Effective Threat Investigation for SOC Analysts