Role Cards Reference for Incident Masters

This appendix provides a quick reference for all six incident response roles. Full role cards with gameplay guidance, example bonus actions, and badge alignment are in the Players Handbook individual role pages.

Complete Role Cards Overview

πŸ” Detective (Cyber Sleuth)

See the full role card in the Players Handbook: Detective – Cyber Sleuth

πŸ›‘οΈ Protector (Digital Guardian)

See the full role card in the Players Handbook: Protector – Digital Guardian

πŸ“‘ Tracker (Network Analyst)

See the full role card in the Players Handbook: Tracker – Network Analyst

πŸ“’ Communicator (Stakeholder Liaison)

See the full role card in the Players Handbook: Communicator – Stakeholder Liaison

⚑ Crisis Manager (Incident Commander)

See the full role card in the Players Handbook: Crisis Manager – Incident Commander

🎯 Threat Hunter (Proactive Defender)

See the full role card in the Players Handbook: Threat Hunter – Proactive Defender

IM Quick Reference: Role Strengths & Modifiers

Role Modifier Quick Reference Table

Role +3 Bonus +2 Bonus +1 Bonus
πŸ” Detective Forensic Analysis Pattern Recognition Documentation
πŸ›‘οΈ Protector Containment Security Architecture Business Continuity
πŸ“‘ Tracker Network Analysis Data Tracking Infrastructure Mapping
πŸ“’ Communicator Stakeholder Management Crisis Communication Compliance
⚑ Crisis Manager Coordination Strategic Planning Escalation Management
🎯 Threat Hunter Threat Detection Intelligence Analysis Attack Prediction

Role Strengths at a Glance

  • πŸ” Detective: Pattern recognition, evidence analysis, timeline construction
  • πŸ›‘οΈ Protector: Containment, security architecture, business continuity
  • πŸ“‘ Tracker: Network analysis, data flow tracking, infrastructure mapping
  • πŸ“’ Communicator: Stakeholder management, crisis communication, compliance
  • ⚑ Crisis Manager: Coordination, strategic planning, resource allocation
  • 🎯 Threat Hunter: Advanced detection, intelligence analysis, attack prediction

Facilitation Tips by Role

Encouraging Balanced Participation

When Roles Dominate:

  • Detective dominating: β€œGreat analysis - how might other roles use this evidence?”
  • Protector rushing: β€œWhat do other roles need to know before we contain?”
  • Tracker getting technical: β€œHow does this network data impact our response strategy?”
  • Communicator over-managing: β€œWhat do the technical roles need to investigate first?”
  • Crisis Manager micro-managing: β€œLet’s hear the specialist perspectives before coordinating.”
  • Threat Hunter rabbit-holing: β€œWhat immediate threats need the team’s attention now?”

When Roles Withdraw:

  • Detective quiet: β€œWhat patterns or anomalies stand out to you here?”
  • Protector passive: β€œHow would you protect our critical systems right now?”
  • Tracker disconnected: β€œWhat network activity concerns you most?”
  • Communicator silent: β€œWho needs to know about these developments?”
  • Crisis Manager absent: β€œHow should we prioritize these response activities?”
  • Threat Hunter unfocused: β€œWhat aren’t we seeing that we should be looking for?”

Role-Specific Questions to Ask

πŸ” Detective Activation:

  • β€œWhat story do these clues tell you?”
  • β€œWhat patterns does this remind you of?”
  • β€œHow would you build a timeline of this attack?”

πŸ›‘οΈ Protector Activation:

  • β€œWhat’s your biggest security concern right now?”
  • β€œHow do we stop this from spreading?”
  • β€œWhat systems need immediate protection?”

πŸ“‘ Tracker Activation:

  • β€œWhere is this data going?”
  • β€œWhat network activity looks suspicious?”
  • β€œHow is this threat moving through our systems?”

πŸ“’ Communicator Activation:

  • β€œWho needs to know about this development?”
  • β€œHow would you explain this to executive leadership?”
  • β€œWhat are the business implications?”

⚑ Crisis Manager Activation:

  • β€œHow should we prioritize these response activities?”
  • β€œWhat resources do we need to coordinate?”
  • β€œWhat’s our overall strategy here?”

🎯 Threat Hunter Activation:

  • β€œWhat else might be hiding that we haven’t found?”
  • β€œWhat would a sophisticated attacker do next?”
  • β€œWhat intelligence can help us get ahead of this threat?”

Team Composition Guidelines

For 4-Player Teams

Essential Core:

  • πŸ” Detective (investigation and analysis)
  • πŸ›‘οΈ Protector (containment and security)
  • πŸ“’ Communicator (stakeholder management)
  • ⚑ Crisis Manager (coordination)

Alternative Configurations:

  • Replace Crisis Manager with πŸ“‘ Tracker for network-heavy scenarios
  • Replace Crisis Manager with 🎯 Threat Hunter for sophisticated threats

For 5-Player Teams

Recommended Additions:

  • Core four + πŸ“‘ Tracker for network-focused incidents
  • Core four + 🎯 Threat Hunter for APT scenarios
  • Allow team to choose based on interests and scenario type

For 6-Player Teams

Full Coverage: All six roles provide maximum perspective diversity and comprehensive incident response coverage.

For Teams with Role Overlap

Managing Multiple Players in Same Role:

  • Assign specialized focus areas (junior/senior, different systems)
  • Create complementary responsibilities (analysis vs. communication)
  • Use geographical or departmental divisions
  • Emphasize different aspects of the role’s capabilities

This reference ensures IMs can quickly understand each role’s mechanical benefits, behavioral tendencies, and optimal activation strategies for balanced, engaging facilitation.