Learning Library

← Back to Library

SOC Mission, Roles, and Tools

Key Points

  • The SOC’s core mission is to detect and respond to security incidents, complementing broader cybersecurity efforts focused on prevention.
  • A modern SOC is staffed with four main roles: a manager who oversees operations, engineers who build and configure the environment, analysts (often tiered from 1‑3) who investigate alerts, and threat hunters who proactively seek hidden risks.
  • Analysts rely on a SIEM to ingest telemetry—such as logs from a web server under a denial‑of‑service attack—and provide the data needed for rapid investigation and mitigation.
  • Tiered analyst structures allow basic alerts to be triaged by Tier 1, with deeper forensic work escalated to Tier 2 or Tier 3, which can be handled in‑house or via managed security services.
  • Threat hunters generate hypotheses and conduct proactive searches across the SOC’s tooling to uncover latent threats before they manifest as active incidents.

Full Transcript

# SOC Mission, Roles, and Tools **Source:** [https://www.youtube.com/watch?v=OHkWXFheSKM](https://www.youtube.com/watch?v=OHkWXFheSKM) **Duration:** 00:05:41 ## Summary - The SOC’s core mission is to detect and respond to security incidents, complementing broader cybersecurity efforts focused on prevention. - A modern SOC is staffed with four main roles: a manager who oversees operations, engineers who build and configure the environment, analysts (often tiered from 1‑3) who investigate alerts, and threat hunters who proactively seek hidden risks. - Analysts rely on a SIEM to ingest telemetry—such as logs from a web server under a denial‑of‑service attack—and provide the data needed for rapid investigation and mitigation. - Tiered analyst structures allow basic alerts to be triaged by Tier 1, with deeper forensic work escalated to Tier 2 or Tier 3, which can be handled in‑house or via managed security services. - Threat hunters generate hypotheses and conduct proactive searches across the SOC’s tooling to uncover latent threats before they manifest as active incidents. ## Sections - [00:00:00](https://www.youtube.com/watch?v=OHkWXFheSKM&t=0s) **Inside a Modern Security SOC** - An overview of a SOC’s mission of detection and response, outlining its core roles—manager, engineer, and tiered analysts—and illustrating how various tools operate in real‑world cybersecurity scenarios. - [00:03:02](https://www.youtube.com/watch?v=OHkWXFheSKM&t=182s) **Detecting Exfiltration and Malware with UBA and XDR** - The speaker outlines using a UBA‑enhanced SIEM to flag abnormal data access/exfiltration and employing an XDR platform’s federated search for threat hunting across infected workstations. ## Full Transcript
0:00"Houston, we have a problem." Those are the famous words from the Apollo 13 moon mission. 0:05Well, what if you have a problem in cybersecurity? 0:07Who is mission control? 0:09Well, it's the SOC-- the security operations center. 0:12And you're looking at a picture of IBM's cyber range in the Boston, Massachusetts area where you can see what a modern SOC would look like. 0:20Lots of technology. 0:22Well, what is the mission of the SOC? 0:25What are the roles and organization of a soc? 0:28What are the tools? 0:29And in particular, I'm going to go through three different scenarios as to how those tools might run in a modern SOC. 0:36First of all, the mission. 0:37So, in security, we're always focused on prevention, detection, and response. 0:47That's what everything in cybersecurity is about. 0:49And the SOC is particularly focused on those last two things where it's about finding the problems and resolving those problems. 0:58Now, a little bit about the roles. 1:00There's at least four distinct roles I'm going to talk about here. 1:03One is the manager of the SOC who organizes the operations. 1:09There is an engineer. 1:12Engineers are the people who are building the SOC itself, as in installing the software, picking the tools, configuring the tools and things of that sort. 1:20Then we have an analyst. 1:24A SOC analyst is going to be the one who is actually going through the scenarios, fielding the incidents and trying to discover what was the root cause of those. 1:33Oftentimes, we have SOC analysts that are organized in different tiers, depending on the level of complexity of the problem that they're dealing with. 1:41So a tier 1, tier 2, tier 3, where the tier 1 does the initial fielding of the issues, and then if it needs more, deeper investigation, tier 2 and tier 3. 1:51Very often these could be done in-house or could be done as part of a managed security service. 1:58Or maybe you just have the tier 1 as the managed security service and then your organization does the deeper investigations. 2:04The fourth role that I'm going to mention here is a threat hunter. 2:08And a threat hunter is someone who is going to come up with a hypothesis 2:13and then they're going to go out proactively trying to find where the problems areas might be. 2:18Okay, let's talk about the tools. In the tools area, 2:21let's take a scenario where we've got a web server and that web server now suddenly starts getting tons and tons of traffic and it's not good traffic. 2:31In fact, we're in a denial of service situation, so we're under attack. 2:37What could happen in that case is, I'm going to take the information from that web server and feed it into something that we call a SIEM-- 2:44a security information and event management system. 2:47And I'm going to have the cybersecurity analyst here looking into the SIEM and seeing what's happening. 2:54They're going to get all of that telemetry, they're going to have the information they need to go off and do an investigation and find out what's going on. 3:01So that's our first scenario. 3:03Our second scenario, let's say we have a database-- with a critical information in it --and someone is exfiltrating that data. 3:11That is, they're taking data out of that system and sending it out into the network. 3:15Maybe they're selling it, who knows what they're doing. 3:17But anyway, we would like to be able to detect that there's an anomalous level of activity, either of accessing data or sending data out. 3:27And I could use a technology called a user behavior analytics (UBA) system that runs along with the SIEM in order to figure that out. 3:36And it would send an alarm up and then this SOC analyst might be able to use that system in order to do further investigations. 3:44So that's what an analyst might do in those two cases. 3:47How about let's look at a third case where we have a workstation here and this workstation has been infected by malware. 3:57And in fact, it's not one, but it's a lot of these workstations that are out here, and maybe many of them have been infected and some of them haven't. 4:07So what would we do? 4:08Well, we have in this case, the threat hunter that I just mentioned would be using a platform 4:14and they might use a platform that we call an XDR, an extended detection and response platform. 4:20And what that tool does is it allows us to query information in what we call a federated search-- pull this information just when I need it. 4:29So I leave the information in place until I need it, where the SIEM is bringing all the information up and fetching that in advance 4:35and acting as an alarm system, this is more of a go out and look through the information and figure out what I want to do. 4:42So our threat hunter uses the XDR system to do that. 4:47Now, we would also have the ability to have linkages between these systems that would also be very important. 4:52And then ultimately leverage a system called a SOAR-- a security orchestration, automation and response system 4:59--that either of these people could use in order to go out and guide their activities, orchestrate the response, 5:07use a dynamic playbook, open a case, and do the incident response and resolution that's necessary in order to solve the problem. 5:15So now you have an idea of what goes into a modern SOC. 5:18And it all boils down to this: people, process, and technology. 5:23With all of those things working together, a modern SOC can give us the solution we need. 5:29And now, Houston, we have a solution. 5:34Thanks for watching. 5:35If you found this video interesting and would like to learn more about cybersecurity, please remember to hit like and subscribe to this channel.