Soc L1
Soc L1
Patch to SOC
A Complete guide
ABUBAKAR-SOC
Information Security Fundamentals
Definition:
Information Security (often called “InfoSec”) is the practice of protecting information—whether
it is stored, processed, or transmitted—from unauthorized access, disclosure, alteration, and
destruction. It ensures that data remains safe and trustworthy no matter where it lives: on a
computer, in the cloud, or even on paper.
Real-World Example:
Imagine a hospital’s patient database. If a hacker steals or alters medical records, it could harm
patients’ treatment. By applying information security—like encryption, access controls, and
regular monitoring—the hospital ensures that only doctors and authorized staff can access the
right patient records, and no outsider can tamper with them.
Risk: The potential for loss or damage when a threat exploits a vulnerability.
Threat: Anything that can cause harm (hackers, malware, natural disasters, or even
careless employees).
Vulnerability: A weakness in a system that could be exploited (outdated software, weak
passwords, or misconfigured servers).
Real-World Example:
Think of a house:
Policy: High-level rules that guide security (e.g., “All employees must use strong
passwords”).
Standard: Specific requirements to support policies (e.g., “Passwords must be at least 12
characters long”).
Procedure: Step-by-step instructions on how to follow the standards (e.g., “How to reset
your password when forgotten”).
Real-World Example:
In an office:
A policy might say, “The office must remain secure after hours.”
A standard would be, “Doors should be locked by 9 PM, and CCTV must remain
active.”
A procedure would explain how the security guard should check and lock each door
every night.
In cybersecurity, these three levels work together to ensure organizations remain safe and
compliant.
DAC (Discretionary Access Control): Owners decide who can access their resources.
MAC (Mandatory Access Control): Access is decided by strict policies, often used in
government/military.
RBAC (Role-Based Access Control): Access depends on a user’s role (e.g., “Manager”
vs “Intern”).
ABAC (Attribute-Based Access Control): Access depends on multiple conditions
(time, location, device, etc.).
Real-World Example:
DAC: You own a Google Doc and choose who to share it with.
MAC: Classified government files—only those with top-secret clearance can access.
RBAC: In a company, HR staff can access employee records, but engineers cannot.
ABAC: You can access your bank account only if you log in from your registered device
and location.
Real-World Example:
Think of logging into an online banking system:
Authentication: You enter your username and password (maybe with OTP for extra
security). The system checks if you are really you.
Authorization: Once logged in, you can see your account balance but cannot access the
bank’s admin controls.
Accounting: The system logs that you checked your balance at 10:30 AM from your
device, so any suspicious activity can later be traced.
Key Functions:
Single Sign-On (SSO): One login gives access to multiple systems (like Google or
Microsoft accounts).
Multi-Factor Authentication (MFA): Adds extra steps (like SMS code or fingerprint).
Provisioning & De-provisioning: Granting or removing access when employees join or
leave.
Real-World Example:
In a corporate office:
An employee logs in to their work account using SSO → they can access email, cloud
storage, and internal apps without separate logins.
If they leave the company, IAM ensures their access is revoked immediately so they
cannot log in anymore.
History of Cryptography
Definition:
Cryptography is the science of protecting information so only the intended people can read it.
Ancient times: People used simple techniques like Caesar Cipher, where each letter was
shifted by a fixed number (A → D, B → E, etc.).
Modern times: Uses complex math and computers to secure digital data like emails,
payments, and chats.
Real-World Example:
Julius Caesar used a shift cipher to send military orders that enemies couldn’t easily read. Today,
WhatsApp uses end-to-end encryption so only you and the person you’re chatting with can read
the messages.
Asymmetric Encryption:
Uses two keys: a public key (shared with everyone) and a private key (kept secret).
Public key locks the data, private key unlocks it.
Real-World Example:
Symmetric: When you set a Wi-Fi password, everyone connects using the same key →
simple and fast.
