Why Security Researchers and Red Teams Are Turning to Workflow Automation