February 2026 - Security Tools & Platforms Learning Roadmap
1. Executive Summary
This roadmap documents security tools and platforms requiring hands-on learning, implementation, or deeper integration into CHLA InfoSec operations starting February 2026. All items are currently marked as NOT STARTED and represent skill development and platform maturation goals for Q1/Q2 2026.
1.1. Document Purpose
Track professional development and platform maturation across three categories:
-
Threat Intelligence & Analysis Platforms - VirusTotal, Talos, URLScan.io, AbuseIPDB
-
Extended Detection & Response (XDR) - Unified security operations
-
Security Information & Event Management (SIEM) - IBM QRadar (enterprise platform)
1.2. Current State (February 2026)
| Category | Current Status | Target State |
|---|---|---|
Threat Intelligence |
Ad-hoc manual lookups, no API integration |
Automated threat feed integration, daily operational use |
XDR Platform |
Microsoft Defender for Endpoint only (siloed) |
Full Microsoft Defender XDR or alternative platform evaluation |
SIEM (QRadar) |
Limited access, vendor-dependent for queries |
Independent investigation capability, custom rule creation |
2. Threat Intelligence & Analysis Platforms
2.1. Overview
External threat intelligence platforms provide real-time context for security investigations, incident response, and proactive threat hunting.
2.2. Platform Details
2.2.1. Cisco Talos Intelligence
| Attribute | Details |
|---|---|
URL |
|
Current Access |
Public web interface only |
Target Capabilities |
|
Business Value |
Real-time threat intelligence for network access control, IoT device profiling, DNS filtering (Umbrella integration) |
Status |
NOT STARTED |
Priority |
MEDIUM |
Estimated Learning Time |
20-30 hours (initial proficiency) |
Learning Objectives:
-
Subscribe to Talos Intelligence Blog (daily reading)
-
Understand Talos threat categories and scoring
-
Integrate Talos IP reputation with firewall rules
-
Configure Umbrella DNS filtering with Talos feeds
-
Create ISE profiling rules using Talos OUI database
Success Criteria:
-
Daily Talos blog reading habit established
-
Ability to query Talos reputation API programmatically
-
ISE profiling accuracy improved by 20% using Talos data
-
Documented integration procedures for team
2.2.2. VirusTotal
| Attribute | Details |
|---|---|
URL |
|
Current Access |
Free tier (web interface, no API key) |
Target Capabilities |
|
Business Value |
Incident response acceleration, malware triage, hash reputation checks, phishing URL validation |
Status |
NOT STARTED |
Priority |
HIGH |
Estimated Learning Time |
15-20 hours (free tier mastery), additional 10 hours (API integration) |
Learning Objectives:
-
Create VirusTotal account and obtain API key (free tier: 500 requests/day)
-
Integrate VT API with Python scripts for automated hash lookups
-
Develop YARA rules for CHLA-specific threat hunting
-
Evaluate Enterprise tier for private scanning (compliance requirement)
-
Create runbook for malware triage workflow
Success Criteria:
-
API integration functional (Python script for hash lookups)
-
Documented workflow for user-reported suspicious files
-
3+ custom YARA rules created for CHLA threat patterns
-
Enterprise tier cost-benefit analysis completed
-
Incident response time reduced by 30% for malware triage
Free vs. Enterprise Tier:
| Feature | Free Tier | Enterprise Tier |
|---|---|---|
Daily API Requests |
500/day, 4/min |
10,000+/day |
Private Scanning |
No (results public) |
Yes (HIPAA compliance) |
Bulk Downloads |
No |
Yes |
Retrohunt |
No |
Yes (historical search) |
