<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: gaurav kundu</title>
    <description>The latest articles on DEV Community by gaurav kundu (@gaurav_kundu_c6eee7120819).</description>
    <link>https://dev.to/gaurav_kundu_c6eee7120819</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3855898%2F5bcdfb0d-e713-417b-9cdd-35263e72b596.png</url>
      <title>DEV Community: gaurav kundu</title>
      <link>https://dev.to/gaurav_kundu_c6eee7120819</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/gaurav_kundu_c6eee7120819"/>
    <language>en</language>
    <item>
      <title>How to Triage a Phishing Alert Faster — Without Rebuilding the Process Every Time</title>
      <dc:creator>gaurav kundu</dc:creator>
      <pubDate>Tue, 21 Apr 2026 20:38:12 +0000</pubDate>
      <link>https://dev.to/gaurav_kundu_c6eee7120819/how-to-triage-a-phishing-alert-faster-without-rebuilding-the-process-every-time-118b</link>
      <guid>https://dev.to/gaurav_kundu_c6eee7120819/how-to-triage-a-phishing-alert-faster-without-rebuilding-the-process-every-time-118b</guid>
      <description>&lt;p&gt;Most phishing alerts do not take long because they are difficult. They take long because the workflow is inconsistent.&lt;/p&gt;

&lt;p&gt;You get the alert.&lt;/p&gt;

&lt;p&gt;A user reported a suspicious email. Maybe your mail gateway flagged it. Maybe your SIEM created a case. Either way, you now have the same question every SOC analyst has asked a hundred times:&lt;/p&gt;

&lt;p&gt;Is this real, or is this noise?&lt;/p&gt;

&lt;p&gt;The problem is not that phishing triage is impossible. The problem is that most teams still do it in a fragmented way.&lt;/p&gt;

&lt;p&gt;One analyst checks the headers first. Another starts with the sender domain. Someone else jumps straight to the links. Then comes the write-up, the ticket note, the escalation decision, and the inevitable feeling that you may have missed something small but important.&lt;/p&gt;

&lt;p&gt;That is where the time goes. Not in any one check by itself. In the lack of a repeatable process.&lt;/p&gt;

&lt;p&gt;Over time, I found that the fastest way to triage phishing was not to become "faster" at each individual step. It was to stop rebuilding the workflow from scratch every time.&lt;/p&gt;

&lt;p&gt;This is the process I use now to move from a suspicious email to a structured triage note in minutes instead of dragging the same alert through 20 different micro-decisions.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why phishing triage often takes longer than it should
&lt;/h2&gt;

&lt;p&gt;Most analysts are doing several things at once when a phishing alert lands: checking sender and reply-to details, reviewing SPF, DKIM, and DMARC, inspecting links and domains, deciding whether the message looks like credential harvesting, malware delivery, or simple spam, and documenting findings for a ticket or escalation.&lt;/p&gt;

&lt;p&gt;None of those steps are unreasonable. The slowdown comes from doing them in a different order every time, with different depth, and often with different output formats depending on who is on shift.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;First problem: time loss.&lt;/strong&gt; You keep re-parsing the same raw material manually — raw headers, sender path, suspicious domains, authentication results, URLs and context.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Second problem: inconsistency.&lt;/strong&gt; Two analysts can look at the same phishing email and produce two very different summaries, severities, and next actions. That is not just a people problem. It is a workflow problem. A structured first-pass triage fixes both.&lt;/p&gt;




&lt;h2&gt;
  
  
  The workflow I use now
&lt;/h2&gt;

&lt;h3&gt;
  
  
  Step 1 — Get the full raw email
&lt;/h3&gt;

&lt;p&gt;The first thing I want is not just the visible message body. I want the full raw email: headers, sender path, authentication results, and the message body.&lt;/p&gt;

&lt;p&gt;In Gmail, that means opening the message and using Show original. In Outlook or other mail clients, there is usually a similar option to view the full source.&lt;/p&gt;

&lt;p&gt;Why this matters: if you only look at the visible email, you miss some of the most useful phishing indicators — Reply-To mismatches, Return-Path differences, SPF / DKIM / DMARC results, sending infrastructure clues, and message routing signals.&lt;/p&gt;

&lt;p&gt;The body tells you what the attacker wants you to believe. The raw email tells you how the message actually traveled. You need both.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 2 — Run a structured first-pass analysis
&lt;/h3&gt;

&lt;p&gt;Instead of manually pulling the email apart every time, I paste the raw message into a phishing triage workflow that handles the first-pass parsing for me.&lt;/p&gt;

&lt;p&gt;I use &lt;a href="https://socworkflows.com" rel="noopener noreferrer"&gt;SOC.Workflows&lt;/a&gt;, which is a browser-based tool I built for exactly this kind of structured analyst workflow. The important part is not the brand. The important part is the sequence.&lt;/p&gt;