Asymmetric: When you shop online, your browser uses the website’s public key to
encrypt your credit card info, but only the website’s private key can unlock it.
Digital Signatures:
A way to prove that a message really came from the sender and was not changed.
Combines hashing + encryption.
Real-World Example:
Hashing: When you download a file, the website gives you a hash (like a fingerprint).
After download, your computer generates the hash and compares it. If they match → file
is safe.
Digital Signatures: When software like Windows updates are released, they’re signed
digitally. If hackers tamper with the update, the signature check fails.
Real-World Example:
When you visit https://www.google.com, your browser checks Google’s certificate. If valid and
signed by a trusted CA, you see the padlock icon. This proves you are really talking to Google,
not an imposter.
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are protocols that
secure communication over the internet.
HTTPS is simply HTTP running over SSL/TLS.
Real-World Example:
When you enter your credit card on Amazon:
1. Your browser and Amazon’s server create a secure encrypted channel using TLS.
2. Data is scrambled before transmission.
3. Hackers listening on the network cannot read it.
Definition: An operating system (OS) is software that manages computer hardware and
provides services for applications. It acts as a bridge between users and machines.
Real-world example: When you click an icon on Windows or type a command in Linux,
the OS handles memory, CPU, and disk usage to run that program. Without it, your
computer would just be raw hardware.
Definition: Windows uses layers like the Kernel (core system), User Mode, and
Security Subsystems to manage processes, memory, and permissions. Built-in features
like User Account Control (UAC) and Windows Defender protect the system.
Real-world example: When you try to install new software, Windows asks for admin
permission (UAC). This prevents malicious apps from sneaking into the system.
Definition: A file system organizes how data is stored and accessed. Permissions (Read,
Write, Execute) control who can do what with files.
Real-world example: On Linux, a log file may only allow admins to write but let users
only read it. This prevents unauthorized tampering with sensitive records.
5. System Hardening Techniques
6. Cryptography
a) History of Cryptography
Symmetric: Same key is used to lock and unlock data. (Fast but requires secure key
sharing.)
Asymmetric: Uses a public key (for encryption) and a private key (for decryption).
(Secure but slower.)
Real-world example: When you zip a file with a password, it’s symmetric. When you
send an email with PGP, it’s asymmetric.
Hashing: Converts data into a fixed-length unique value. If the data changes, the hash
changes.
Digital Signature: Verifies authenticity and integrity of data using cryptography.
Real-world example: Websites store your password as a hash, not plain text. When you
log in, it compares hashes instead of storing your actual password.
Definition: Public Key Infrastructure (PKI) manages encryption keys and digital
certificates to establish trust.
Real-world example: When you see a padlock in your browser, a certificate issued by a
trusted authority ensures the site is legitimate.
Definition: TLS/SSL are protocols that secure communication over the internet. HTTPS
is the secure version of HTTP using TLS.
Real-world example: When you buy something online, your credit card details are
encrypted by HTTPS so hackers can’t read them.
Definition: Cloud security involves protecting data, applications, and resources stored on
cloud platforms like AWS, Azure, or Google Cloud.
Real-world example: A company using AWS S3 buckets must configure access
properly. If left public, attackers can steal sensitive customer data (a mistake many firms
have made).
Definition: In the cloud, security is shared between provider and customer. The cloud
provider secures the infrastructure, while the customer secures applications, data, and
user access.
Real-world example: Microsoft Azure ensures physical servers are safe, but if a
company stores passwords in plain text on Azure, that’s the company’s fault—not
Azure’s.
Definition: A SOC is a centralized unit that monitors, detects, and responds to security
incidents. Analysts work in tiers (L1, L2, L3).
Real-world example: A bank’s SOC monitors ATM transactions and alerts if suspicious
activity (like 50 withdrawals in 5 minutes) occurs.
Definition: Security Information and Event Management (SIEM) tools collect logs from
different sources, correlate them, and raise alerts.
