Elastic on Elastic: How InfoSec uses the Elastic Stack for vulnerability management