&lt;p&gt;Paste the raw email into a structured analyzer, and let it do the first-pass breakdown:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;sender and reply-to mismatch&lt;/li&gt;
&lt;li&gt;SPF / DKIM / DMARC results&lt;/li&gt;
&lt;li&gt;suspicious domains or lookalikes&lt;/li&gt;
&lt;li&gt;shortened or risky URLs&lt;/li&gt;
&lt;li&gt;urgency language and social engineering cues&lt;/li&gt;
&lt;li&gt;severity and confidence&lt;/li&gt;
&lt;li&gt;recommended next steps&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That instantly turns a wall of raw email data into something you can actually reason about. And because the pasted email content is processed in the browser and not sent to a server, you can do that first-pass triage without shipping the raw message off somewhere else.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 3 — Review the signals, not just the branding
&lt;/h3&gt;

&lt;p&gt;You stop asking: "Does this look polished?" and start asking: "Do the technical and contextual signals line up?"&lt;/p&gt;

&lt;p&gt;A polished email is not trustworthy because it is polished. A passing SPF result is not trustworthy because it passed SPF. A brand logo is not proof of legitimacy. Phishing today often looks clean enough to pass a visual glance. What matters is whether the sender path, destination, and context actually make sense together.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 4 — Use AI only after the structure exists
&lt;/h3&gt;

&lt;p&gt;Many people paste the raw email directly into ChatGPT or Claude and ask: "Is this phishing?" That can work sometimes, but it is inconsistent because the input is inconsistent. Raw data is noisy. Structured input is much more useful.&lt;/p&gt;

&lt;p&gt;The better approach: do the first-pass parsing first, organize the evidence, then send the structured prompt into AI for deeper reasoning. Once the key signals are already extracted, AI becomes much more useful for validating the assessment, drafting a user advisory, suggesting containment steps, and writing a clean incident note.&lt;/p&gt;

&lt;p&gt;AI works much better when it receives labeled evidence, not a wall of raw text.&lt;/p&gt;

&lt;h3&gt;
  
  
  Step 5 — Copy the incident note and move on
&lt;/h3&gt;

&lt;p&gt;Once the findings are structured, copy the incident note into the SIEM ticket, ServiceNow, Jira, Slack, or whatever case workflow you use. A structured note fixes the write-up problem and makes handoff easier — every investigation looks more consistent across the team.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why this matters beyond speed
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Consistency.&lt;/strong&gt; When the same type of alert gets triaged the same way every time, notes are cleaner, severity is easier to defend, escalations are more predictable, and handoffs are smoother.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Junior analyst support.&lt;/strong&gt; A structured workflow helps less experienced analysts know what to check, in what order, and what actually matters. That reduces hesitation and helps them escalate with more confidence.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Better use of AI.&lt;/strong&gt; AI is most useful after the evidence has already been organized — second-pass reasoning, clearer communication, faster documentation. Not as a substitute for the first-pass thinking.&lt;/p&gt;




&lt;h2&gt;
  
  
  What I would recommend to any SOC team
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Standardize the first pass — do not let every analyst invent the workflow from scratch.&lt;/li&gt;
&lt;li&gt;Work from the full raw email — do not rely only on the visible message.&lt;/li&gt;
&lt;li&gt;Structure the evidence before using AI — do not ask AI to do the organizing work if you can parse and label the signals first.&lt;/li&gt;
&lt;/ol&gt;




&lt;h2&gt;
  
  
  If you want to try this workflow
&lt;/h2&gt;

&lt;p&gt;The phishing analyzer is at &lt;strong&gt;&lt;a href="https://socworkflows.com/phishing.html" rel="noopener noreferrer"&gt;socworkflows.com/phishing&lt;/a&gt;&lt;/strong&gt; — free, browser-based, no account needed.&lt;/p&gt;

&lt;p&gt;If phishing is only one part of your queue, there are also analyzers for alert triage, VPC flow logs, and credential dumping — all built around the same idea: client-side triage first, AI reasoning second.&lt;/p&gt;




&lt;h2&gt;
  
  
  Final thought
&lt;/h2&gt;

&lt;p&gt;Most phishing alerts do not become slow because the analysis is too complex. They become slow because the process is inconsistent. Fix the workflow, fix the speed. Structure the first pass properly, and you make everything after that easier — investigation, escalation, documentation, and team consistency.&lt;/p&gt;

&lt;p&gt;That is where the real time savings come from.&lt;/p&gt;

