SOC analysts

SOC Analysts

One-liner: Cybersecurity professionals who monitor, detect, investigate, and respond to security threats within a Security Operations Center (SOC).

🎯 What Is It?

SOC Analysts are the frontline defenders in a SOC, responsible for monitoring security alerts, investigating potential incidents, and coordinating responses to cyber threats. They work in tiered levels based on experience and responsibility.

🏆 SOC Analyst Tiers

Tier 1: Alert Triage Analyst

Focus: Monitor and triage

Responsibilities:

Skills Required:

Tier 2: Incident Responder

Focus: Investigate and respond

Responsibilities:

Skills Required:

Tier 3: Threat Hunter / Senior Analyst

Focus: Proactive hunting and advanced analysis

Responsibilities:

Skills Required:

📋 Daily SOC Analyst Workflow

Tier 1 Day-in-the-Life

08:00 - Shift handoff, review overnight alerts
08:30 - Triage queue: 47 new alerts
09:00 - Investigate potential phishing email
09:30 - Mark 12 alerts as false positives
10:00 - Escalate suspicious lateral movement to Tier 2
11:00 - Document findings in SIEM case
12:00 - Lunch
13:00 - Monitor real-time dashboard
14:00 - Investigate failed login spikes (brute force?)
15:00 - Weekly team training on new TTPs
16:00 - Update SOPs, close tickets

Tier 2 Investigation Example

1. Receive escalation: "Suspicious PowerShell execution"
2. Pivot to EDR for full process tree
3. Check parent process, command line arguments
4. Extract IOCs: IP, domain, file hash
5. Search threat intel feeds
6. Check MITRE ATT&CK: T1059.001 (PowerShell)
7. Contain: Isolate endpoint
8. Eradicate: Remove persistence mechanism
9. Document: Write incident report
10. Share IOCs with team

🛠️ Essential Tools

📈 Career Path

Junior SOC Analyst (Tier 1)
       ↓
SOC Analyst (Tier 2)
       ↓
Senior SOC Analyst / Threat Hunter (Tier 3)
       ↓
   ↙       ↘
SOC Manager   Detection Engineer

🎤 Interview Angles

Q: Walk me through how you would triage a phishing alert.

STAR Example:
Situation: Received alert for suspicious email with attachment sent to 50 users.
Task: Determine if phishing and scope of impact.
Action:

Q: How do you stay current with threats?