Soc Analyst
Soc Analyst
Contents
Who is a SOC Analyst ? ................................................................................................................................. 2
Roles of a SOC Analyst: ................................................................................................................................ 2
Key Functions of SOC:................................................................................................................................... 4
Evolution of SOC: .......................................................................................................................................... 5
Responsibilities and Levels of a SOC Analyst: ............................................................................................. 6
SOC Models: ................................................................................................................................................. 7
Detection outcomes in SOC: ........................................................................................................................ 7
SOC Metrics: ................................................................................................................................................. 8
SOC Tools: ..................................................................................................................................................... 9
Common Threats and Attacks: ................................................................................................................... 11
Who is a SOC Analyst ?
A SOC Analyst (Security Operations Center Analyst) is like a cybersecurity guard for a company.
Their job is to watch over the company's computer systems, looking for any signs of trouble, like
hackers or malware. They monitor alerts and logs from different systems, investigate suspicious
activity, and respond to potential threats to keep the company's data safe. If they find
something unusual, they figure out if it's a real problem and then take action to fix it or prevent
damage.
Monitor:
• Continuously watches the company's network, systems, and devices for unusual
or suspicious activity.
• Uses tools to collect data (like logs) from firewalls, antivirus software, and other
security tools.
• Importance: Early detection of threats helps prevent potential attacks before
they cause harm.
Detect:
• Identifies potential security threats like malware, phishing attempts, or
unauthorized access.
• Sets up alerts to flag unusual activity, such as high traffic to a suspicious website.
• Importance: Quick detection allows the SOC team to react faster and stop
attacks early.
Analyze:
• Investigates alerts to determine if they are real threats (false positives vs. actual
threats).
• Studies the behavior of detected threats to understand their source, method,
and target.
• Importance: Accurate analysis helps decide how serious the issue is and what
steps to take to resolve it.
Respond:
• Takes action to neutralize or block any identified threats (e.g., blocking malicious
IP addresses).
• Works with other teams to fix vulnerabilities and prevent future attacks.
• Importance: Effective response minimizes damage and reduces downtime,
protecting the company’s data and systems.
Key Functions of SOC:
Reactive Proactive
Monitoring and Detection: Threat Intelligence:
Continuously monitors networks, systems, and Gathers information on emerging threats and
logs for suspicious activities. attack methods.
Triggers alerts when potential security threats Analyzes intelligence to anticipate potential
are detected. attacks.
Ensures early identification of threats for quick Prepares defenses against evolving threats.
action.
Hybrid SOC
• Combines internal security operations with external provider support.
• Balances control between the organization and the managed service provider.
• Allows flexibility by keeping critical functions inhouse and outsourcing specific tasks.
• Helps scale SOC operations efficiently while maintaining important data internally.
• Reduces costs while maintaining some level of customization and security expertise.
• May involve complexity in coordination and communication between internal and
external teams.
7. Firewalls
• Palo Alto Networks: Provides NextGen firewalls with advanced threat protection,
application visibility, and user control.
• Cisco ASA: Offers a combination of firewall, VPN, and IPS for securing networks.
• Fortinet FortiGate: Delivers enterprise level firewall protection and threat
management.
2. Phishing:
• Email Phishing: Fraudulent emails tricking users into divulging personal information or
clicking malicious links.
• Spear Phishing: Targeted phishing attack aimed at specific individuals or organizations.
• Whaling: Phishing attacks targeting high profile individuals like executives (CEO fraud).
7. Password Attacks:
• Dictionary Attacks: Using a list of commonly used passwords to gain access.
• Keyloggers: Capturing keystrokes to record passwords and other sensitive data.
8. Rogue Software:
Fake software designed to look legitimate but is malware that harms the system or steals data.
9. Session Hijacking:
Attacker takes control of a user session by stealing or forging session tokens used to
authenticate and maintain user identity during web browsing.
https://www.linkedin.com/in/adnan-musa-b62879319/