Aegis Defense Corp — Cyber Threat Intelligence Division
Classify incoming intelligence reports by priority, category, and relevance. Tag each item with appropriate keywords.
Enrich each IOC using simulated tools. Determine threat level classification for each indicator.
| Type | Indicator | Actions | Threat Level | Status |
|---|
Analyze scattered intelligence fragments to build a threat actor profile. Map TTPs to MITRE ATT&CK and assess attribution confidence.
Draft a structured threat intelligence report. Each section is scored against a quality rubric.
Consider who needs this intelligence and the sensitivity of the content.
Target audience: CISOs and executives. Focus on business impact and risk.
Include specific IOCs, techniques (TID references), and infrastructure details discovered during enrichment.
Be specific: block IOCs, update detection rules, patch vulnerabilities, increase monitoring for specific techniques.
Performance metrics across all analyst tasks.
| Task | Score | Time | Benchmark | Status |
|---|
You are a Threat Intelligence Analyst at Aegis Defense Corp. Your mission: process incoming intelligence, enrich IOCs, profile a threat actor, and produce a finished intelligence report. Performance is timed and scored. Ready?