managing-intelligence-lifecycle
mukul975/Anthropic-Cybersecurity-Skills
Coordinates the full cyber threat intelligence lifecycle—planning PIRs with stakeholders, mapping collection sources, normalizing feeds, analyzing strategic/operational/tactical outputs, disseminating tailored products, and closing feedback loops—so CTI programs stay aligned with business needs and mature continuously.