</description>
      <category>soc</category>
      <category>ai</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>Why SOC analysts get inconsistent results from ChatGPT (and how structured workflows fix it)</title>
      <dc:creator>gaurav kundu</dc:creator>
      <pubDate>Thu, 02 Apr 2026 02:15:06 +0000</pubDate>
      <link>https://dev.to/gaurav_kundu_c6eee7120819/why-soc-analysts-get-inconsistent-results-from-chatgpt-and-how-structured-workflows-fix-it-24mb</link>
      <guid>https://dev.to/gaurav_kundu_c6eee7120819/why-soc-analysts-get-inconsistent-results-from-chatgpt-and-how-structured-workflows-fix-it-24mb</guid>
      <description>&lt;p&gt;If you've ever handed a security alert to ChatGPT and gotten a different answer each time — you've hit the real problem.&lt;/p&gt;

&lt;p&gt;It's not the model. It's the prompt.&lt;/p&gt;

&lt;p&gt;Most analysts paste an alert and ask "what do you think?" That's like asking a junior analyst to investigate without a runbook. You'll get something back, but the quality depends entirely on how the question was framed.&lt;/p&gt;

&lt;h2&gt;
  
  
  The real problem: no structure
&lt;/h2&gt;

&lt;p&gt;Experienced SOC analysts don't wing investigations. They follow a process:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Triage the alert&lt;/li&gt;
&lt;li&gt;Map to MITRE ATT&amp;amp;CK&lt;/li&gt;
&lt;li&gt;Check for lateral movement&lt;/li&gt;
&lt;li&gt;Build a containment recommendation&lt;/li&gt;
&lt;li&gt;Write a ticket summary&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The issue is that most AI-assisted workflows skip steps 2–5 and jump straight to "is this bad?"&lt;/p&gt;

&lt;h2&gt;
  
  
  What I built
&lt;/h2&gt;

&lt;p&gt;I spent time building &lt;a href="https://socworkflows.com" rel="noopener noreferrer"&gt;SOC.Workflows&lt;/a&gt; — a free collection of structured investigation workflows for SOC analysts. Each workflow breaks an investigation into 4 steps, with specific prompts for each step, designed to run in ChatGPT or Claude.&lt;/p&gt;

&lt;p&gt;Current workflows:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing Email Investigation&lt;/li&gt;
&lt;li&gt;AWS VPC Flow Log Analysis&lt;/li&gt;
&lt;li&gt;PowerShell &amp;amp; Script Analysis&lt;/li&gt;
&lt;li&gt;Credential Dumping Investigation&lt;/li&gt;
&lt;li&gt;Ransomware Triage&lt;/li&gt;
&lt;li&gt;Identity Compromise Investigation&lt;/li&gt;
&lt;li&gt;URL &amp;amp; Domain Analysis&lt;/li&gt;
&lt;li&gt;SOC Alert Triage&lt;/li&gt;
&lt;li&gt;Explain This Alert&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  How it works
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Pick a workflow matching your alert type&lt;/li&gt;
&lt;li&gt;Copy the workflow prompt&lt;/li&gt;
&lt;li&gt;Paste into ChatGPT or Claude&lt;/li&gt;
&lt;li&gt;Get structured, step-by-step analysis&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;No login. No setup. No API keys.&lt;/p&gt;

&lt;h2&gt;
  
  
  Why structure matters
&lt;/h2&gt;

&lt;p&gt;When I ran the same phishing alert through an unstructured prompt vs. the structured workflow, the difference was clear:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Unstructured:&lt;/strong&gt; "This looks like a phishing email. Check the sender domain."&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Structured:&lt;/strong&gt; SPF/DKIM validation → header analysis → sender reputation → verdict with risk score → recommended response actions&lt;/p&gt;

&lt;p&gt;Same model. Completely different output quality.&lt;/p&gt;

&lt;h2&gt;
  
  
  Try it
&lt;/h2&gt;

&lt;p&gt;If you work in a SOC or do blue team work, I'd love feedback on which investigation types are missing.&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://socworkflows.com" rel="noopener noreferrer"&gt;socworkflows.com&lt;/a&gt; — free, no login required&lt;/p&gt;

</description>
      <category>security</category>
      <category>ai</category>
      <category>blueteam</category>
      <category>cybersecurity</category>
    </item>
    <item>
      <title>SOC Workflow: How I Investigate a Phishing Alert (Step-by-Step)</title>
      <dc:creator>gaurav kundu</dc:creator>
      <pubDate>Wed, 01 Apr 2026 15:08:47 +0000</pubDate>
      <link>https://dev.to/gaurav_kundu_c6eee7120819/soc-workflow-how-i-investigate-a-phishing-alert-step-by-step-53n7</link>
      <guid>https://dev.to/gaurav_kundu_c6eee7120819/soc-workflow-how-i-investigate-a-phishing-alert-step-by-step-53n7</guid>
      <description>&lt;p&gt;Phishing alerts are one of the most common — and most time-consuming — tasks in a SOC.&lt;/p&gt;

&lt;p&gt;But the problem is not the alert itself.&lt;/p&gt;