Cost |
$0 |
(contact sales) |
2.2.3. URLScan.io
| Attribute | Details |
|---|---|
URL |
|
Current Access |
None |
Target Capabilities |
|
Business Value |
Phishing response, suspicious link analysis, user-reported URL validation, safe browsing verification |
Status |
NOT STARTED |
Priority |
MEDIUM |
Estimated Learning Time |
10-15 hours |
Learning Objectives:
-
Create URLScan.io account (free tier)
-
Understand URL analysis workflow (screenshots, DOM, network traffic)
-
Integrate URLScan API with phishing response procedures
-
Compare URLScan vs. VirusTotal for URL analysis
-
Document best practices for URL submission (privacy considerations)
Success Criteria:
-
Account created, API key obtained
-
Phishing investigation runbook updated with URLScan workflow
-
10+ phishing URLs analyzed and documented
-
API integration script created (Python)
-
Team training completed on URLScan usage
2.2.4. AbuseIPDB
| Attribute | Details |
|---|---|
URL |
|
Current Access |
None |
Target Capabilities |
|
Business Value |
Network traffic analysis, firewall rule optimization, incident attribution, botnet detection |
Status |
NOT STARTED |
Priority |
HIGH |
Estimated Learning Time |
8-12 hours |
Learning Objectives:
-
Create AbuseIPDB account and obtain API key
-
Integrate AbuseIPDB lookups into incident response workflow
-
Automate IP reputation checks for firewall logs
-
Report malicious IPs discovered during investigations
-
Create dashboard for tracking threat actor IPs
Success Criteria:
-
API key obtained and tested
-
Python script for bulk IP reputation checks
-
QRadar integration for automatic IP reputation enrichment
-
Documented workflow for reporting malicious IPs
-
50+ IP lookups performed in first month
3. Extended Detection & Response (XDR)
3.1. Overview
XDR platforms unify security telemetry across endpoints, network, cloud, and email to enable cross-domain threat correlation and automated response.
3.2. Platform Evaluation
3.2.1. Microsoft Defender XDR (Recommended Path)
| Attribute | Details |
|---|---|
Components |
|
Current State |
Defender for Endpoint only (Linux workstations starting January 2026) |
Target Capabilities |
|
Business Value |
Reduced MTTD, automated incident response, unified SOC operations, native Azure/M365 integration |
Status |
NOT STARTED |
Priority |
MEDIUM (Q2 2026 target) |
Estimated Learning Time |
40-60 hours (full platform proficiency) |
Learning Objectives:
-
Understand XDR architecture and data flows
-
Master Microsoft 365 Defender portal navigation
-
Learn KQL for advanced threat hunting
-
Configure automated investigation and response (AIR) policies
-
Integrate Defender XDR with QRadar SIEM
-
Develop custom playbooks for common incidents
Success Criteria:
-
Defender XDR licensing evaluated (E5 vs. standalone)
-
Proof-of-concept deployment plan created
-
KQL proficiency demonstrated (10+ custom queries)
-
3+ automated playbooks created (phishing, malware, account compromise)
-
Integration with existing security stack validated
-
Team training completed on XDR operations
Alternative XDR Platforms (If Not Microsoft):
-
Palo Alto Cortex XDR - Best for Palo Alto firewall/endpoint customers
-
CrowdStrike Falcon XDR - Best for endpoint-centric approach
-
SentinelOne Singularity XDR - Best for autonomous response
|
Recommendation: Start with Microsoft Defender XDR since CHLA already uses Microsoft Defender for Endpoint and likely has E5 licensing. Evaluate alternatives only if Microsoft solution doesn’t meet requirements. |
4. Security Information & Event Management (SIEM)
4.1. IBM QRadar SIEM
