MC-Guide
Content Writing
SOP 4: Pitching
This SOP named Pitching method is going to help you in your pitching process
This SOP will shows you, step by step, how a beginner can learn to pitch perfectly and follow up.
You will learn what information you should collect, how you can pitch and follow up.
Process 2: Audience & Topic Research
In Process 1 you created a Strategy Brief (publication + reader + problem + angle + proof + scope). Now you do one smart thing: you validate that brief with fast research, so your pitch feels “editor-safe”. Your output here is a Research Pack you can keep as backup when the editor asks questions about audience and topic.
Your goal here: when an editor asks “Why this? Why now? Where’s the proof?” you answer in 10 seconds.
What you’ll build in Process 2
You’ll turn your Strategy Brief into a small research system: topic map, search intent, reference stories, source list, and interview targets. This is how Process 2 connects to Process 1: you keep the same idea, but you add proof and “editor confidence”.
Think like an editor: “Can we trust this? Is it timely? Is it new? Can the writer deliver proof?”
The beginner approach (8 research blocks)
Do this in 60–120 minutes. Your job is not “read everything”. Your job is: find proof and reduce risk.
Confirm the publication fit
- Read 5–10 recent stories in the same section.
- Spot what they love: tone, length, structure, sources.
- Write one line: “My story matches because …”.
Check the reader’s real questions
- List 5 questions your reader actually asks.
- Use simple language: no buzzwords.
- Make sure your angle answers those questions.
Map the topic in 3 layers
- Core: your main problem.
- Sub-topics: 4–6 supporting parts.
- Edges: risks, tradeoffs, “what people miss”.
Write “search queries” like a reader
- Write 8–12 queries (beginner + advanced).
- Group them: how-to / comparison / cost / risk / checklist.
- This tells you what readers already know (and don’t know).
Study 3–6 reference stories
- Pick stories from your target publication + competitors.
- Write: “What did they cover?” + “What did they miss?”
- Your angle should fill a gap, not repeat.
Build a safe source list
- Official docs (standards, policies, documentation).
- Credible research (reports, academic, reputable orgs).
- One “human” source (expert, practitioner, impacted person).
Decide what you will prove
- Pick 2–4 claims you will support with sources.
- For each claim, write: “Best source type = …”.
- This prevents weak writing and factual risk.
List interview targets (easy outreach)
- 3–8 names/roles: “security lead”, “policy manager”, “researcher”.
- Write 3 questions each (short + specific).
- Keep interviews short: 10–15 minutes.
Research Pack Builder (copy-paste ready)
This connects directly to Process 1. Paste your Process 1 mini brief (optional), then generate a clean Research Pack.
For: [Publication] ([Section])
Reader: [Ideal Reader]
Core problem: [Problem]
Why now: [Stakes]
Angle promise: [Angle]
Fit scan notes (write after reading 5–10 stories):
• Tone: [ ] · Length: [ ] · Typical sources: [ ] · What they avoid: [ ]
Proof targets (claims):
• [Claim 1]
• [Claim 2]
Reader search intent (queries):
• [Query 1]
• [Query 2]
Source map:
• Official docs: [ ]
• Reports/data: [ ]
• Expert/practitioner: [ ]
Interview targets:
• [Target] — [Question]
Deliverable plan: [Deliverable plan]
Example Research Pack (copy the pattern)
Replace [bracketed text] with your own details.
For: [Tech / business site] ([AI / Work / Security])
Reader: A team lead who wants to use AI tools at work but struggles because they don’t know what is safe to share.
Core problem: People paste private info into AI tools without understanding the risks.
Why now: Many companies still lack clear rules, and the cost of one mistake is high.
Angle promise: A practical do/don’t checklist with safe prompt examples and red flags.
Fit scan notes: They like short intros, 1–2 expert quotes, and specific examples. They avoid fear-mongering.
Proof targets: (1) common data-leak paths, (2) real policy examples, (3) safe/unsafe prompt patterns.
Source map: official security guidance, platform privacy docs, reputable reports, 1 security lead interview.
Interview targets: security lead — top 3 mistakes; policy manager — rules; researcher — trend data.
Common beginner mistakes in research (and the fix)
Only reading blogs
Fix: add one expert/practitioner (10–15 min) or an email quote.
Repeating what exists
Fix: find a gap: what they missed + add your proof + checklist.
“Everyone says…”
Fix: choose 2–4 claims and assign a best source type to each.
Pitching the wrong section
Fix: read 5–10 recent stories and mirror their format + sourcing.
Checklist: are you ready to outline?
Click to check. When these are done, you’re ready for Process 3 (Outline & Angle).