SlideShare a Scribd company logo
7
Most read
8
Most read
17
Most read
SECURITY
OPERATION
CENTER
Eng/ Ahmed Ayman Fahmy
Cyber Security Framework
What is SOC ?
SOC Team
SOC process
SOC Platform (Tools)
Skills needed in a SOC
Types of SOCs
2
3
Cyber
Security
Framework
Identify Protect Detect Respond Recover
(CONT.)
 Identify
Identify threats which needed to protect our enterprise.
Control who can access your business information.
Require individual user accounts for each employee.
Create policies and procedures.
 Protect
Install and activate security controls (Firewalls, IDS/IPS, ….).
Patch your operating systems and applications routinely.
Secure your wireless access point and networks.
Setup web and E-mail filters.
Use encryption for sensitive data.
Train employees for security awareness.
4
(CONT.)
 Detect
Install and update anti-virus, anti-spyware and other anti-malware programs.
Maintain and monitoring Logs.
 Respond
Develop a plan for disasters for information security incidents.
 Recovery
Make full pack up of important data and information.
5
SECURITY OPERATION
CENTER (SOC)
6
monitor, prevent, detect, investigate, and respond to cyber threats around the clock
 SOC Team
7
SOC Operation
Management
Leadership CISO
SOC manager
Tier 1
Analyst
Tier 2
Analyst
Tier 3
Analyst
Security
Engineer
SECURITY OPERATION
CENTER (SOC) (CONT.)
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Tier 1 Analyst (Alert Investigator) :
Monitor SIEM alerts.
Manages and configures security Monitoring Tools.
Alert priority.
Perform triage to confirm real security incident is taking place.
 Tier 2 Analyst (Incident responder):
Receives Incident and performs deep analysis.
Correlate with threat intelligence to identify threat actor.
Nature of the attack.
Data and systems affected.
Decide strategy for containment.
Remediation and recovery.
8
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Tier 3 Analyst (SME / Threat Hunters):
Vulnerability assessment.
Penetration testing.
Threat intelligence.
Threat Hunters who hunts threat which found their way into the network.
Unknown vulnerabilities and security gaps.
When major incident occurs join with Tier 2 analyst in responding and containing it.
9
Detect
Contain
Attack
Eradicate
Attack
Recover
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Security Engineers (Platform Management):
Automated Tools.
Integration between security controls and SIEM.
 SOC manager:
Responsible for hiring and training SOC staff.
Manage resources. (Metrics)
Manage team when responding to critical security incident.
10
SECURITY OPERATION
CENTER (SOC) (CONT.)
 SOC process
Log source management
SIEM management
Use case management
Playbook management
Event management
Incident management
Vulnerability management
12
SOC PLATFORM (TOOLS)
 SIEM : Security Information and Event Management
 SOAR : Security Orchestration, Automation and Response
 VMDR : Vulnerability Management, Detection and response
 NDR : Network Detection and Response
 EDR : End-point Detection and response
 TIP : Threat Intelligence Platform
 OST : Offensive Security Tools
13
Tier 1 Analyst
2-3 years of professional experience.
Very good routing & switching knowledge.
Good system administration knowledge.
Understanding security system functions.
Knowledge of SIEM event management.
Certificates: CompTIA Cyber Security Analyst (CSA), SANS
GMON 14
TIER 2 SKILLS (INCIDENT
HANDLER)
 4-5 years of professional experience
 50% of the experience spent as Tier 1 analyst
 Very good routing & switching knowledge
 Very good Internetworking knowledge
 Very good system administration knowledge
 Good in End-point security knowledge
 Experience in operating Firewall, IDS, IPS,……
 Knowledge of SIEM event management and Use case writing
 Certificates SANA GCIH
15
TIER 3 SKILLS (THREAT
HUNTER)
 6-9 years of professional experience
 50% of the experience spent as Tier 2 analyst
 Very good programming knowledge
 Very good networking Knowledge
 Very good system administration knowledge
 Very good in End-point security knowledge
 Experience in digital Forensics
 Experience in using network traffic analysis, deception systems,
vulnerability assessment and exploitation tools
16
TIER 4 SKILLS
(ARCHITECT)
 10-12 years of professional experience
 50% of the experience spent as Tier 2 analyst
 Very good programming knowledge
 Very good networking Knowledge
 Very good system administration knowledge
 Very good in End-point security knowledge
 Experience in SIEM, SOAR, VMDR, EDR and NDR
 Experience in using network traffic analysis, deception systems, vulnerability
assessment and exploitation tools
 Certifications: CISSP Certified Information Systems Security Professional (ISC)2,
CISM Certified Information Security Manager ISACA.
17
18
Dedicated SOC
Classic SOC with dedicated full time staff, operated fully in house 24/7/365
operations.
Distributed SOC
Some full time staff and some part time, typically operates 8x5 in each
region
Multifunctional
SOC / NOC
Dedicated team which perform both functions of a network operation
center and a SOC
Fusion SOC
Traditional SOC combined with new functions such as threat intelligence,
operational technology
Command SOC /
Global SOC
Coordinates other SOCs in global enterprise provide threat intelligence,
situational awareness and guidance
Virtual SOC
No dedicated facility, part time members usually reactive and activated by
security incident
Managed SOC
Many organizations turned to MSSP Managed Security Service Providers
to provide SOC services on outsourced basis