| Attribute | Details |
|---|---|
Platform |
IBM QRadar SIEM (version TBD - confirm with IT) |
Current Access |
Limited view access, vendor-dependent for custom queries |
Target Capabilities |
|
Business Value |
Centralized security monitoring, compliance reporting (HIPAA, HITRUST), threat detection across hybrid infrastructure, reduced MTTR |
Status |
NOT STARTED |
Priority |
CRITICAL (Start immediately) |
Estimated Learning Time |
80-120 hours (comprehensive proficiency) |
4.2. Learning Roadmap (QRadar)
4.2.1. Phase 1: Foundation (Weeks 1-2)
Objectives:
-
Obtain QRadar access credentials (admin/analyst role)
-
Understand QRadar architecture (console, event processors, flow processors)
-
Navigate QRadar interface (Log Activity, Offenses, Network Activity, Assets)
-
Learn basic AQL syntax for log searches
-
Understand offense workflow (investigation → assignment → resolution)
Deliverables:
-
QRadar admin access obtained
-
QRadar architecture documented (CHLA-specific deployment)
-
20+ basic AQL queries practiced
-
First 5 offenses investigated and documented
-
QRadar navigation cheat sheet created
4.2.2. Phase 2: Log Source Integration (Weeks 3-4)
Objectives:
-
Configure ISE log source (RADIUS authentication events)
-
Configure Defender for Endpoint log source
-
Configure Active Directory log source (authentication, group changes)
-
Verify log normalization and parsing
-
Create custom log parsing rules (if needed)
Deliverables:
-
ISE RADIUS logs flowing to QRadar (802.1X successes/failures)
-
Defender alerts integrated (malware, suspicious behavior)
-
AD authentication events searchable in QRadar
-
Log source health monitoring dashboard created
-
Documentation: CHLA QRadar Log Source Reference
4.2.3. Phase 3: Custom Rules & Correlation (Weeks 5-8)
Objectives:
-
Create custom rules for CHLA-specific use cases
-
Tune existing correlation rules (reduce false positives)
-
Implement threat intelligence feeds (AbuseIPDB, Talos, VirusTotal)
-
Create reference sets (whitelisted IPs, approved applications)
-
Develop correlation rules for multi-stage attacks
Custom Rule Examples:
| Rule Name | Detection Logic | Priority |
|---|---|---|
Linux 802.1X Auth Failures |
>=5 failed EAP-TLS attempts from same MAC in 10 minutes |
HIGH |
Posture Compliance Violation |
Defender posture status = non-compliant + network access granted |
CRITICAL |
dACL Violation Attempts |
>=10 denied connections from same endpoint in 5 minutes |
MEDIUM |
Privileged Account Access from New Location |
Domain admin login from IP not seen in last 30 days |
CRITICAL |
After-Hours Research Network Access |
VLAN 40 (CHLA-IoT) access outside business hours (8 AM - 6 PM) |
MEDIUM |
Deliverables:
-
5+ custom correlation rules deployed
-
Threat intelligence feeds integrated (IP/domain reputation)
-
Reference sets created (30+ entries documented)
-
False positive rate reduced by 40% through tuning
-
Documentation: CHLA QRadar Custom Rules Guide
4.2.4. Phase 4: Dashboards & Reporting (Weeks 9-10)
Objectives:
-
Create executive dashboard (high-level security metrics)
-
Create operational dashboard (daily SOC use)
-
Create compliance dashboard (HIPAA audit evidence)
-
Automate weekly/monthly security reports
-
Create Linux workstation monitoring dashboard
Dashboard Examples:
-
Executive Dashboard:
-
Total offenses (critical/high/medium/low)
-
Top threat actors (by IP)
-
Most targeted assets
-
Compliance posture (policy violations)
-
-
Operational Dashboard (Linux 802.1X):
-
Authentication success rate
-
Top 10 failed authentication attempts
-
Posture compliance status
-
