Use Cases/Security Analysts

LogMark for Security Analysts

IOCs, hunches, and investigation threads captured during incident response - when speed matters most.

The Problem

During incident response, you're juggling SIEM alerts, log analysis, and lateral movement traces simultaneously. You spot a suspicious IP, notice a pattern in authentication logs, or have a hunch about the attack vector. But you're in the middle of containment. Stopping to document in a wiki or ticket system breaks your investigation momentum.

Later, the post-mortem asks "when did we first notice X?" and nobody can reconstruct the timeline. The hunches that turned out right are indistinguishable from the ones that didn't - because none were captured.

Why LogMark

LogMark captures which tool you were in when the thought hit. Entries from your SIEM, terminal, or browser include that context. Route to incident folders for natural case organization. The chronological vault format creates an investigation timeline automatically.

Workflows

IOC capture during triage

+incident-2026-003 suspicious outbound to 203.0.113.42:8443 from webserver-02 #ioc
+incident-2026-003 same C2 pattern as last month's incident #ioc #apt

Investigation hunches

+incident-2026-003 i: lateral movement might be via RDP -- check 3389 logs
+incident-2026-003 i: timeline suggests compromise predates the phishing email

Decision logging during response

+incident-2026-003 d: isolating subnet B first -- highest blast radius, most sensitive data
+incident-2026-003 d: not shutting down webserver-02 yet -- need memory dump first

Block capture

+incident-2026-003 b: can't get memory dump -- endpoint agent is unresponsive

Notation Guide

+incident-2026-003, +vuln-assessment-q1 - Project routing per case
+threat-intel, +forensics - Domain routing for knowledge areas
#ioc, #apt, #ransomware, #lateral-movement - Cross-cutting tags
t:, b:, d:, i: - Quick entry types

Example Incident

14:02
SIEM alert fires. You start investigating.
+incident-2026-003 SIEM alert: unusual outbound traffic from webserver-02
14:08
First IOC identified.
+incident-2026-003 C2 callback to 203.0.113.42:8443 every 30s #ioc
14:15
A hunch during log review.
+incident-2026-003 i: auth logs show service account login at 03:00 -- nobody runs jobs at that hour
14:30
Containment decision.
+incident-2026-003 d: isolating webserver-02 at network level -- preserving for forensics
14:45
Stuck on something.
+incident-2026-003 b: endpoint agent down on webserver-02 -- can't pull memory remotely
15:30
Widening the investigation.
+incident-2026-003 same service account used on db-01 last Tuesday -- checking those logs #lateral-movement