More Related Content

PPTX
An introduction to SOC (Security Operation Center)
PPTX
SOC and SIEM.pptx
PDF
Building Security Operation Center
PPT
SOC presentation- Building a Security Operations Center
PDF
Building a Next-Generation Security Operations Center (SOC)
PPSX
Next-Gen security operation center
PPTX
Security Operation Center Fundamental
An introduction to SOC (Security Operation Center)
SOC and SIEM.pptx
Building Security Operation Center
SOC presentation- Building a Security Operations Center
Building a Next-Generation Security Operations Center (SOC)
Next-Gen security operation center
Security Operation Center Fundamental

What's hot (20)

PPTX
SOC Architecture Workshop - Part 1
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
DTS Solution - Building a SOC (Security Operations Center)
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Security Operations Center (SOC) Essentials for the SME
PPTX
Security Operation Center - Design & Build
PDF
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
PPTX
SEIM-Microsoft Sentinel.pptx
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PDF
From SIEM to SOC: Crossing the Cybersecurity Chasm
PPTX
Security Information and Event Management (SIEM)
PPTX
EDR vs SIEM - The fight is on
PPTX
Azure sentinel
PPTX
WHY SOC Services needed?
PPTX
Rothke rsa 2012 building a security operations center (soc)
PDF
MITRE ATT&CK Framework
PDF
SOC Architecture - Building the NextGen SOC
PPTX
SOAR and SIEM.pptx
PDF
Security operations center 5 security controls
SOC Architecture Workshop - Part 1
Security operations center-SOC Presentation-مرکز عملیات امنیت
Effective Security Operation Center - present by Reza Adineh
DTS Solution - Building a SOC (Security Operations Center)
Cybersecurity roadmap : Global healthcare security architecture
Security Operations Center (SOC) Essentials for the SME
Security Operation Center - Design & Build
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
SEIM-Microsoft Sentinel.pptx
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
From SIEM to SOC: Crossing the Cybersecurity Chasm
Security Information and Event Management (SIEM)
EDR vs SIEM - The fight is on
Azure sentinel
WHY SOC Services needed?
Rothke rsa 2012 building a security operations center (soc)
MITRE ATT&CK Framework
SOC Architecture - Building the NextGen SOC
SOAR and SIEM.pptx
Security operations center 5 security controls
Ad

Similar to Security operation center (SOC) (20)