dACL violation attempts
-
Certificate expiration warnings
-
-
Compliance Dashboard (HIPAA):
-
Failed login attempts (PHI access)
-
Privileged account activity
-
Unauthorized data access attempts
-
Audit log completeness
-
Deliverables:
-
3+ custom dashboards deployed
-
Automated weekly security report (PDF generation)
-
Linux 802.1X monitoring dashboard live
-
Compliance report automation (monthly HIPAA evidence)
-
Documentation: QRadar Dashboard User Guide
4.2.5. Phase 5: Advanced Analysis & Automation (Weeks 11-12)
Objectives:
-
Master advanced AQL queries (joins, aggregations, time-series analysis)
-
Develop Python scripts for QRadar API automation
-
Integrate QRadar with Claroty XDome (OT security)
-
Implement SOAR playbooks (automated response)
-
Conduct tabletop exercise using QRadar for investigation
Automation Examples:
-
Automatic IP reputation lookup via AbuseIPDB API
-
Slack/Teams notification for critical offenses
-
Automated ticket creation in ServiceNow/JIRA
-
Threat intelligence enrichment (VirusTotal hash lookups)
Deliverables:
-
5+ Python automation scripts deployed
-
Claroty XDome integration tested (OT alerts → QRadar)
-
SOAR playbook for phishing response (automated mailbox isolation)
-
Tabletop exercise completed (simulated breach investigation)
-
Documentation: QRadar Automation Playbook
4.3. QRadar Training Resources
| Resource | Description | Cost |
|---|---|---|
IBM QRadar Community Edition |
Free virtual appliance for lab environment |
FREE |
IBM QRadar Admin Certification |
Official IBM training and certification |
$$$ (2-3k) |
IBM QRadar Analyst Certification |
Analyst-focused training |
$$$ (1-2k) |
Udemy: QRadar SIEM Mastery |
Hands-on course (20-30 hours) |
$ (<100) |
CHLA Internal QRadar Admin |
Shadowing, internal training sessions |
FREE |
QRadar Documentation |
Official IBM Knowledge Center |
FREE |
Recommended Learning Path:
-
Week 1: QRadar Community Edition (lab setup)
-
Week 2: Udemy course (QRadar SIEM Mastery)
-
Week 3-4: Shadow CHLA QRadar admin
-
Week 5-12: Hands-on implementation (log sources, rules, dashboards)
-
Month 4: IBM QRadar Analyst Certification (optional)
5. Learning & Implementation Priorities
5.1. Phase 1: Immediate (Next 30 Days) - February 2026
| Tool/Platform | Focus Area | Business Impact | Priority |
|---|---|---|---|
IBM QRadar SIEM |
|
CRITICAL - Enterprise SIEM proficiency required for daily operations |
CRITICAL |
AbuseIPDB |
IP reputation checks during incident response |
HIGH - Accelerates incident attribution |
HIGH |
VirusTotal |
Hash/URL lookups for malware triage |
HIGH - Improves malware analysis speed |
HIGH |
Cisco Talos |
Threat feed integration research |
MEDIUM - Enhances threat intelligence |
MEDIUM |
Week-by-Week Breakdown:
-
Week 1 (Feb 3-7):
-
Monday: Obtain QRadar access, create AbuseIPDB/VirusTotal accounts
-
Tuesday-Wednesday: QRadar Community Edition lab setup
-
Thursday-Friday: First 10 AQL queries, first 5 offenses investigated
-
-
Week 2 (Feb 10-14):
-
QRadar training (Udemy course completion)
-
Shadow CHLA QRadar admin (scheduled sessions)
-
Document QRadar architecture (CHLA deployment)
-
-
Week 3 (Feb 17-21):
-
Configure ISE log source in QRadar
-
Create first custom rule (Linux 802.1X failures)
-
AbuseIPDB/VirusTotal API integration (Python scripts)
-
-
Week 4 (Feb 24-28):
-
Configure Defender log source in QRadar
-
Create Linux 802.1X monitoring dashboard
-
Talos threat feed research (integration planning)
-
5.2. Phase 2: Short-Term (Next 90 Days) - March-April 2026
| Platform | Focus Area | Business Impact | Priority |
|---|---|---|---|
