7 Steps to Automating Threat Detection and Analysis