Real-world example: A SIEM like Splunk or Wazuh might detect 5 failed logins
followed by a successful login from a foreign country → triggers a brute force alert.
2. Firewalls
Definition: A firewall filters incoming and outgoing traffic based on rules (e.g., blocking
suspicious IPs).
Types: Packet-filtering, Stateful, Next-Gen (NGFW).
Real-world example: A bank configures its firewall to block all traffic except from
trusted IP addresses.
Definition: A VPN creates an encrypted tunnel between the user and the network, hiding
activity from attackers.
Real-world example: Remote employees using VPNs to securely access company
servers during work-from-home.
5. Network Monitoring Tools
Definition: Collecting external threat data (IPs, domains, malware hashes) to detect
attacks.
Real-world example: A SIEM detects an IP from a known threat feed blacklist trying
to access the corporate network → alert is triggered.
Definition: Tools that monitor endpoints (laptops, servers) for suspicious activity.
Real-world example: CrowdStrike Falcon detects ransomware running on a
workstation and automatically kills the process.
Definition: Fake systems or services designed to attract attackers and study their
behavior.
Real-world example: A honeypot simulating a vulnerable database is deployed;
attackers try to exploit it, and SOC learns their methods.
9. Network Segmentation
2. Viruses
Definition: Malicious code that attaches itself to files/programs and spreads when
executed.
Real-world example: The ILOVEYOU Virus (2000) spread via email attachments and
caused $10B in damages.
3. Worms
4. Trojans
5. Ransomware
7. Rootkits
8. Botnets
9. Zero-Day Exploits
Steps:
Identify vulnerabilities (scans, reports).
o
Assess severity (CVSS score).
o
Patch or mitigate.
o
Real-world example: Equifax Breach (2017) happened because a known vulnerability
in Apache Struts was left unpatched → 147M people’s data exposed.
11. Common Attack Techniques
1. Unvalidated Input
o Definition: Applications accepting user input without verifying it.
o Example: A website search bar directly running whatever you type in the database
query.
o Real World: Early SQL Injection attacks where attackers typed "OR '1'='1" into
login forms.
2. Broken Access Control
o Definition: Users being able to access areas they should not.
o Example: A normal user typing /admin in the URL and accessing admin pages.
o Real World: Early e-commerce sites where customers could view other people’s
orders just by changing the URL order number.
3. Broken Authentication & Session Management
o Definition: Weak login, poor password storage, or session IDs exposed.
o Example: Session IDs in URL (example.com/home?sessionid=12345).
o Real World: Attackers stealing session cookies in early forums to hijack accounts.
4. Cross-Site Scripting (XSS)
o Definition: Malicious scripts injected into websites.
o Example: Attacker puts <script>alert("Hacked")</script> into a comment box.
o Real World: MySpace “Samy Worm” (2005) where one XSS attack spread to
over 1 million profiles.
5. Buffer Overflows
o Definition: When programs put more data into memory than allocated.
o Example: Sending 500 characters to a field meant for 50.
o Real World: Classic Windows worms exploiting buffer overflows to crash
systems.
6. Command Injection
o Definition: Attackers running system commands through vulnerable applications.
o Example: A form field that executes ping and attacker enters ; rm -rf /.
o Real World: Shellshock bug in 2014 (though after 2003 list, it’s a classic case).
7. Error Handling Problems
o Definition: Applications revealing too much info in error messages.
o Example: “Database error: username field missing in table users.”
o Real World: Leaked SQL errors helping attackers craft injection payloads.
8. Insecure Storage
o Definition: Sensitive data stored without encryption.
o Example: Credit cards saved in plain text in database.
o Real World: Early retail breaches where customer data was dumped online
unencrypted.
9. Denial of Service (DoS)
o Definition: Flooding systems with traffic to make them unavailable.
o Example: Sending millions of requests per second.
o Real World: Early botnet attacks on Yahoo! and eBay (2000s).
