Analyze security system logs, security tools, and data
IP networking/Ip resolving
Dos attacks/DDos attacks
Security vulnerability databases
Intrusion detection systems
Network encryption
SSL decryption
SIEM
Firewalls
DLP
IPS
IDS
Evaluate and interpret metada
Malware
Network topology
Anomalies
False positives
Superhuman logins/geo-velocity
APT activity
Botnets
Unauthorized programs in the startup menu
Presence of attack tools
Registry entries
Unusual network traffic
Bandwidth usage
Malicious network communication