# MISP User Stories | User story | Example workflow | |-|-| | As a lead threat intelligence analyst, I want to lead a team focused on hunting down threats so that I can prevent attacks against ICT infrastructures and organizations | | | As a threat analyst, I want to research, analyze and reverse engineer malware so that I can know how to counter it | | | As a lead threat intelligence analyst, I want to convert threat data into actionable threat intelligence so that I can improve security posture. | | | As a threat analyst, I want to exchange threat information with third parties so that we can gain shared situational awareness | | | As a threat analyst, I want to monitor threats and access live data so that I can manage threats before they cause major damage | | | As a threat analyst, I want to aggregate and compare indicators from various sources so that I can connect the dots between various threats | | | As a threat analyst, I want to have a structured database of threat data that I can use to perform lookups/queries when investigating new threats | | | As a threat analyst, I want to contextualize and enrich raw threat data so that I can produce actionable intelligence | | | As a threat analyst, I want to investigate threats so that I can protect computer systems from attacks | | | As a SOC team, we want to ingest, analyse, store and make connections between threat data so as to discover potential threats | | | As a junior SOC analyst, I want to enrich alerts so that I can "punch above my weight" and make connections that would have otherwise required more experience | | | As a SOC analyst, I want to customize risk feeds to ignore or downgrade alerts that do not match organization/ industry-specific criteria, so that I can focus on relevant alerts | | | As a SOC analyst, I want to share real-time information pertaining to new or existing cases/observables to team members so that we can collaborate on investigations simultaneously | | | As a SOC analyst, I want to rule out false positives so that I can focus on significant threats | | | As a threat analyst, I want to remove false positives, filter and prioritize alerts so that I can focus on what really matters to my organization | | | As a security analyst, I want to unravel the inner workings of a malicious file, phishing email or domain so that I can prevent attacks | | | As a security analyst, I want to create blacklists/whitelists (e.g of domains) so that I can protect customers from malicious activity | | | As a security analyst, I need a real-time overview of threat information so that I can quickly glance at important metrics | | | As a security analyst, I want to automate repetitive tasks related to data normalization, importation, aggregation and enrichment so that I can have more time to put into threat analysis efforts | | | As a security analyst, I want to collaborate with other analysts within and out of my organization’s sector so that we can support one another | | | As a security analyst, I want to triage and prioritize alerts so as to avoid alert fatigue |