Securing A Unified Network: Field Notes From A Cyber Attack After Action Report