SOC Fundamentals Introduction to SOC
Link: TryHackMe | SOC Fundamentals
๐ Purpose of a SOC
The SOC’s mission revolves around Detection and Response:
Detect vulnerabilities in systems and applications.
Identify unauthorized activity such as stolen credentials.
Spot policy violations like insecure file transfers.
Detect intrusions and malicious traffic. Once detected, the SOC supports incident response, minimizing impact and analyzing root causes.
๐ฅ People in SOC
Despite automation, human expertise is vital. Roles include:
SOC Analyst (Level 1): First responders, triaging alerts.
SOC Analyst (Level 2): Deeper investigations, data correlation.
SOC Analyst (Level 3): Experienced professionals handling containment and recovery.
Security Engineer: Deploys and configures tools.
Detection Engineer: Builds detection rules.
SOC Manager: Oversees processes and reports to the CISO.
⚙️ Processes in SOC
Processes ensure alerts are handled systematically:
Alert Triage: Answering the 5 Ws (What, When, Where, Who, Why).
Reporting: Escalating harmful alerts with evidence.
Incident Response & Forensics: Containment, eradication, and root cause analysis.
๐ป Technology in SOC
Tools empower detection and response:
SIEM (Security Information and Event Management): Collects logs, applies detection rules, and alerts suspicious activity.
EDR (Endpoint Detection and Response): Provides visibility into endpoint activity and automated responses.
Firewalls: Monitor and filter network traffic. Other solutions include Antivirus, IDS/IPS, SOAR, and XDR.
๐งช Practical Exercise
In the lab, acting as a Level 1 Analyst, you investigated a port scanning alert using SIEM logs. By applying the 5 Ws, you identified the source, destination, and intent, then closed the alert with proper documentation.
✅ Conclusion
The SOC is built on three pillars — People, Process, and Technology. Together, they create a mature environment capable of detecting and responding to threats effectively. This lab provided hands‑on experience in triage, reporting, and incident analysis, reinforcing the fundamentals every SOC analyst must master.
❓ FAQs
Q1: What does SOC stand for? Security Operations Center.
Q2: What are the three pillars of SOC? People, Process, and Technology.
Q3: Why are humans still important in SOC? Automation generates noise; analysts filter real threats and respond effectively.
Q4: What is the role of SIEM? SIEM centralizes logs, applies detection rules, and alerts suspicious activity.
Q5: What is alert triage? It’s the process of analyzing alerts using the 5 Ws to determine severity and priority.

%20-%20visual%20selection%20(2).png)
Comments
Post a Comment