PDF
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
PDF
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
PDF
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
PDF
Unlock Your Ultimate SOC Career Guide - Infosectrain
PDF
The Ultimate Security Operations Center Career Guide
PDF
Best SOC Career Guide InfosecTrain .pdf
PDF
Course overview Cybersecurity and its applications
PDF
CYBER SECURITY CAREER GUIDE CHEAT SHEET
PPTX
A Deeper Dive into SOC Operations and Roles
PPTX
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
PDF
endpoint-detection-and-response-datasheet.pdf
PDF
CA_Module_2.pdf
PPTX
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
PDF
NetForChoice: Redefining Cybersecurity Intelligence
DOCX
Dhishant -Latest Resume
PDF
Exploring the SOC Career Pathway in 2025.pdf
PDF
Different SOC Career Opportunities 2025.pdf
PDF
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
PDF
Different SOC Career Opportunities by InfosecTrain
PDF
The Security Operations Centre Career Pathways in 2025
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
Unlock Your Ultimate SOC Career Guide - Infosectrain
The Ultimate Security Operations Center Career Guide
Best SOC Career Guide InfosecTrain .pdf
Course overview Cybersecurity and its applications
CYBER SECURITY CAREER GUIDE CHEAT SHEET
A Deeper Dive into SOC Operations and Roles
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
endpoint-detection-and-response-datasheet.pdf
CA_Module_2.pdf
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
NetForChoice: Redefining Cybersecurity Intelligence
Dhishant -Latest Resume
Exploring the SOC Career Pathway in 2025.pdf
Different SOC Career Opportunities 2025.pdf
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
Different SOC Career Opportunities by InfosecTrain
The Security Operations Centre Career Pathways in 2025
Ad

More from Ahmed Ayman (10)

PPTX
Absorption losses of ultra thin crystalline silicon solar cells
PDF
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
PPTX
Printed electronics for system application
PPTX
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
PPTX
Voice over IP (VOIP)
PPTX
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
PPTX
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
PPTX
Satellite Communication
PPTX
Crowdsensing
PPTX
Software Defined Network (SDN)
Absorption losses of ultra thin crystalline silicon solar cells
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
Printed electronics for system application
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
Voice over IP (VOIP)
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
Satellite Communication
Crowdsensing
Software Defined Network (SDN)

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PDF
NewMind AI Monthly Chronicles - July 2025
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Network Security Unit 5.pdf for BCA BBA.
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Chapter 3 Spatial Domain Image Processing.pdf
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
NewMind AI Monthly Chronicles - July 2025
“AI and Expert System Decision Support & Business Intelligence Systems”
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding

Security operation center (SOC)