10. Insecure Configuration Management
Many categories stayed similar, but XSS, Injection, Broken Access Control, Insecure
Configurations, and Buffer Overflows remained strong concerns.
Examples: SQL Injection remained a leading cause of data breaches.
👉 Example: CSRF – Imagine a banking site where if you’re logged in and visit a malicious link,
it automatically transfers money without your permission.
🔹 OWASP Top 10 – 2010
👉 Example: Unvalidated Redirects – Clicking a link on a trusted site that secretly redirects you
to a phishing site.
1. Injection
2. Broken Authentication & Session Management
3. Cross-Site Scripting (XSS)
4. Insecure Direct Object References
5. Security Misconfiguration
6. Sensitive Data Exposure
7. Missing Function Level Access Control
8. CSRF
9. Using Components with Known Vulnerabilities
10. Unvalidated Redirects and Forwards
👉 Example: Target Breach (2013) – Attackers exploited vulnerable components and poor
network segmentation.
1. Injection
2. Broken Authentication
3. Sensitive Data Exposure
4. XML External Entities (XXE)
5. Broken Access Control
6. Security Misconfiguration
7. Cross-Site Scripting (XSS)
8. Insecure Deserialization
9. Using Components with Known Vulnerabilities
10. Insufficient Logging & Monitoring
👉 Example: Equifax Breach (2017) – Attackers exploited Apache Struts vulnerability (known
component issue).
👉 Example: Capital One Breach (2019) – SSRF vulnerability exploited to access AWS metadata
service and steal data of 100M+ customers.
Tier 1 (L1) – Monitoring & Triage: First line, analyzes alerts, escalates if suspicious.
Tier 2 (L2) – Incident Response: Deeper analysis, containment, eradication.
Tier 3 (L3) – Threat Hunting & Forensics: Advanced investigation, malware analysis.
SOC Manager: Oversees operations, policies, compliance.
Real-world example: During the SolarWinds Attack (2020), SOC analysts in U.S.
government agencies detected unusual network traffic and escalated it for deep
investigation.
3. What is SIEM?
4. SOC vs SIEM
6. Threat Hunting
8. Challenges in SOC
IDS (Detection): Monitors network/system traffic for suspicious activity and alerts SOC.
IPS (Prevention): Detects and automatically blocks malicious traffic.
Placement: Usually behind the firewall.
Real-world example: An IPS blocked a SQL injection attempt targeting an e-commerce
site’s login page.
3. Endpoint Detection & Response (EDR)
Definition: Security tool that monitors endpoint (laptops, servers, mobile) activities for
suspicious behavior.
Features:
o Detects malware, ransomware, and abnormal processes.
o Provides visibility into endpoint activities.
o Allows remote isolation of infected machines.
Popular EDR Tools: CrowdStrike, Carbon Black, Microsoft Defender for Endpoint.
Real-world example: CrowdStrike EDR stopped Ryuk ransomware from spreading
across hospital endpoints in 2020.
4. Antivirus / Anti-malware
Definition: A solution that prevents sensitive data (like credit card numbers, SSNs,
company secrets) from leaving the network.
Use Cases:
o Email monitoring.
o Blocking USB transfers.
o Cloud storage monitoring.
Real-world example: DLP blocked an employee from uploading customer credit card
data to Google Drive.
Role here: Provides central visibility for firewall, IDS/IPS, EDR, DLP logs.
Real-world example: SIEM correlates alerts from IDS + Firewall + EDR to detect a
coordinated attack.
7. SOAR (Security Orchestration, Automation & Response)
Definition: Automates repetitive SOC tasks (alert triage, blocking IPs, quarantining
devices).
Benefit: Reduces response time, helps SOC scale.
Real-world example: A SOAR system auto-blocked an IP after detecting 3 failed logins
+ 1 phishing email + malicious DNS request from the same attacker.
8. Honeypots / Honeynets
Definition: Decoy systems designed to lure attackers and study their techniques.
Use: Threat intelligence, research, early warning.
