🔏
RootGuard
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
      • Who Am I?
        • Professional Profile
  • Resources Hub
    • Blogs
      • Articles
        • Safeguarding SMEs: The Strategic Importance of a Security Operations Center (SOC)
      • Posts
        • Roadmap to Becoming a Cybersecurity Specialist
        • Starting a Career in Cybersecurity
        • A Guide to Landing Your First Cybersecurity Analyst Role
        • Moving from Intermediate to Expert Incident Responder
  • SOC Operations
    • Introduction
      • Development Resources
        • SOC Analysts Roadmap
        • Becoming A SOC Analyst
        • SOC Analysts Prep Interview Questions
    • Essential Skills
      • Critical Windows EventIDs to Monitor
    • Junior Analyst Skills
      • Splunk Use Cases
      • KQL Use Cases
        • Reconnaissance (TA0043)
        • Initial Access (TA0001)
        • Execution (TA0002)
        • Persistence (TA0003)
        • Privilege Escalation (TA0004)
        • Defence Evasion (TA0005)
        • Credential Access (TA0006)
        • Discovery (TA0007)
        • Lateral Movement (TA0008)
        • Collection (TA0009)
        • Command and Control (TA0011)
        • Exfiltration (TA0010)
        • Impact (TA0040)
      • Investigating Common Attacks
        • Domain Dominance Attacks - Detection & Analysis
        • Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
        • Authentication From Suspicious DeviceName
        • Identifying Interactive or RemoteInteractive Session From Service Account
        • Identifying Split or Part Archive File Transfers
        • Detect Potential Cleartext Credentials in Command Line
        • Detecting Command Line Interpreters Launched via Scheduled Tasks
        • Detecting Files Containing Potentially Sensitive Data
        • Detecting DeviceNetworkEvents From Windows Processes and Domains by TLD
        • Detecting Silent cmd.exe Execution With Redirected STDERR & STDOUT
        • Detecting Low Prevalence DLL Loaded From Process In User Downloads Directory
        • Detecting Virtual Drive Mounted From Archive
        • Identify Execution of Script From User's Downloads Folder
        • Identify Potential RDP Tunneled Sessions
        • Identify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClient
        • Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
        • Detect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
        • Detect Execution of PSEXESVC via Remote Systems
        • Identify Suspicious String in Service Creation ImagePath
        • Identify File with Double Extensions
        • Detect Potential Cleartext Credentials in Commandline
        • Detect When Large Number of Files Downloaded From OneDrive or SharePoint
        • Identify and Investigate Phishing Attacks with KQL
      • PowerShell for SecOps
        • Powershell Remoting
        • Reconnaissance Discovery
        • Initial Access Discovery
        • Execution Discovery
        • Persistence Discovery
        • Privilege Escalation Discovery
        • Defence Evasion Discovery
        • Credential Access Discovery
        • Discovery
        • Lateral Movement Discovery
        • Collection Discovery
        • Command & Control (C2) Discovery
        • Exfiltration Discovery
        • Impact Discovery
      • Packet Analysis (pcap)
        • Tcpdump
        • Tcpdump (Intermediate)
        • Tshark
        • Ngrep
      • Investigating Suspicious Emails Using KQL
    • Intermediate and Advanced Skills
      • Investigate Using MITRE ATT&CK Methodology
        • Reconnaissance (TA0043) Techniques
        • Resource Development (TA0042) Techniques
        • Initial Access (TA0001) Techniques
        • Command Execution (TA0002) Techniques
        • Persistence (TA0003) Techniques
        • Privilege Escalation (TA0004) Techniques
        • Defence Evasion (TA0005) Techniques
        • Credential Access (TA0006) Techniques
        • Discovery (TA0007) Techniques
        • Lateral Movement (TA0008) Techniques
        • Collection (TA0009) Techniques
        • Command and Control (C2) (TA0011) Techniques
        • Exfiltration (TA0010) Techniques
        • Impact (TA0040) Techniques
    • Vulnerability Management
    • Malware Analysis
  • DFIR
    • Incident Response
      • Incident Triage
        • Triage Types and Processes
        • PowerShell for Detection and Analysis
          • Malware or Compromise Investigation
          • Lateral Movement Discovery
        • Registry Analysis