  • 2. Cyber Security Framework What is SOC ? SOC Team SOC process SOC Platform (Tools) Skills needed in a SOC Types of SOCs 2
  • 4. (CONT.)  Identify Identify threats which needed to protect our enterprise. Control who can access your business information. Require individual user accounts for each employee. Create policies and procedures.  Protect Install and activate security controls (Firewalls, IDS/IPS, ….). Patch your operating systems and applications routinely. Secure your wireless access point and networks. Setup web and E-mail filters. Use encryption for sensitive data. Train employees for security awareness. 4
  • 5. (CONT.)  Detect Install and update anti-virus, anti-spyware and other anti-malware programs. Maintain and monitoring Logs.  Respond Develop a plan for disasters for information security incidents.  Recovery Make full pack up of important data and information. 5
  • 6. SECURITY OPERATION CENTER (SOC) 6 monitor, prevent, detect, investigate, and respond to cyber threats around the clock
  • 7.  SOC Team 7 SOC Operation Management Leadership CISO SOC manager Tier 1 Analyst Tier 2 Analyst Tier 3 Analyst Security Engineer SECURITY OPERATION CENTER (SOC) (CONT.)
  • 8. SECURITY OPERATION CENTER (SOC) (CONT.)  Tier 1 Analyst (Alert Investigator) : Monitor SIEM alerts. Manages and configures security Monitoring Tools. Alert priority. Perform triage to confirm real security incident is taking place.  Tier 2 Analyst (Incident responder): Receives Incident and performs deep analysis. Correlate with threat intelligence to identify threat actor. Nature of the attack. Data and systems affected. Decide strategy for containment. Remediation and recovery. 8
  • 9. SECURITY OPERATION CENTER (SOC) (CONT.)  Tier 3 Analyst (SME / Threat Hunters): Vulnerability assessment. Penetration testing. Threat intelligence. Threat Hunters who hunts threat which found their way into the network. Unknown vulnerabilities and security gaps. When major incident occurs join with Tier 2 analyst in responding and containing it. 9 Detect Contain Attack Eradicate Attack Recover
  • 10. SECURITY OPERATION CENTER (SOC) (CONT.)  Security Engineers (Platform Management): Automated Tools. Integration between security controls and SIEM.  SOC manager: Responsible for hiring and training SOC staff. Manage resources. (Metrics) Manage team when responding to critical security incident. 10
  • 11. SECURITY OPERATION CENTER (SOC) (CONT.)  SOC process Log source management SIEM management Use case management Playbook management Event management Incident management Vulnerability management 12
  • 12. SOC PLATFORM (TOOLS)  SIEM : Security Information and Event Management  SOAR : Security Orchestration, Automation and Response  VMDR : Vulnerability Management, Detection and response  NDR : Network Detection and Response  EDR : End-point Detection and response  TIP : Threat Intelligence Platform  OST : Offensive Security Tools 13
  • 13. Tier 1 Analyst 2-3 years of professional experience. Very good routing & switching knowledge. Good system administration knowledge. Understanding security system functions. Knowledge of SIEM event management. Certificates: CompTIA Cyber Security Analyst (CSA), SANS GMON 14
  • 14. TIER 2 SKILLS (INCIDENT HANDLER)  4-5 years of professional experience  50% of the experience spent as Tier 1 analyst  Very good routing & switching knowledge  Very good Internetworking knowledge  Very good system administration knowledge  Good in End-point security knowledge  Experience in operating Firewall, IDS, IPS,……  Knowledge of SIEM event management and Use case writing  Certificates SANA GCIH 15
  • 15. TIER 3 SKILLS (THREAT HUNTER)  6-9 years of professional experience  50% of the experience spent as Tier 2 analyst  Very good programming knowledge  Very good networking Knowledge  Very good system administration knowledge  Very good in End-point security knowledge  Experience in digital Forensics  Experience in using network traffic analysis, deception systems, vulnerability assessment and exploitation tools 16
  • 16. TIER 4 SKILLS (ARCHITECT)  10-12 years of professional experience  50% of the experience spent as Tier 2 analyst  Very good programming knowledge  Very good networking Knowledge  Very good system administration knowledge  Very good in End-point security knowledge  Experience in SIEM, SOAR, VMDR, EDR and NDR  Experience in using network traffic analysis, deception systems, vulnerability assessment and exploitation tools  Certifications: CISSP Certified Information Systems Security Professional (ISC)2, CISM Certified Information Security Manager ISACA. 17
  • 17. 18 Dedicated SOC Classic SOC with dedicated full time staff, operated fully in house 24/7/365 operations. Distributed SOC Some full time staff and some part time, typically operates 8x5 in each region Multifunctional SOC / NOC Dedicated team which perform both functions of a network operation center and a SOC Fusion SOC Traditional SOC combined with new functions such as threat intelligence, operational technology Command SOC / Global SOC Coordinates other SOCs in global enterprise provide threat intelligence, situational awareness and guidance Virtual SOC No dedicated facility, part time members usually reactive and activated by security incident Managed SOC Many organizations turned to MSSP Managed Security Service Providers to provide SOC services on outsourced basis