Real-world example: A honeypot server pretending to be a vulnerable database captured
ransomware samples used by attackers.
9. Vulnerability Scanners
Phases:
1. Preparation – Create IR policies, train staff, deploy tools (SIEM, EDR).
2. Detection & Analysis – Identify incidents using logs, alerts, threat intelligence.
3. Containment, Eradication & Recovery – Isolate infected systems, remove
malware, restore systems from backup.
4. Post-Incident Activity – Lessons learned, improve defenses.
Real-world example: A SOC detected brute-force login attempts → contained by
blocking attacker IP → later reviewed logs to strengthen password policy.
Logs: Windows Event Logs, Linux Syslogs, firewall logs, SIEM data.
Network Data: Packet captures (PCAPs), NetFlow.
Disk Data: Deleted files, hidden partitions.
Memory: Running processes, encryption keys, malware traces.
Cloud Data: SaaS access logs, API logs.
Real-world example: During a bank fraud investigation, firewall logs revealed data
exfiltration to an IP in another country.
Actions:
o Review incident details.
o Update security controls (patching, new firewall rules).
o Improve policies (stronger MFA, new logging rules).
o Train staff on lessons learned.
Real-world example: After Target’s 2013 breach, they improved vendor access
controls and hired a new CISO.
2. Endpoint Security
3. Application Security
4. Cloud Security
Goal: Secure data, apps, and workloads in cloud environments (AWS, Azure, GCP).
Controls: IAM, encryption, monitoring, compliance checks.
Threats: Misconfigurations, data breaches, API abuse.
Real-world example: Capital One breach (2019) → hacker exploited AWS
misconfigured firewall and stole customer data.
5. Mobile Security
Goal: Protect smartphones/tablets from malware, data theft, and unauthorized access.
Controls: MDM (Mobile Device Management), app vetting, biometric authentication.
Threats: Malicious apps, SIM swapping, mobile phishing.
Real-world example: Pegasus spyware infected mobile devices of journalists and
officials through zero-click exploits.
6. IoT Security
Goal: Secure smart devices (CCTV, smart meters, cars, medical devices).
Controls: Device authentication, firmware updates, network segmentation.
Threats: Botnets, default credentials, lack of patching.
Real-world example: Mirai botnet (2016) → IoT devices were hijacked to launch
massive DDoS attacks.
7. Data Security
5. Vulnerability Scanners
1. Preparation
o Build IR policies, playbooks, and train SOC teams.
o Tools: SIEM, EDR, forensic kits.
o Example: A financial company creates an IR playbook to respond to phishing
attacks.
2. Detection & Analysis
o Identify unusual activity via logs, alerts, user reports.
o Validate whether it’s a true incident.
o Example: SOC detects abnormal login attempts from Russia on a U.S.-only
company’s system.
3. Containment, Eradication & Recovery
o Containment: Stop the spread (e.g., isolate endpoints, block IPs).
o Eradication: Remove malware, patch systems.
o Recovery: Restore services and monitor.
o Example: During the WannaCry ransomware attack (2017), hospitals isolated
infected machines, patched SMB protocol, and restored backups.
4. Post-Incident Activity (Lessons Learned)
o Document root cause, update defenses, improve playbooks.
o Example: After a phishing breach, a company enforces multi-factor
authentication (MFA).
Example: In 2013, Target’s data breach happened via a compromised HVAC vendor account.
Incident response teams later traced the intrusion to stolen credentials.
🔹 Digital Forensics
Definition:
Digital Forensics is the process of collecting, preserving, analyzing, and presenting digital
evidence in a legally acceptable way.
1. Identification
o Recognize potential evidence (logs, disks, memory dumps).
o Example: Suspicious USB drive found in a compromised office computer.
2. Preservation
o Ensure evidence is not tampered with (write blockers, hashing).
o Example: Creating a forensic image of a hard drive using FTK Imager.
