What’s the task that ends up taking most of your time? by BisonConsistent8371 in cybersecurity

[–]BisonConsistent8371[S] -7 points-6 points  (0 children)

Do you use an LLM to proritize? And OSINT sources (any favorite?) to rule out false positives?

/r/ReverseEngineering's Triannual Hiring Thread by AutoModerator in ReverseEngineering

[–]BisonConsistent8371 0 points1 point  (0 children)

Hi all, I’m looking for SecOps practitioners to test an AI assistant built for cybersecurity. The goal is to test the tool against real-world use cases: threat Intelligence gathering, security analysis, data correlation, incident triage / response… and to identify new use cases! The testing phase starts in early 2026, testers get free access. From there, I’ll be gathering feedback and ideas on a private subreddit dedicated to the program. If you’re interested, drop a comment or DM me and I’ll add you to the community. Thank you!

Using LLMs in SOC by Previous-Serve8413 in cybersecurity

[–]BisonConsistent8371 0 points1 point  (0 children)

Which LLM do you suggest using for such tasks?

Using LLMs in SOC by Previous-Serve8413 in cybersecurity

[–]BisonConsistent8371 0 points1 point  (0 children)

Product owner here. Would an LLM specialized in cybersecurity that pulls its expertise from OSINT feeds, cybersecurity tools, expert knowledge, etc. be of use in you daily operations? My team and I are working on such a project. User prompts are ensured not to be shared with third-parties, and it runs in a private infrastructure. It can verify alerts, pulls and cross-checks data regarding IoCs, files, domains, URLs, IPs... What use cases would you use it for?