Feeling overwhelmed by AI? Learn the Centaur Mindset. Read More
Python and Bash scripts executing security automation workflows

Scripting for Security Automation: Python and Bash for SOC Operations

Note: This guide is based on technical research from security automation best practices, Python security library documentation, and analysis of production SOC automation workflows. Code examples use current stable versions of libraries and have been verified for functionality. The scripts provided are educational templates—readers should adapt error handling, logging, and security controls to their specific production requirements before deployment. Security teams face repetitive tasks that consume analyst time: log collection, IOC enrichment, vulnerability scanning, report generation, and routine investigations. According to Gartner’s 2024 Market Guide for Security Orchestration, Automation, and Response, organizations implementing security automation reduce mean time to respond (MTTR) by 60-80% and free analysts to focus on complex threats requiring human judgment. ...

December 20, 2025 · 17 min · Scott
A security operations center with AI-assisted threat detection visualization

Building AI-Assisted Security Tools

This is Part 2 of “The Centaur’s Toolkit” series. In Part 1, we covered the four collaboration modes for AI pair programming. Now we apply that framework to higher-stakes territory: security. You’ve embraced AI pair programming. You’re using Strategist mode for architecture, Editor mode for refinement, and you feel like a genuine Centaur. Then your manager asks you to build a security tool. Suddenly, the stakes feel different. In regular coding, an AI-suggested bug might waste a few hours of debugging. In security, an AI-suggested bug might become a vulnerability that sits in production for months. The cost of being wrong isn’t just time. It’s trust, data, and potentially your users’ safety. ...

January 10, 2026 · 10 min · Scott Algatt

Leveraging AI for Network Flow Analysis: A SOC Analyst's Guide

As a SOC analyst, one of the most critical tasks is analyzing network flow data to identify potential security threats. In this post, we’ll explore how to combine cloud-based data storage, SQL querying, and AI-powered analysis to streamline this process. Collecting Flow Data in Amazon Athena Amazon Athena provides a serverless query service that makes it easy to analyze data directly in Amazon S3 using standard SQL. Here’s how we set up our flow data collection: ...

December 20, 2024 · 5 min · Scott