3. Collection
o Gather evidence from endpoints, servers, network traffic.
o Example: Using Wireshark to capture malicious C2 traffic.
4. Examination
o Extract hidden, deleted, or encrypted files.
o Example: Recovering deleted ransomware executables with Autopsy/Sleuth Kit.
5. Analysis
o Correlate data, timelines, logs, and user activity.
o Example: Investigating insider data theft by analyzing USB connection logs and
file transfers.
6. Presentation
o Prepare reports and expert testimony for legal cases.
o Example: A forensic investigator presenting timeline evidence in court about an
employee who exfiltrated customer records.
🔹 Forensic Tools
Disk Forensics: FTK Imager, Autopsy, EnCase.
Memory Forensics: Volatility, Rekall.
Network Forensics: Wireshark, Zeek.
Mobile Forensics: Cellebrite, Oxygen Forensic Suite.
Example: In the 2014 Sony Pictures Hack, forensic investigators used network forensics to
trace data exfiltration routes linked to North Korea.
🔹 Security Policies
Definition:
Security policies are high-level rules that guide how an organization protects its information
systems and data.
Acceptable Use Policy (AUP): Defines how employees can use company devices &
networks.
o Example: Employees cannot install unauthorized apps on company laptops.
Password Policy: Rules for strong passwords & MFA.
o Example: Minimum 12 characters, include upper/lowercase, numbers, and
symbols.
Data Classification Policy: Defines data sensitivity levels (Public, Confidential,
Restricted).
o Example: Credit card data = Restricted.
Incident Response Policy: Steps for handling security breaches.
Remote Work Policy: Secure VPN, no public Wi-Fi without encryption.
🔹 Compliance Standards
Organizations must follow global compliance frameworks depending on industry.
1. ISO/IEC 27001
o International standard for Information Security Management Systems (ISMS).
o Focus: Confidentiality, Integrity, Availability (CIA Triad).
o Example: A bank implements ISO 27001 controls like access management &
encryption.
2. GDPR (General Data Protection Regulation – EU)
o Protects personal data of EU citizens.
o Requires consent, right to be forgotten, breach notifications.
o Example: Facebook fined €1.2B in 2023 for transferring EU user data to the U.S.
without proper safeguards.
3. PCI-DSS (Payment Card Industry Data Security Standard)
o For organizations handling credit/debit cards.
o Example: An e-commerce store must encrypt cardholder data & pass PCI scans.
4. HIPAA (Health Insurance Portability and Accountability Act – U.S.)
o Protects patient health information (PHI).
o Example: Hospitals must encrypt patient records & restrict access.
5. SOC 2 (System and Organization Controls)
o Focus: Security, Availability, Processing Integrity, Confidentiality, Privacy.
o Example: Cloud service providers use SOC 2 audits to prove trustworthiness.
🔹 Risk Management
Definition:
Risk Management is identifying, assessing, and mitigating threats to an organization’s assets.
1. Identify Risks
o Example: Weak password policy, outdated servers, insider threats.
2. Analyze Risks
o Assess likelihood (High/Medium/Low) and impact (Severe/Moderate/Minor).
o Example: Ransomware = High likelihood + Severe impact.
3. Mitigation Strategies
o Avoid: Remove risky process.
o Reduce: Apply controls (patching, MFA).
o Transfer: Buy cyber insurance.
o Accept: Live with the risk if impact is small.
4. Monitor & Review
o Regular audits, penetration testing, vulnerability scanning.
Examples of IOCs:
Real-world Example:
In the SolarWinds Hack (2020), IOCs included malicious DLL file hashes and suspicious
domain names used by attackers.
Splunk
IBM QRadar
Microsoft Sentinel
Elastic SIEM
Wazuh (open source)
Functions of SIEM:
Real-world Example:
Examples:
Initial Access: Phishing emails with malicious attachments.
Execution: PowerShell script execution.
Persistence: Registry Run Keys.
Exfiltration: Data over HTTPS.