IBM QRadar SIEM |
|
CRITICAL - Full operational capability |
CRITICAL |
URLScan.io |
Phishing investigation workflows |
MEDIUM - Enhances phishing response |
MEDIUM |
Microsoft Defender XDR |
Architecture evaluation, POC planning |
MEDIUM - Long-term SOC modernization |
MEDIUM |
Monthly Milestones:
-
March 2026:
-
QRadar: 5+ custom rules deployed, 2+ dashboards live
-
URLScan.io: Account created, first 20 URLs analyzed
-
Defender XDR: Licensing evaluation completed
-
-
April 2026:
-
QRadar: Automation scripts deployed (Python API integration)
-
QRadar: Claroty XDome integration tested
-
Defender XDR: POC deployment plan approved
-
5.3. Phase 3: Long-Term (Next 180 Days) - May-July 2026
| Platform | Focus Area | Business Impact | Priority |
|---|---|---|---|
XDR Platform |
|
MEDIUM - Strategic SOC enhancement |
MEDIUM |
VirusTotal Enterprise |
Private scanning evaluation for sensitive files |
LOW - Compliance improvement (nice-to-have) |
LOW |
QRadar Advanced Features |
|
MEDIUM - SOC maturity advancement |
MEDIUM |
6. Success Metrics & KPIs
6.1. Operational Metrics (Monthly Tracking)
| Metric | Current State (Jan 2026) | Target State (Q2 2026) |
|---|---|---|
Threat Intelligence Lookups/Week |
~10 (manual, ad-hoc) |
>50 (automated, integrated) |
QRadar Independent Investigations |
0 (100% vendor-dependent) |
10+ per week (fully independent) |
SIEM Custom Rules Created |
0 |
>=10 rules (CHLA-specific use cases) |
Mean Time to Investigate (MTTI) |
2-4 hours (waiting for QRadar admin) |
<30 minutes (self-service) |
Incident Response Time |
Baseline (no metrics yet) |
30% reduction (threat intel integration) |
False Positive Rate |
Baseline (unknown) |
<15% (tuned correlation rules) |
6.2. Learning Metrics (Individual Development)
| Skill Area | Proficiency Target | Target Date |
|---|---|---|
QRadar AQL |
Intermediate (joins, aggregations, time-series) |
April 2026 |
QRadar Custom Rules |
Advanced (10+ production rules) |
May 2026 |
Threat Intelligence |
Operational (daily use of 4+ platforms) |
March 2026 |
KQL (Defender XDR) |
Basic (10+ custom queries) |
June 2026 |
Python Security Automation |
Intermediate (API integration, reporting) |
July 2026 |
6.3. Team Impact Metrics
| Metric | Target |
|---|---|
Team Training Completed |
QRadar navigation training for 3+ InfoSec team members |
Documentation Created |
5+ runbooks/guides (QRadar, threat intel workflows) |
Knowledge Transfer Sessions |
Monthly lunch-and-learn on new tools/techniques |
Cross-Training |
2+ team members certified in QRadar fundamentals |
7. Risk & Mitigation
7.1. Risks to Roadmap Execution
| Risk | Impact | Mitigation | Probability |
|---|---|---|---|
Limited QRadar Access |
Cannot complete Phase 1-5 learning |
|
MEDIUM |
Operational Incidents Delay Training |
Learning roadmap deprioritized during incidents |
|
HIGH |
Budget Constraints (Paid Tools) |
Cannot evaluate VirusTotal Enterprise, XDR platforms |
|
MEDIUM |
QRadar Admin Unavailable for Training |
Limited shadowing/mentorship opportunities |
|
LOW |
Tool Sprawl / Lack of Integration |
Tools remain siloed, not integrated into workflows |
|
MEDIUM |
8. Governance & Review
8.1. Monthly Review Cadence
Review Schedule:
-
First Monday of Each Month: Roadmap progress review
-
Metrics Review: Update KPI tracking dashboard
-
Adjustments: Reprioritize based on business needs, incidents, or strategic shifts
Review Attendees:
-
Evan Rosado (roadmap owner)
-
CISO / InfoSec Director (sponsor)
-
QRadar admin (technical mentor)
-
SOC team members (stakeholders)
8.2. Quarterly Milestones
Q1 2026 (Feb-Mar-Apr):
-
