Loading: 6 Steps for Applying Data Science to Security