This curriculum spans the design and operation of a full-scale security operations center, comparable in scope to a multi-workshop program for establishing SOC roles, integrating toolchains, and refining detection and response practices across enterprise environments.
Module 1: Defining SOC Structure and Operational Scope
- Selecting between centralized, decentralized, or hybrid SOC models based on organizational footprint and threat landscape exposure.
- Determining escalation paths for incident response between Tier 1 analysts, threat hunters, and external incident response teams.
- Establishing shift coverage models (24/7 vs. extended business hours) based on critical system availability and threat intelligence patterns.
- Allocating responsibilities between internal SOC staff and co-managed MSSP partners, including delineation of alert triage ownership.
- Integrating physical security monitoring into SOC operations when managing OT or industrial control systems.
- Defining what constitutes a reportable incident based on regulatory requirements (e.g., GDPR, HIPAA) and internal risk appetite.
Module 2: Role-Based Access and Identity Management in the SOC
- Implementing least-privilege access for SOC analysts on SIEM, EDR, and firewall management consoles using role-based access control (RBAC).
- Enforcing multi-factor authentication (MFA) for all privileged SOC tool access, including break-glass accounts for emergency access.
- Managing just-in-time (JIT) access for third-party vendors requiring temporary SOC tool access during investigations.
- Conducting quarterly access reviews to validate SOC personnel permissions against active roles and responsibilities.
- Integrating identity providers (IdP) with SOC tools to automate user provisioning and deprovisioning workflows.
- Logging and monitoring privileged session activity within the SOC to detect insider threats or credential misuse.
Module 3: SIEM Configuration and Log Source Integration
- Selecting log sources based on criticality, compliance mandates, and historical incident data relevance.
- Normalizing log formats across heterogeneous systems (Windows, Linux, cloud, network devices) for consistent correlation.
- Optimizing parsing rules to reduce false positives while maintaining detection coverage for known TTPs.
- Configuring log retention policies that balance forensic readiness with storage cost and legal requirements.
- Validating log integrity and time synchronization across sources to ensure reliable timeline reconstruction.
- Managing parser updates and correlation rule tuning during system upgrades or new application deployments.
Module 4: Threat Detection Engineering and Use Case Development
- Mapping detection rules to MITRE ATT&CK techniques based on organization-specific threat intelligence.
- Developing custom analytics for detecting lateral movement in hybrid cloud environments using EDR and VPC flow logs.
- Calibrating detection thresholds for brute-force attacks to reduce noise without missing targeted campaigns.
- Integrating threat intelligence feeds (STIX/TAXII) into detection rules while filtering out irrelevant IOCs.
- Documenting detection logic, expected triggers, and false positive conditions for peer review and auditability.
- Coordinating with red team findings to validate and refine detection efficacy for simulated adversary behaviors.
Module 5: Incident Triage, Investigation, and Escalation
- Standardizing initial triage workflows to determine incident scope, urgency, and required response team composition.
- Preserving volatile data (memory dumps, active connections) during live host investigations without disrupting operations.
- Correlating endpoint, network, and identity telemetry to reconstruct attack timelines across multiple systems.
- Deciding when to isolate compromised systems versus allowing controlled monitoring for threat intelligence gathering.
- Documenting chain of custody for forensic evidence when legal or regulatory proceedings are anticipated.
- Coordinating disclosure timelines with legal, PR, and executive leadership during breach incidents.
Module 6: Threat Hunting and Proactive Defense Operations
- Planning hypothesis-driven hunts based on emerging threat actor campaigns targeting the industry vertical.
- Leveraging EDR query languages to search for anomalous process creation or suspicious PowerShell usage patterns.
- Using network flow metadata to identify beaconing behavior or data exfiltration to unknown external IPs.
- Assessing the risk of deploying decoy assets (honeytokens) to detect insider threats or persistent adversaries.
- Measuring hunt effectiveness through metrics such as mean time to detect (MTTD) and number of new TTPs identified.
- Integrating hunting findings into automated detection rules to improve long-term SOC coverage.
Module 7: SOC Toolchain Integration and Automation
- Orchestrating SOAR playbooks for automated enrichment of phishing alerts using threat intelligence APIs.
- Integrating ticketing systems (e.g., ServiceNow) with SIEM to streamline incident tracking and analyst workflows.
- Evaluating API rate limits and reliability when connecting cloud-native tools (e.g., AWS GuardDuty, Azure Sentinel).
- Designing fallback procedures when automated response actions (e.g., host isolation) fail or trigger unintended outages.
- Managing version control for SOAR playbooks and detection scripts to support audit and rollback requirements.
- Monitoring tool health and data ingestion status to detect pipeline failures before they impact detection coverage.
Module 8: Performance Metrics, Reporting, and Continuous Improvement
- Defining KPIs such as mean time to acknowledge (MTTA) and mean time to contain (MTTC) for operational benchmarking.
- Generating executive reports that translate technical incidents into business impact (downtime, data exposure).
- Conducting post-incident reviews to identify process gaps and update runbooks accordingly.
- Aligning SOC metrics with industry frameworks (e.g., NIST, CIS) for external audit and compliance validation.
- Adjusting staffing levels and training focus based on incident volume, complexity, and skill gaps identified in reviews.
- Implementing feedback loops between detection engineering and analysts to refine alert quality and reduce fatigue.