Phishing
Analyst for Phishing Alert Investigation & Email Threat Triage

Monitor
Ingests Alerts From Google WorkSpace and Office365
Extract
Identifies and Collects Evidence and Context for Every Alert
Investigate
Uncovers Hidden Threat Indicators
Triage
Prioritizes Phishing Threats Based on Risk
Remediate/Escalate
Automates Response or Escalates to Your SOC Team

Anatomy of a Phishing Investigation
Evidence Collection
SOCFirst collects and analyzes various evidence associated with the alert to investigate it, just like a human would do, such as files and processes, command lines, related alerts about the same user or file, and information from the tool that originally fired the alert.

Threat Indicators
From the evidence, SOCFirst clearly identifies the malicious or suspicious indicators (or lack thereof) that indicate whether the email is a threat.

Analysis & Verdict
Taking all evidence and threat indicators into account, SOCFirst make a verdict and trigger a response (see below) if relevant. Analysts reviewing escalated (or any!) alerts have visibility into the indicators that led to the verdict, as well as a sandbox to dig in further if necessary.

Response & Recommendations
accuracy enables it to take action, dismissing and closing out cases for false positives, notifying for non-urgent issues, or escalating for critical alerts. SOCFirst can also be configured to take action itself, e.g., by blocking a user or kicking off a SOAR playbook.
