This curriculum spans the full lifecycle of malware detection engineering in a modern SOC, comparable to a multi-workshop program developed through iterative collaboration between detection engineers, threat hunters, and incident responders in a large-scale security operations environment.
Module 1: Establishing Detection Requirements and Use Case Prioritization
- Define detection objectives based on organization-specific threat models, including prevalent malware families observed in the industry vertical.
- Select high-impact detection use cases by analyzing historical incident data and external threat intelligence reports.
- Balance detection scope between commodity malware and targeted threats based on available analyst bandwidth and tooling constraints.
- Document false positive tolerance thresholds for each use case in coordination with SOC shift leads and incident response teams.
- Integrate compliance mandates (e.g., CISA KEV, PCI DSS) into detection prioritization without overloading monitoring capacity.
- Establish criteria for retiring or deprecating detection rules based on sustained low efficacy or operational noise.
Module 2: Integrating and Normalizing Telemetry Sources
- Map endpoint telemetry (EDR telemetry, process creation, file modifications) to MITRE ATT&CK techniques for consistent detection logic.
- Configure network sensors (NetFlow, PCAP, TLS metadata) to capture lateral movement and C2 channel indicators at scale.
- Normalize syslog, Windows Event Logs, and cloud audit logs into a common schema to enable cross-source correlation.
- Assess data retention policies for each telemetry source based on detection latency requirements and storage costs.
- Implement parsing rules to extract command-line arguments and parent-child process relationships from raw logs.
- Validate data completeness by running gap detection jobs to identify missing or delayed telemetry from critical assets.
Module 3: Designing and Tuning Detection Rules
- Write Sigma rules for suspicious PowerShell usage, ensuring compatibility with backend SIEM translation pipelines.
- Adjust threshold values in anomaly-based rules (e.g., unusual outbound connections) using baselines derived from asset roles.
- Implement suppression logic for known benign processes that trigger malware-related signatures (e.g., software deployment tools).
- Use statistical profiling to differentiate between legitimate and malicious DLL side-loading behavior.
- Version-control detection rules in Git and enforce peer review before deployment to production environments.
- Document rule logic and expected alert volume to support analyst triage and reduce misinterpretation.
Module 4: Leveraging Threat Intelligence for Detection Engineering
- Ingest STIX/TAXII feeds from trusted ISACs and government sources, filtering indicators by relevance and freshness.
- Map IOCs (IPs, domains, hashes) to existing detection rules and enrich alert context with threat actor attribution.
- Implement automated workflows to expire or quarantine stale indicators after a defined trust decay period.
- Use adversary TTPs from MITRE ATT&CK to build behavior-based detections instead of relying solely on IOCs.
- Validate third-party intelligence by cross-referencing with internal telemetry before operationalizing.
- Design custom intelligence collection from sandbox detonation results and dark web monitoring feeds.
Module 5: Automating Analysis and Response Workflows
Module 6: Conducting Malware Triage and Forensic Validation
- Standardize triage checklists for malware alerts, including verification of persistence mechanisms and execution chain.
- Use memory analysis tools (Volatility, Rekall) to detect userland rootkits and process injection techniques.
- Correlate file hash reputation with on-disk path and creation time to assess legitimacy.
- Validate command-and-control communication by reconstructing DNS tunneling patterns from network logs.
- Preserve forensic artifacts (memory dumps, registry hives) in accordance with legal hold policies.
- Document lateral movement evidence by mapping authenticated sessions across domain controllers and workstations.
Module 7: Measuring Detection Efficacy and Operational Performance
- Calculate mean time to detect (MTTD) for confirmed malware incidents using timeline reconstruction from logs.
- Track detection rule performance using metrics such as alert volume, true positive rate, and analyst workload.
- Run purple team exercises to test detection coverage against simulated malware campaigns using real TTPs.
- Conduct retrospective analysis to identify missed detections during breach investigations.
- Benchmark detection stack performance against MITRE Engenuity ATT&CK Evaluations or internal red team data.
- Produce executive reports that quantify detection program maturity without disclosing sensitive technical details.
Module 8: Governing Detection Lifecycle and Cross-Team Coordination
- Establish a detection review board to evaluate new rules, retire obsolete ones, and resolve analyst feedback.
- Coordinate with network and endpoint teams to ensure sensor coverage on critical servers and cloud workloads.
- Align detection engineering timelines with change management windows to avoid rule breakage during system upgrades.
- Define escalation paths for high-fidelity malware alerts to ensure timely response by incident handlers.
- Share anonymized detection logic with peer organizations via ISACs while protecting proprietary methods.
- Enforce secure coding practices in detection script development to prevent injection vulnerabilities in rule engines.