Program ingested raw cybersecurity output files and generated Microsoft Office word documents based on data. The program would prompt users for additional contextual information (eg. customer name / logo) and would incorporate this data into the final document. Generated documents included dynamic styling, colors and charts based on user inputs.