How To Correctly Read Logs As A Cybersecurity Soc Analyst