        • Sysinternals Intrusion Analysis
        • PowerShell Intrusion Analysis
        • Velociraptor Intrusion Analysis
        • Zimmerman Tools Intrusion Analysis
      • KAPE Artifacts Analysis
      • Velociraptor Artifacts Analysis
      • Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks
        • Phase 1 - Gaining an Initial Foothold
          • Gaining Access to the Network
          • Establishing a Foothold
          • Network Discovery
      • Response Strategies
        • Privilege Escalation Assessment
        • Command and Control Assessment
        • Command Execution Assessment
        • Defence Evasion Assessment
        • Detection Assessment
        • Discovery Assessment
        • Exfiltration Assessment
        • Initial Access Assessment
        • Initial Impact Assessment Techniques
        • Lateral Movement Assessment
        • Persistence Assessment
    • Windows Forensics
      • Evidence of Execution
      • Window Artifact Analysis
        • Account Usage
        • User Activity Tracking (Event Logs)
        • Program Execution
        • File and Folder Opening
        • File Download
        • Browser Usage
        • Deleted File or File Knowledge
        • External Device & USB Usage
    • Linux Forensics
      • Linux Commandline Basics
      • Host Compromise Assessment
    • KQL for Defender & Sentinel
      • MDO (Office)
      • MDI (Identity)
      • MDE (Endpoint)
    • Memory Forensics
      • Memory Forensics (Volatility 3)
    • Playbooks
      • First Responder DFIR Playbook
        • Device Isolation
        • Evidence Collection
          • Acquire Triage Image Using KAPE
          • Acquire Triage Data Using Velociraptor
          • Acquire Triage Data Using Powershell
          • Acquire Triage Memory Image
          • Acquire Image Using FTK
          • AXIOM Cyber Data Collection
        • Windows Forensic Artefacts
          • Application Execution
          • File & Folder Knowledge
          • External Device Usage
          • Network Activity
          • Windows Event Logs
        • Initial Analysis
          • Memory Analysis (Vol 3)
          • Axiom Cyber Examiner
  • Detection Engineering
    • AD Attack Detections & Mitigations
      • Kerberoasting
      • Authentication Server Response (AS-REP) Roasting
      • Password Spraying
      • MachineAccountQuota Compromise
      • Unconstrained Delegation
      • Password in Group Policy Preferences (GPP) Compromise
      • Active Directory Certificate Services (AD CS) Compromise
      • Golden Certificate
      • DCSync
      • Dumping ntds.dit
      • Golden Ticket
      • Silver Ticket
      • Golden Security Assertion Markup Language (SAML)
      • Microsoft Entra Connect Compromise
      • One-way Domain Trust Bypass
      • Security Identifier (SID) History Compromise
      • Skeleton Key
      • Active Directory Security Controls
      • Active Directory Events for Detecting Compromise
    • Attack Triage Playbooks (KQL Triage)
      • Windows Malware Detection Playbook
      • Linux Host Intrusion Detection Playbook (CLI)
      • Linux Intrusion Detection Playbook
      • Large-Scale Compromise Detection Playbook
      • Ransomware Detection Playbook
      • Phishing Email Compromise Detection Playbook
      • Scam Detection Playbook
      • Customer Phishing Detection Playbook
      • Insider Abuse Detection Playbook
      • Information Leakage Detection Playbook
      • Social Engineering Detection Playbook
      • Malicious Network Behaviour Detection Playbook
      • Windows Intrusion Detection Playbook
      • Vulnerability Detection Playbook
      • Business Email Compromise Detection Playbook
    • Process Execution (KQL Triage)
    • Threat Hunting
      • Hunting Ransomware Indicators
      • Hunting With KQL
        • Detecting Malware Infection (MITRE ATT&CK: T1566, T1059)
        • Discovery Activities (MITRE ATT&CK: T1016, T1083, T1046)
        • Credential Theft (MITRE ATT&CK: T1003, T1078)
        • Lateral Movement (MITRE ATT&CK: T1076, T1021)
        • Data Theft (MITRE ATT&CK: T1041, T1071)
        • Detecting CommandLine Executions (MITRE ATT&CK: T1059)
        • Windows Security Logs (Identity and Logon Activities)
      • Hunting With Splunk
Powered by GitBook
On this page
  • What is a Security Operations Center (SOC)?
  • Key SOC Functions:
  • Required Skillset of a SOC Analyst
  • SOC Analyst Daily Tasks
  • Training and Certifications
  • Path to Becoming a SOC Analyst
Edit on GitHub
  1. SOC Operations

