This curriculum spans the design and operation of a full-scale Security Operations Center, comparable in scope to multi-phase advisory engagements that establish 24/7 monitoring, integrate threat intelligence, configure SIEM and EDR systems, automate response workflows, and implement continuous improvement programs across people, processes, and technology.
Module 1: SOC Architecture and Operational Design
- Selecting between centralized, distributed, and hybrid SOC models based on organizational footprint and threat exposure.
- Defining escalation paths and shift handover procedures to ensure continuity during 24/7 monitoring operations.
- Integrating physical and logical access controls for SOC workstations and investigation terminals.
- Designing network segmentation to isolate SOC tools, analysts, and management functions from production environments.
- Establishing secure remote access protocols for off-site SOC personnel with multi-factor authentication and session logging.
- Implementing role-based access control (RBAC) to restrict analyst permissions based on job function and data sensitivity.
- Choosing between on-premises, cloud-hosted, or managed SOC tooling based on data residency and compliance requirements.
- Documenting and version-controlling SOC runbooks to support consistent incident response and onboarding.
Module 2: Threat Intelligence Integration and Management
- Evaluating commercial, open-source, and ISAC-provided threat intelligence feeds for relevance and reliability.
- Mapping threat intelligence to MITRE ATT&CK techniques and aligning detection rules accordingly.
- Automating IOC ingestion into SIEM and EDR platforms using STIX/TAXII protocols with validation checks.
- Establishing feedback loops to enrich threat intelligence with internal telemetry and incident findings.
- Assigning ownership for threat actor profiling and tracking campaign evolution across multiple incidents.
- Implementing false positive reduction mechanisms for high-volume IOCs to avoid alert fatigue.
- Classifying intelligence by confidence, relevance, and timeliness to prioritize operational use.
- Managing expiration and deprecation of threat indicators to maintain data hygiene in detection systems.
Module 4: SIEM Configuration and Log Management
- Defining log retention policies based on regulatory requirements, forensic needs, and storage costs.
- Normalizing and parsing heterogeneous log sources to ensure consistent field mapping and correlation accuracy.
- Tuning correlation rules to reduce false positives while maintaining detection coverage for critical threats.
- Validating log source connectivity and completeness using heartbeat monitoring and log coverage dashboards.
- Implementing parsing overrides and custom parsers for non-standard application logs.
- Managing parser performance to prevent SIEM resource exhaustion during peak ingestion periods.
- Establishing data tiering strategies (hot/warm/cold) to balance query performance and storage expenses.
- Enforcing encryption and access logging for archived logs to meet audit requirements.
Module 5: Endpoint Detection and Response (EDR) Operations
- Configuring EDR agents to balance telemetry depth with system performance impact on endpoints.
- Defining containment policies for automated response actions, including isolation and process termination.
- Validating EDR coverage across server, desktop, and cloud workloads with automated compliance checks.
- Managing false positive triage for behavioral detections using analyst feedback loops.
- Conducting live forensic collection via EDR consoles during active incident investigations.
- Integrating EDR alerts into SIEM for centralized correlation with network and identity events.
- Rotating and securing EDR console credentials and API keys with privileged access management tools.
- Testing EDR detection rules against adversary simulation exercises to validate efficacy.
Module 6: Network Monitoring and Traffic Analysis
- Deploying network taps and SPAN ports to ensure complete visibility into critical segments.
- Configuring full packet capture systems with retention policies aligned to incident response needs.
- Using NetFlow and metadata analysis to detect lateral movement and data exfiltration patterns.
- Integrating IDS/IPS alerts with SIEM and ticketing systems using standardized event formats.
- Filtering and prioritizing network alerts based on asset criticality and threat severity.
- Conducting baseline analysis of normal network behavior to improve anomaly detection accuracy.
- Managing decryption of TLS traffic for inspection while complying with privacy regulations.
- Responding to encrypted C2 traffic by correlating DNS requests and beaconing patterns.
Module 7: Incident Triage, Investigation, and Response
- Standardizing initial triage procedures using a decision matrix based on impact and confidence.
- Assigning incident ownership and severity levels using a consistent classification framework.
- Executing containment actions with documented approval workflows to prevent unauthorized disruption.
- Preserving forensic artifacts before system remediation or re-imaging.
- Coordinating cross-team response activities with IT, legal, and communications stakeholders.
- Using timeline analysis to reconstruct attacker activities across multiple systems and time zones.
- Documenting investigation findings in structured reports for executive and technical audiences.
- Conducting post-incident reviews to update detection rules and response playbooks.
Module 8: SOC Automation and Orchestration (SOAR)
- Selecting use cases for automation based on volume, repetitiveness, and risk of manual error.
- Developing playbooks that include conditional logic, human-in-the-loop approvals, and error handling.
- Integrating SOAR with ticketing, email, and collaboration platforms for seamless workflow handoffs.
- Testing automated actions in a staging environment before production deployment.
- Monitoring playbook execution logs to detect failures and performance degradation.
- Managing API rate limits and authentication tokens across integrated security tools.
- Version-controlling SOAR playbooks and tracking changes through configuration management.
- Measuring automation effectiveness using metrics such as mean time to acknowledge and containment.
Module 9: SOC Performance Metrics and Continuous Improvement
- Defining KPIs such as mean time to detect (MTTD), mean time to respond (MTTR), and alert backlog.
- Conducting quarterly maturity assessments using frameworks like NIST or CIS.
- Performing tabletop exercises to validate incident response readiness and identify gaps.
- Tracking analyst workload and alert volume to prevent burnout and maintain response quality.
- Reviewing false positive and false negative rates to guide detection engineering efforts.
- Updating detection rules and playbooks based on threat landscape changes and internal incidents.
- Conducting peer reviews of escalated cases to ensure consistency and quality of analysis.
- Reporting metrics to executive leadership with context on risk reduction and operational efficiency.