Cyber-Security SOC
Using playbooks to analyse the connection or firewall logs to identify the intrusion attempts