Role Cards Reference

This appendix provides quick reference cards for all six incident response roles. Use these during gameplay for easy access to role strengths, focus areas, and roleplay guidance.

Role Cards Grid

πŸ”

Detective

Cyber Sleuth

🎭 Archetype

"I see patterns others miss. Every attack tells a story."

πŸ’ͺ Strengths

β€’ Pattern Recognition: Spotting anomalies in logs and behavior
β€’ Evidence Analysis: Connecting clues into attack timelines
β€’ Digital Forensics: Understanding attack artifacts
β€’ Timeline Construction: Building accurate chronologies

🎯 Focus Areas

β€’ System logs and process executions
β€’ Attack vector analysis and entry points
β€’ Evidence preservation and IoC development
β€’ Attack attribution and technique identification

πŸŽͺ Roleplay Tips

β€’ Be curious about details others might skip
β€’ Ask 'what does this remind you of?' when examining evidence
β€’ Share your thought process: 'This pattern suggests...'
β€’ Connect current findings to previous experiences

🎲 Game Modifiers

🎲
+3 Forensic Analysis
Log analysis, timeline construction, evidence correlation
🎲
+2 Pattern Recognition
Identifying anomalies, connecting disparate clues
🎲
+1 Documentation
Creating detailed incident records, IoC development
πŸ›‘οΈ

Protector

Digital Guardian

🎭 Archetype

"Not on my watch. Every system is someone I'm protecting."

πŸ’ͺ Strengths

β€’ Security Architecture: Understanding defensive systems
β€’ Threat Containment: Stopping attacks in progress
β€’ Access Control: Managing permissions and restrictions
β€’ Incident Isolation: Preventing spread of compromise

🎯 Focus Areas

β€’ Network segmentation and isolation
β€’ Security tool configuration and deployment
β€’ Backup systems and recovery procedures
β€’ Access control and privilege management

πŸŽͺ Roleplay Tips

β€’ Think defensively: 'How do we stop this now?'
β€’ Consider business continuity in every decision
β€’ Be protective of critical assets
β€’ Focus on immediate containment before analysis

🎲 Game Modifiers

🎲
+3 Containment
Network isolation, access controls, system hardening
🎲
+2 Security Architecture
Defensive design, control implementation
🎲
+1 Business Continuity
Backup systems, recovery planning
πŸ“‘

Tracker

Network Analyst

🎭 Archetype

"I follow the digital breadcrumbs wherever they lead."

πŸ’ͺ Strengths

β€’ Network Analysis: Understanding traffic patterns and flows
β€’ Data Flow Tracking: Following information through systems
β€’ Communication Monitoring: Detecting C2 and exfiltration
β€’ Infrastructure Mapping: Understanding network relationships

🎯 Focus Areas

β€’ Network traffic and communication patterns
β€’ Data exfiltration and C2 channels
β€’ Lateral movement detection
β€’ Infrastructure and connection analysis

πŸŽͺ Roleplay Tips

β€’ Think in terms of flows and connections
β€’ Ask 'where is this data going?' and 'what is calling home?'
β€’ Visualize the network in your explanations
β€’ Focus on movement and communication patterns

🎲 Game Modifiers

🎲
+3 Network Analysis
Traffic monitoring, flow analysis, connection tracking
🎲
+2 Data Tracking
Exfiltration detection, data flow mapping
🎲
+1 Infrastructure Mapping
Network topology, system relationships
πŸ“’

Communicator

Stakeholder Liaison

🎭 Archetype

"I translate tech-speak into human-speak and back again."

