This curriculum spans the design and operation of a full-scale security operations center, comparable in scope to a multi-phase advisory engagement covering SOC governance, detection engineering, incident response orchestration, and proactive threat hunting across hybrid enterprise environments.
Module 1: Establishing the SOC Foundation and Operational Model
- Selecting between centralized, decentralized, or hybrid SOC staffing models based on organizational footprint and threat landscape exposure.
- Defining escalation paths and incident handoff procedures between Tier 1 analysts, Tier 2 responders, and external incident response teams.
- Integrating the SOC with existing ITIL-based service management processes for ticketing, change control, and problem management.
- Determining shift coverage requirements (24/7 vs. business hours) based on regulatory mandates and critical system availability.
- Establishing physical and logical access controls for SOC workstations, including privileged access management (PAM) integration.
- Documenting and version-controlling runbooks for common monitoring and alerting scenarios using standardized templates.
Module 2: Log Source Onboarding and Telemetry Normalization
- Validating log schema compatibility between source systems (e.g., firewalls, EDR, cloud platforms) and the SIEM parser requirements.
- Configuring secure log transport using TLS-encrypted syslog or API-based ingestion to prevent tampering in transit.
- Assessing log volume and retention needs per data source to optimize storage costs and forensic readiness.
- Mapping raw event fields to a common information model (e.g., CEF, LEEF) for cross-platform correlation.
- Implementing log source health monitoring to detect gaps in collection due to network outages or agent failures.
- Negotiating data sharing agreements with third-party vendors to obtain logs from managed services or SaaS platforms.
Module 3: SIEM Architecture and Rule Development
- Designing correlation rules with thresholds and time windows that balance detection sensitivity and false positive rates.
- Implementing suppression logic for known benign activities (e.g., scheduled patching, backup jobs) to reduce alert fatigue.
- Version-controlling detection rules in a Git repository to enable peer review and rollback capabilities.
- Validating rule performance impact on SIEM indexing and search latency under peak load conditions.
- Creating custom parsers for non-standard log formats before enabling correlation logic.
- Documenting the business justification and MITRE ATT&CK mapping for each active detection rule.
Module 4: Threat Detection Engineering and Analytics
- Integrating threat intelligence feeds (e.g., STIX/TAXII) with automated indicator ingestion and confidence scoring.
- Developing behavioral baselines for user and entity activity using UEBA to detect anomalies in access patterns.
- Building custom YARA rules to identify malware artifacts in endpoint memory dumps and file system scans.
- Deploying decoy assets (e.g., honeypots, honeytokens) to detect lateral movement and attacker reconnaissance.
- Validating detection coverage against the MITRE ATT&CK framework to identify defensive gaps.
- Conducting purple team exercises to test detection efficacy and tune analytics logic based on red team TTPs.
Module 5: Incident Triage and Response Orchestration
- Classifying alerts using a standardized severity matrix that incorporates exploitability, asset criticality, and data exposure.
- Initiating automated containment actions (e.g., disabling user accounts, blocking IPs via firewall APIs) within approved playbooks.
- Preserving chain of custody for forensic artifacts collected during triage for potential legal proceedings.
- Coordinating communication with legal, PR, and executive teams during confirmed data breach scenarios.
- Using SOAR platforms to standardize response workflows across phishing, ransomware, and insider threat incidents.
- Documenting incident timelines with UTC timestamps and evidence references for post-incident review.
Module 6: Continuous Monitoring and Performance Optimization
- Monitoring SIEM parser failure rates and tuning field extractions to reduce data loss.
- Adjusting alert thresholds based on historical baselines to adapt to changing network behavior.
- Conducting quarterly log source reviews to deactivate unused or low-value data feeds.
- Measuring mean time to detect (MTTD) and mean time to respond (MTTR) across incident categories.
- Optimizing SIEM search queries for performance during high-volume investigations.
- Rotating and archiving encryption keys used for log transport and storage per organizational key management policy.
Module 7: Compliance, Reporting, and Governance
- Generating audit-ready reports for regulatory frameworks (e.g., PCI DSS, HIPAA, GDPR) with predefined data fields.
- Implementing role-based access controls in the SIEM to enforce segregation of duties for analysts and administrators.
- Conducting quarterly access reviews for SOC personnel to validate ongoing authorization needs.
- Archiving raw logs and incident records in write-once, read-many (WORM) storage to meet legal hold requirements.
- Documenting exceptions to monitoring policies with risk acceptance approvals from data owners.
- Providing executive dashboards that highlight threat trends, detection efficacy, and resource utilization without technical jargon.
Module 8: Threat Hunting and Proactive Defense
- Scheduling regular hypothesis-driven hunts based on emerging threat intelligence or internal risk assessments.
- Using endpoint query tools (e.g., Velociraptor, Osquery) to collect process, registry, and network artifacts at scale.
- Correlating findings from memory analysis with disk-based indicators to confirm persistence mechanisms.
- Developing custom Sigma rules to translate detection logic across multiple SIEM platforms.
- Integrating passive DNS and netflow data to identify command-and-control communication patterns.
- Reporting hunting outcomes with actionable recommendations for detection rule updates or configuration hardening.