&lt;p&gt;The problem is &lt;strong&gt;lack of structured workflow&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Without a clear process, analysts:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Miss important signals&lt;/li&gt;
&lt;li&gt;Waste time switching tools&lt;/li&gt;
&lt;li&gt;Produce inconsistent results&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So here’s the exact &lt;strong&gt;step-by-step workflow I use to investigate a phishing alert&lt;/strong&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 Step 1: Initial Triage
&lt;/h2&gt;

&lt;p&gt;Start with the basics:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Who reported the email?&lt;/li&gt;
&lt;li&gt;Internal or external sender?&lt;/li&gt;
&lt;li&gt;Subject line / urgency indicators&lt;/li&gt;
&lt;li&gt;Any attachments or links?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 Goal: Quickly understand if this is likely phishing or just noise&lt;/p&gt;




&lt;h2&gt;
  
  
  🔗 Step 2: Extract Indicators (IOCs)
&lt;/h2&gt;

&lt;p&gt;Pull all possible IOCs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sender email address&lt;/li&gt;
&lt;li&gt;Domain&lt;/li&gt;
&lt;li&gt;URLs&lt;/li&gt;
&lt;li&gt;File hashes (attachments)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 This becomes your investigation base&lt;/p&gt;




&lt;h2&gt;
  
  
  🌐 Step 3: Reputation Check
&lt;/h2&gt;

&lt;p&gt;Check:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;VirusTotal&lt;/li&gt;
&lt;li&gt;MalwareBazaar&lt;/li&gt;
&lt;li&gt;URL reputation tools&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Look for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Known malicious domains&lt;/li&gt;
&lt;li&gt;Newly registered domains&lt;/li&gt;
&lt;li&gt;Low reputation signals&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🧪 Step 4: Email Analysis
&lt;/h2&gt;

&lt;p&gt;Analyze headers:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;SPF / DKIM / DMARC status&lt;/li&gt;
&lt;li&gt;Sender spoofing&lt;/li&gt;
&lt;li&gt;Reply-to mismatch&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check for:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Impersonation attempts&lt;/li&gt;
&lt;li&gt;Display name abuse&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🖥️ Step 5: Endpoint Impact
&lt;/h2&gt;

&lt;p&gt;Did the user:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Click the link?&lt;/li&gt;
&lt;li&gt;Download attachment?&lt;/li&gt;
&lt;li&gt;Execute anything?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Check EDR:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Process activity&lt;/li&gt;
&lt;li&gt;PowerShell / script execution&lt;/li&gt;
&lt;li&gt;Network connections&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🔐 Step 6: Account Activity
&lt;/h2&gt;

&lt;p&gt;Check identity logs:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Suspicious login attempts&lt;/li&gt;
&lt;li&gt;MFA prompts&lt;/li&gt;
&lt;li&gt;Impossible travel&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 Especially important for credential phishing&lt;/p&gt;




&lt;h2&gt;
  
  
  📊 Step 7: Scope &amp;amp; Impact
&lt;/h2&gt;

&lt;p&gt;Answer:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Is it isolated or widespread?&lt;/li&gt;
&lt;li&gt;More users affected?&lt;/li&gt;
&lt;li&gt;Any lateral movement?&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🚨 Step 8: Response Actions
&lt;/h2&gt;

&lt;p&gt;Depending on severity:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Block domain / URL&lt;/li&gt;
&lt;li&gt;Quarantine email&lt;/li&gt;
&lt;li&gt;Reset user credentials&lt;/li&gt;
&lt;li&gt;Isolate endpoint (if needed)&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  📝 Step 9: Documentation
&lt;/h2&gt;

&lt;p&gt;Always document:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Timeline&lt;/li&gt;
&lt;li&gt;Indicators&lt;/li&gt;
&lt;li&gt;Actions taken&lt;/li&gt;
&lt;li&gt;Final verdict&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;👉 This improves future detection&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚡ Final Thought
&lt;/h2&gt;

&lt;p&gt;SOC work becomes easier when you stop reacting to alerts…&lt;/p&gt;

&lt;p&gt;…and start following &lt;strong&gt;repeatable workflows&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;This is exactly why I started building structured workflows for investigations:&lt;/p&gt;

&lt;p&gt;👉 &lt;a href="https://socworkflows.com" rel="noopener noreferrer"&gt;https://socworkflows.com&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;It’s a growing library of step-by-step SOC workflows designed to reduce investigation time and improve consistency.&lt;/p&gt;




&lt;p&gt;If you're a SOC analyst, I'd love to know:&lt;/p&gt;

&lt;p&gt;👉 Do you follow a structured workflow or investigate ad-hoc?&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49er99rey5sog2zfourn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F49er99rey5sog2zfourn.png" alt=" " width="800" height="413"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>threathunting</category>
      <category>ai</category>
      <category>phishing</category>
    </item>
  </channel>
</rss>