πŸ’ͺ Strengths

β€’ Stakeholder Management: Coordinating with leadership and teams
β€’ Crisis Communication: Clear messaging during high-stress situations
β€’ Regulatory Compliance: Understanding notification requirements
β€’ Risk Translation: Explaining technical impacts in business terms

🎯 Focus Areas

β€’ Executive and management communication
β€’ User and employee notifications
β€’ External vendor and partner coordination
β€’ Regulatory and legal compliance communication

πŸŽͺ Roleplay Tips

β€’ Always consider 'who needs to know?' about developments
β€’ Translate technical details into business impact
β€’ Think about timing and messaging of communications
β€’ Balance transparency with operational security

🎲 Game Modifiers

🎲
+3 Stakeholder Management
Executive reporting, external coordination
🎲
+2 Crisis Communication
Clear messaging, impact translation
🎲
+1 Compliance
Regulatory requirements, legal notifications
⚑

Crisis Manager

Incident Commander

🎭 Archetype

"I coordinate chaos into coordinated response."

πŸ’ͺ Strengths

β€’ Resource Allocation: Deploying people and tools effectively
β€’ Priority Management: Deciding what's most important right now
β€’ Team Coordination: Keeping everyone working toward common goals
β€’ Decision Making: Making calls when information is incomplete

🎯 Focus Areas

β€’ Response coordination and resource allocation
β€’ Prioritization and decision making under pressure
β€’ Escalation management and authority interfaces
β€’ Overall incident strategy and planning

πŸŽͺ Roleplay Tips

β€’ Think strategically about resource allocation
β€’ Keep the big picture in mind during technical discussions
β€’ Don't hesitate to make decisions with incomplete information
β€’ Focus on coordination rather than doing everything yourself

🎲 Game Modifiers

🎲
+3 Coordination
Team management, resource allocation, priority setting
🎲
+2 Strategic Planning
Incident strategy, decision making
🎲
+1 Escalation Management
Authority interfaces, leadership communication
🎯

Threat Hunter

Proactive Defender

🎭 Archetype

"I hunt threats before they know they're being hunted."

πŸ’ͺ Strengths

β€’ Advanced Detection: Finding sophisticated and hidden threats
β€’ Attack Prediction: Anticipating threat behavior and evolution
β€’ Intelligence Analysis: Using threat intelligence effectively
β€’ Proactive Defense: Stopping attacks before they cause damage

🎯 Focus Areas

β€’ Hidden threat detection and hunting
β€’ Threat intelligence and attribution analysis
β€’ Attack prediction and evolution assessment
β€’ Advanced persistent threat investigation

πŸŽͺ Roleplay Tips

β€’ Think beyond the immediate threat: 'What else might be here?'
β€’ Use threat intelligence to predict attacker next moves
β€’ Be proactive: look for what hasn't been found yet
β€’ Consider the broader campaign beyond this incident

🎲 Game Modifiers

🎲
+3 Threat Detection
Advanced hunting, hidden threat discovery
🎲
+2 Intelligence Analysis
Attribution, campaign analysis
🎲
+1 Attack Prediction
Evolution assessment, behavior forecasting

Quick Reference Summary

Role Strengths at a Glance

  • πŸ” Detective: Pattern recognition, evidence analysis, timeline construction
  • πŸ›‘οΈ Protector: Containment, security architecture, business continuity
  • πŸ“‘ Tracker: Network analysis, data flow tracking, infrastructure mapping
  • πŸ“’ Communicator: Stakeholder management, crisis communication, compliance
  • ⚑ Crisis Manager: Coordination, strategic planning, resource allocation
  • 🎯 Threat Hunter: Advanced detection, intelligence analysis, attack prediction

Team Composition Guidelines

For 4-Player Teams: - Essential Core: Detective, Protector, Communicator, Crisis Manager

For 5-Player Teams:
- Add: Tracker (for network-heavy scenarios) or Threat Hunter (for APT scenarios)

For 6-Player Teams: - Full team: All roles represented for comprehensive coverage

Role Modifier Quick Reference

Each role provides specific bonuses when actions match their expertise: - +3 bonus: Primary specialization area
- +2 bonus: Secondary strength area - +1 bonus: Supporting skill area

Use these modifiers when players demonstrate relevant knowledge and choose approaches that leverage their role’s strengths.