QRadar operational proficiency achieved
-
5+ custom QRadar rules deployed
-
Threat intelligence platforms integrated (API automation)
-
Linux 802.1X monitoring dashboard live
Q2 2026 (May-Jun-Jul):
-
Defender XDR POC completed
-
QRadar SOAR playbooks deployed (3+ automated responses)
-
Advanced threat hunting capability demonstrated
-
Team training completed (3+ members certified in QRadar basics)
8.3. Document Updates
This roadmap will be updated:
-
Monthly: Progress tracking, metrics updates
-
Quarterly: Strategic adjustments, new tool evaluations
-
Ad-hoc: Major incidents, budget changes, technology shifts
Version History:
| Version | Date | Changes |
|---|---|---|
1.0 |
2026-02-03 |
Initial roadmap created for Monday planning session (February 2026) |
9. Appendix A: Tool Comparison Matrix
9.1. Threat Intelligence Platforms
| Platform | Free Tier | API Access | Use Case Focus | CHLA Priority | Learning Time |
|---|---|---|---|---|---|
VirusTotal |
Yes |
Yes (limited) |
Malware, hash/URL analysis |
HIGH |
15-20 hrs |
URLScan.io |
Yes |
Yes |
Phishing, URL analysis |
MEDIUM |
10-15 hrs |
AbuseIPDB |
Yes |
Yes |
IP reputation |
HIGH |
8-12 hrs |
Cisco Talos |
Yes |
Limited |
Threat feeds, vulnerability intel |
MEDIUM |
20-30 hrs |
AlienVault OTX |
Yes |
Yes |
Community threat intel |
LOW |
10-15 hrs |
Shodan |
Paid |
Yes |
Internet-exposed device search |
LOW |
15-20 hrs |
9.2. XDR Platform Comparison
| Platform | Best For | CHLA Fit | Estimated Cost |
|---|---|---|---|
Microsoft Defender XDR |
Microsoft-heavy environments (E5 licensing) |
EXCELLENT (already use Defender for Endpoint) |
Included in E5 or ~$10/user/mo |
Palo Alto Cortex XDR |
Palo Alto firewall customers |
MEDIUM (don’t use PA firewalls) |
$$$ (~50k/yr) |
CrowdStrike Falcon XDR |
Endpoint-centric security |
MEDIUM (overlap with Defender) |
$$$ (~40k/yr) |
SentinelOne Singularity XDR |
Autonomous response, AI-driven |
LOW (expensive, redundant) |
$$$ (~60k/yr) |
Recommendation: Evaluate Microsoft Defender XDR first due to existing Defender for Endpoint deployment and likely E5 licensing.
10. Appendix B: Training Budget Estimate
10.1. Q1/Q2 2026 Training Costs
| Training Resource | Cost | Timeframe | Priority |
|---|---|---|---|
IBM QRadar Analyst Certification |
~$2,000 |
Q2 2026 |
HIGH |
Udemy QRadar Course |
~$50 |
February 2026 |
HIGH |
VirusTotal Enterprise Trial |
FREE (30-day trial) |
March 2026 |
MEDIUM |
Microsoft Defender XDR Training (Ninja) |
FREE |
Q2 2026 |
MEDIUM |
SANS Threat Intelligence Course |
~$7,000 |
Q3 2026 (future consideration) |
LOW |
Books/Online Resources |
~$200 |
Q1 2026 |
MEDIUM |
Total Estimated Cost (Q1/Q2 2026): ~$2,250
Budget Justification:
-
QRadar proficiency is critical for daily operations (reduces vendor dependency)
-
ROI: 30% faster incident response, independent investigation capability
-
Long-term: Team cross-training, succession planning
11. Appendix C: Contact Information
| Name | Role | Contact |
|---|---|---|
Evan Rosado |
Senior Network Security Engineer (Roadmap Owner) |
|
[REDACTED] |
CISO (Sponsor) |
TBD |
[REDACTED] |
QRadar Admin (Technical Mentor) |
TBD |
IBM Support |
QRadar Vendor Support |
Via support portal |
Document Information
Document ID: ROADMAP-2026-02-SECURITY-TOOLS
Classification: INTERNAL USE ONLY
Distribution: CHLA InfoSec Team
Planning Period: February 2026 - Q1/Q2 2026
Generated: 2026-02-03
Author: Evan Rosado (Senior Network Security Engineer)
Department: Information Security
Organization: Children’s Hospital Los Angeles
This document contains confidential information. Unauthorized distribution prohibited.