Introduction

What is a Security Operations Center (SOC)?

A Security Operations Center (SOC) is a centralised function that serves as the nerve centre for an organisation’s security operations. The SOC is responsible for monitoring, detecting, analysing, and responding to ssecurity incidents in realtime to protect the organisation’s data, systems, and networks. It is staffed with skilled security professionals and equipped with advanced tools and technologies to proactively identify potential threats and mitigate risks.

Key SOC Functions:

  • Continuous monitoring of network traffic and system logs.

  • Incident detection and response.

  • Threat intelligence collection and analysis.

  • Vulnerability assessment and management.

  • Collaboration with other IT and security teams.

  • Reporting on security posture and incidents.

SOCs operate 24/7 in most cases to ensure round-the-clock protection against evolving cyber threats, making them an essential component of modern security strategies.


Required Skillset of a SOC Analyst

A SOC Analyst plays a critical role in detecting security threats. To excel in this role, individuals must possess a combination of technical expertise, analytical thinking, and communication skills.

Core Technical Skills:

  1. Network Security:

    • Understanding of TCP/IP, DNS, firewalls, and VPNs.

    • Familiarity with network intrusion detection and prevention systems (IDS/IPS).

  2. Endpoint Security:

    • Knowledge of endpoint detection and response (EDR) tools.

    • Proficiency in analysing system logs and monitoring endpoint activities.

  3. Threat Analysis:

    • Understanding the MITRE ATT&CK framework and other frameworks.

    • Ability to analyse malware, phishing attempts, and other threats.

  4. SIEM Tools:

    • Proficiency in Security Information and Event Management (SIEM) tools like Splunk, Sentinel, or QRadar.

  5. Incident Response:

    • Skills in triaging, investigating, and remediating security incidents.

    • Experience with digital forensics tools and techniques.

  6. Scripting and Automation:

    • Familiarity with Python, PowerShell, or Bash to automate routine tasks.

Soft Skills:

  • Critical Thinking and Problem-Solving: Ability to quickly assess and respond to evolving threats.

  • Communication Skills: Clear articulation of technical findings to non-technical stakeholders.

  • Teamwork: Collaboration with other SOC analysts and IT teams.

  • Attention to Detail: Meticulous review of logs and alerts to identify anomalies.


SOC Analyst Daily Tasks

SOC Analysts are at the forefront of defending an organisation against cyber threats. Their day-to-day responsibilities include:

  1. Monitoring and Alert Management:

    • Continuously monitoring security dashboards and alerts.

    • Prioritising and triaging alerts based on severity.

  2. Incident Investigation:

    • Conducting root-cause analysis of security incidents.

    • Identifying compromised systems and affected data.

  3. Threat Hunting:

    • Proactively searching for indicators of compromise (IoCs).

    • Utilising threat intelligence to uncover potential vulnerabilities.

  4. Reporting and Documentation:

    • Industry-recognised records of incidents and response actions.

    • Generating periodic reports on security trends and posture.

  5. Collaboration:

    • Coordinating with IT teams to resolve vulnerabilities.

    • Sharing insights with threat intelligence and incident response teams.

  6. Tool Maintenance:

    • Ensuring SIEM, IDS/IPS, and other security tools are operational and updated.

    • Fine-tuning alert thresholds to reduce false positives.


Training and Certifications

A solid foundation in security principles, combined with industry-recognised certifications, can significantly enhance a candidate’s employability as a SOC Analyst. Recommended certifications include:

  1. Entry-Level Certifications:

    • CompTIA Security+

    • Certified Ethical Hacker (CEH)

    • Microsoft Security Operations Analyst (SC-200)

    • OffSec Defense Analyst (OSDA) SOC-200

  2. Medium to Advanced Certifications:

    • GIAC Certified Incident Handler (GCIH)

    • CompTIA Cybersecurity Analyst (CySA+)

    • EC-Council Certified Security Analyst (ECSA)

    • Certified Information Systems Security Professional (CISSP)

    • Splunk Core Certified User or Analyst (for SIEM expertise)

  3. Specialised Certifications:

    • Offensive Security Certified Professional (OSCP)

    • SANS Cyber Threat Intelligence (GCTI)

Training courses offered by organisations like SANS, Cybrary and online platforms such as Coursera and Udemy provide excellent opportunities to gain relevant knowledge and practical skills.


Path to Becoming a SOC Analyst

Step 1: Build Foundational Knowledge

  • Pursue a degree in Computer Science, security, or a related field; however, a degree is not required.

  • Gain a strong understanding of networking, operating systems, and security principles.

Step 2: Gain Practical Experience

  • Intern with IT departments or security teams to gain hands-on experience.

  • Participate in security bootcamps or capture-the-flag (CTF) competitions.

  • Create a home lab for dedicated practice

Step 3: Obtain Relevant Certifications

  • Begin with entry-level certifications like Security+ and gradually progress to advanced certifications.

Step 4: Apply for Entry-Level Roles

  • Look for roles such as SOC Analyst Tier 1, IT Support Specialist, or Network Administrator.

  • Focus on gaining experience in core security skills, including log analysis, incident response, SIEM and EDR tools.

Step 5: Continue Professional Development

  • Stay updated on emerging cyber threats and technologies.

  • Pursue higher-level certifications and specialise in areas like incident response, threat hunting or digital forensics.

While the above recommendation is unlikely to be a fit for everyone, in general, by following the path, aspiring professionals can successfully embark on a rewarding career as a SOC Analyst, playing a pivotal role in safeguarding organisations against cyber threats.

PreviousMoving from Intermediate to Expert Incident ResponderNextDevelopment Resources

Last updated 4 months ago

Page cover image