This curriculum spans the technical and operational demands of a multi-workshop program, addressing the integration, tuning, and coordination of core SOC tools across on-premises and cloud environments as seen in ongoing security operations and internal capability development initiatives.
Module 1: Security Information and Event Management (SIEM) Deployment and Architecture
- Selecting between on-premises, cloud-hosted, or hybrid SIEM architectures based on data residency requirements and network latency constraints.
- Configuring log source normalization rules to ensure consistent parsing of firewall, endpoint, and application logs across heterogeneous environments.
- Designing scalable data retention policies that balance compliance mandates with storage cost and query performance.
- Implementing parser customization for proprietary application logs that lack standard syslog formatting.
- Evaluating the impact of high-volume log sources on ingestion licensing costs and adjusting collection scope accordingly.
- Integrating SIEM with identity providers to enrich events with user context from Active Directory or cloud IAM systems.
Module 2: Endpoint Detection and Response (EDR) Integration and Management
- Choosing EDR deployment methods (push installer, group policy, MDM) based on endpoint OS diversity and patch management workflows.
- Configuring real-time monitoring policies to detect suspicious process injection techniques without overwhelming analysts with false positives.
- Establishing containment protocols that define when and how endpoints are isolated based on threat severity and business impact.
- Developing custom detection rules for PowerShell obfuscation patterns observed in recent incident investigations.
- Coordinating EDR telemetry with network-based detection tools to validate lateral movement hypotheses.
- Managing agent update cycles to minimize endpoint performance degradation during business hours.
Module 3: Threat Intelligence Platform (TIP) Orchestration
- Filtering and prioritizing threat feeds based on relevance to industry vertical and observed attacker TTPs in the environment.
- Mapping STIX/TAXII indicators to internal detection rules and firewall block lists using automated playbooks.
- Assessing the operational risk of blocking IP addresses tied to shared hosting providers due to potential collateral impact.
- Validating the timeliness and accuracy of third-party threat intelligence by cross-referencing with internal incident data.
- Designing feedback loops to update threat intelligence confidence scores based on analyst validation outcomes.
- Integrating TIP outputs with ticketing systems to automate enrichment of security alerts with contextual IOCs.
Module 4: Network Detection and Response (NDR) Implementation
- Positioning network taps or SPAN ports to capture east-west traffic in segmented data center environments.
- Tuning NDR anomaly detection models to reduce false positives from legitimate backup or replication traffic.
- Correlating DNS tunneling alerts from NDR with firewall proxy logs to confirm exfiltration attempts.
- Handling encrypted traffic inspection using SSL/TLS decryption policies that comply with privacy regulations.
- Integrating NDR alerts with SIEM for centralized investigation while maintaining packet capture availability for deep analysis.
- Managing network sensor capacity planning based on bandwidth growth and protocol diversity (e.g., OT, IoT).
Module 5: Security Orchestration, Automation, and Response (SOAR) Workflow Design
- Mapping incident response runbooks into SOAR playbooks with conditional branching for different attack scenarios.
- Implementing role-based access controls in SOAR to restrict automated actions (e.g., quarantine, reset password) to authorized teams.
- Validating API connectivity and rate limits with third-party tools before deploying automated enrichment workflows.
- Designing manual approval checkpoints for high-risk actions such as disabling critical user accounts.
- Logging and auditing all automated actions for forensic traceability and compliance reporting.
- Optimizing playbook execution time by parallelizing enrichment tasks without overloading downstream systems.
Module 6: Vulnerability Management and Prioritization
- Integrating vulnerability scanner outputs with asset criticality databases to prioritize remediation efforts.
- Configuring scan windows to avoid production outages while maintaining weekly coverage of critical systems.
- Resolving false positives through authenticated scan validation and exclusion approval workflows.
- Coordinating patch deployment schedules with system owners and change advisory boards (CAB).
- Using exploit prediction metrics to focus attention on vulnerabilities with active in-the-wild exploitation.
- Generating executive reports that translate technical findings into business risk exposure metrics.
Module 7: Identity and Access Monitoring in the SOC
- Correlating failed logon spikes with known brute-force campaigns using time-series analysis in the SIEM.
- Configuring alerts for privileged account usage outside of approved time windows or geographic regions.
- Integrating identity governance tools with SOC workflows to detect and investigate excessive privilege accumulation.
- Responding to MFA fatigue attack indicators by reviewing push notification logs and enforcing throttling policies.
- Monitoring for suspicious service account activity, such as interactive logons or use from unauthorized hosts.
- Validating identity-based alerts against HR offboarding records to detect orphaned accounts.
Module 8: Cloud Security Posture and Workload Protection
- Integrating CSPM tools with cloud provider APIs to detect misconfigured S3 buckets or public database endpoints.
- Deploying container security agents in Kubernetes clusters to monitor for runtime anomalies and image vulnerabilities.
- Establishing alert thresholds for unusual cloud storage egress that may indicate data exfiltration.
- Mapping cloud-native logging services (e.g., AWS CloudTrail, Azure Monitor) to SOC detection rules.
- Managing permissions for cloud security tools using least-privilege IAM roles to prevent privilege escalation risks.
- Responding to serverless function execution anomalies by analyzing invocation patterns and payload sizes.