triaging-security-alerts-in-splunk

Installation
SKILL.md

Triaging Security Alerts in Splunk

When to Use

Use this skill when:

  • SOC Tier 1 analysts need to process the Incident Review queue in Splunk Enterprise Security (ES)
  • Notable events require rapid severity classification and initial investigation before escalation
  • Alert volume exceeds capacity and analysts need a systematic triage methodology
  • Management requests metrics on alert disposition (true positive, false positive, benign)

Do not use for deep forensic investigation — escalate to Tier 2/3 after initial triage confirms malicious activity.

Prerequisites

  • Splunk Enterprise Security 7.x+ with Incident Review dashboard configured
  • CIM-normalized data sources (Windows Event Logs, firewall, proxy, endpoint)
  • Role with ess_analyst capability for notable event status updates
  • Familiarity with SPL (Search Processing Language)

Workflow

Related skills
Installs
24
GitHub Stars
6.3K
First Seen
Mar 15, 2026