Real-world Example:
During the Colonial Pipeline Attack (2021), MITRE ATT&CK techniques like credential
access and lateral movement were identified.
Definition: The process of collecting, preserving, and analyzing digital evidence in a way
that is legally acceptable.
Goal: Understand how an attack happened, identify the attacker, and ensure evidence is
valid in court.
Example: After a ransomware attack, forensic experts analyze logs, memory dumps, and
disk images to trace the origin.
5. Types of Forensics
Disk Forensics: Analyzing hard drives for deleted files, malware, or hidden data.
o Example: Restoring deleted emails to investigate insider fraud.
Memory Forensics: Analyzing RAM to detect running malware.
o Example: Catching fileless malware (lives in memory only).
Network Forensics: Investigating traffic captures for suspicious patterns.
o Example: Detecting data exfiltration over unusual ports.
Mobile Forensics: Extracting evidence from smartphones (calls, chats, GPS).
o Example: Law enforcement retrieving WhatsApp data in a cybercrime case.
Phishing Attack: Block sender domain, reset compromised accounts, awareness training.
Malware Infection: Isolate infected host, remove malware, patch vulnerability.
Data Breach: Identify leaked data, notify impacted users, strengthen access control.
DDoS Attack: Use traffic filtering, cloud mitigation (Cloudflare/Akamai), contact ISP.
SOCs are evolving rapidly due to the volume of threats and shortage of skilled
analysts.
Traditional manual monitoring is not enough → automation & AI are the future.
Use Cases:
o Detect anomalies in network traffic.
o Predict attacks using historical data.
o Automate triage of alerts.
Example: ML model detects unusual login from China at midnight and flags it before the
attacker escalates privileges.
Definition: Unified security platform that combines endpoint, network, cloud, and email
security.
Why useful? Provides a single pane of glass view instead of multiple tools.
Example: If attacker compromises endpoint → XDR shows related network traffic,
cloud logins, and email compromise in one dashboard.
L1 – SOC Analyst:
o First line of defense.
o Monitors alerts, escalates real incidents.
o Example: Sees brute-force alerts in SIEM and escalates.
L2 – Incident Responder:
o Investigates incidents in-depth, performs containment.
o Example: Analyzes malware samples, isolates affected machines.
L3 – Threat Hunter/Forensics Expert:
o Proactively hunts threats, does malware reverse engineering.
o Example: Finds an advanced persistent threat (APT) in network before it causes
damage.
Future Roles: AI Security Engineer, Cloud SOC Analyst, Red Team Operator integrated
into SOC.
Monitor Alerts
o Watch SIEM dashboards for security events.
o Example: Multiple failed login attempts trigger an alert.
Triage Incidents
o Determine if an alert is a real threat or false positive.
o Example: Email flagged as phishing but sender is internal → false positive.
Escalation
o Pass confirmed incidents to L2 analysts for deeper investigation.
o Example: Malware detected on endpoint → L2 investigates file behavior.
Basic Endpoint & Network Investigation
o Check logs, endpoint status, and network activity.
o Example: Check Wireshark capture for unusual outbound traffic.
Maintain Documentation
o Record alerts, actions taken, and escalations.
4. Vulnerability Reporting
Process:
1. Identify potential vulnerabilities (via SIEM, vulnerability scanners, or EDR).
2. Validate severity (Critical, High, Medium, Low).
3. Document details (system, vulnerability type, impact, proof of concept).
4. Report to L2/L3 or vulnerability management team.
Example: L1 detects outdated SSL version on server → reports to L2 → patch applied.
✅ Summary
L1 SOC analysts are the first line of defense, monitoring alerts, triaging, and escalating
incidents.
They use SIEM, EDR/XDR, and SOAR tools to identify threats quickly.
Proper documentation and vulnerability reporting is key to keeping SOC operations
effective.
KPIs like MTTD, MTTR, and ticket resolution rate help measure performance.