Introduction The following post is intended to be the first in a series that will explore practical approaches, leveraging modern software development concepts, to operationalize cyber threat intelligence and detection engineering for security operations center (SOC) functions. The posts will jump around in order, but the goal is to provide usable…