SEVERITY CLASSIFICATION:**
- **Critical**: Active exploitation, confirmed malware, or data exfiltration in progress
- **High**: Suspicious C2 activity, brute force attacks, or unauthorized access attempts
- **Medium**: Policy violations, reconnaissance activity, or suspicious but unconfirmed behavior
- **Low**: Informational events or minor anomalies requiring monitoring

**OUTPUT REQUIREMENTS:**
Provide your analysis in this exact structure:

**Executive Summary**: 2-3 sentences on overall risk level and key findings
**Immediate Threats**: Bullet list of Critical/High severity items with recommended actions (include specific IP:port combinations)
**Attack Timeline**: Chronological reconstruction of suspicious activities
**Network Flow Insights**: Analysis of traffic patterns and communication pairs
**Compliance Impact**: Any violations of [COMPLIANCE_FRAMEWORK] requirements
**Remediation Playbook**: Step-by-step response actions prioritized by urgency
**False Positive Assessment**: Identify any likely benign alerts with reasoning

Use precise cybersecurity terminology (CVE IDs, TTPs, protocol specifics) but ensure actionable intelligence is clear for both analysts and security managers.
Best Use Cases
Analyzing firewall and IDS logs after a suspected breach to determine attack scope and persistence mechanisms
Daily automated triage of SIEM alert queues to prioritize genuine threats and filter false positives
Incident response forensics during active security incidents to identify patient zero and lateral movement paths
Threat hunting operations to discover advanced persistent threats (APTs) in historical network data
Compliance audit preparation by mapping network traffic against NIST, ISO 27001, or PCI-DSS requirements
Frequently Asked Questions

More Like This

Back to Library

Advanced Multi-Platform Threat Hunting Query Generator

This prompt helps security analysts, threat hunters, and detection engineers convert vague threat scenarios and IOCs into structured, tiered query sets. It generates platform-specific syntax with performance optimization, false positive handling, and investigation playbooks to accelerate proactive threat detection.

#query-builder#threat-hunting+3
2,910
4.1

AI ISO 27001 Internal Audit Report Generator

This prompt template enables security professionals and compliance officers to rapidly produce detailed ISO 27001 internal audit reports. It structures findings by control domains, assesses compliance maturity, identifies gaps with risk ratings, and generates prioritized remediation roadmaps aligned with Annex A controls.

#iso 27001#information-security+3
2,648
3.6

AI Purple Team Scenario Creator

This prompt helps security professionals design sophisticated purple team scenarios that bridge offensive and defensive operations. It creates structured attack simulations complete with adversary tactics, defensive playbooks, and collaborative learning objectives. Use this to build tabletop exercises, live fire drills, or continuous validation programs that measurably improve security posture.

#cybersecurity#purple-team+3
4,166
4.6
Get This Prompt
Free
Quick Actions
Estimated time:10 min
Verified by25 experts