SOC Foundations
Understanding the core principles, history, and structure of a Security Operations Center.
History & Evolution
Cybersecurity grew rapidly and often reactively. Key events during 2010-2017 shaped both perception and practice. We are now entering a phase where quality, prioritization, and technical mastery become essential.
SOC Organizational Models
A SOC can be organized in several ways depending on the organization's size, resources, and security strategy.
Centralized SOC
Single location monitoring all systems. Strong control and coordination.
Distributed SOC
Multiple locations, often across regions. Better local coverage.
Virtual SOC
Remote teams leveraging cloud tools. Flexible and cost-efficient.
Outsourced (MSSP)
Managed by third-party providers. Complements internal capabilities.
Roles & Responsibilities
- Tier 1AnalystMonitors alerts, triages incidents. First line of defense.
- Tier 2AnalystInvestigates and escalates complex incidents. Deeper analysis.
- Tier 3Threat HunterPerforms proactive threat hunting and deep forensic analysis.
- DFIRIncident ResponderLeads containment, eradication, and recovery during major breaches.
Core Processes
Monitoring & Alerting
Continuous surveillance of networks, endpoints, and cloud.
Triage & Investigation
Validate and analyze alerts to determine true positives.
Containment & Eradication
Stop threats and remove them from the environment.
Recovery & Lessons Learned
Restore systems and improve defenses based on the incident.