SlideShare a Scribd company logo
1 of 17
SECURITY
OPERATION
CENTER
Eng/ Ahmed Ayman Fahmy
Cyber Security Framework
What is SOC ?
SOC Team
SOC process
SOC Platform (Tools)
Skills needed in a SOC
Types of SOCs
2
3
Cyber
Security
Framework
Identify Protect Detect Respond Recover
(CONT.)
 Identify
Identify threats which needed to protect our enterprise.
Control who can access your business information.
Require individual user accounts for each employee.
Create policies and procedures.
 Protect
Install and activate security controls (Firewalls, IDS/IPS, ….).
Patch your operating systems and applications routinely.
Secure your wireless access point and networks.
Setup web and E-mail filters.
Use encryption for sensitive data.
Train employees for security awareness.
4
(CONT.)
 Detect
Install and update anti-virus, anti-spyware and other anti-malware programs.
Maintain and monitoring Logs.
 Respond
Develop a plan for disasters for information security incidents.
 Recovery
Make full pack up of important data and information.
5
SECURITY OPERATION
CENTER (SOC)
6
monitor, prevent, detect, investigate, and respond to cyber threats around the clock
 SOC Team
7
SOC Operation
Management
Leadership CISO
SOC manager
Tier 1
Analyst
Tier 2
Analyst
Tier 3
Analyst
Security
Engineer
SECURITY OPERATION
CENTER (SOC) (CONT.)
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Tier 1 Analyst (Alert Investigator) :
Monitor SIEM alerts.
Manages and configures security Monitoring Tools.
Alert priority.
Perform triage to confirm real security incident is taking place.
 Tier 2 Analyst (Incident responder):
Receives Incident and performs deep analysis.
Correlate with threat intelligence to identify threat actor.
Nature of the attack.
Data and systems affected.
Decide strategy for containment.
Remediation and recovery.
8
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Tier 3 Analyst (SME / Threat Hunters):
Vulnerability assessment.
Penetration testing.
Threat intelligence.
Threat Hunters who hunts threat which found their way into the network.
Unknown vulnerabilities and security gaps.
When major incident occurs join with Tier 2 analyst in responding and containing it.
9
Detect
Contain
Attack
Eradicate
Attack
Recover
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Security Engineers (Platform Management):
Automated Tools.
Integration between security controls and SIEM.
 SOC manager:
Responsible for hiring and training SOC staff.
Manage resources. (Metrics)
Manage team when responding to critical security incident.
10
SECURITY OPERATION
CENTER (SOC) (CONT.)
 SOC process
Log source management
SIEM management
Use case management
Playbook management
Event management
Incident management
Vulnerability management
12
SOC PLATFORM (TOOLS)
 SIEM : Security Information and Event Management
 SOAR : Security Orchestration, Automation and Response
 VMDR : Vulnerability Management, Detection and response
 NDR : Network Detection and Response
 EDR : End-point Detection and response
 TIP : Threat Intelligence Platform
 OST : Offensive Security Tools
13
Tier 1 Analyst
2-3 years of professional experience.
Very good routing & switching knowledge.
Good system administration knowledge.
Understanding security system functions.
Knowledge of SIEM event management.
Certificates: CompTIA Cyber Security Analyst (CSA), SANS
GMON 14
TIER 2 SKILLS (INCIDENT
HANDLER)
 4-5 years of professional experience
 50% of the experience spent as Tier 1 analyst
 Very good routing & switching knowledge
 Very good Internetworking knowledge
 Very good system administration knowledge
 Good in End-point security knowledge
 Experience in operating Firewall, IDS, IPS,……
 Knowledge of SIEM event management and Use case writing
 Certificates SANA GCIH
15
TIER 3 SKILLS (THREAT
HUNTER)
 6-9 years of professional experience
 50% of the experience spent as Tier 2 analyst
 Very good programming knowledge
 Very good networking Knowledge
 Very good system administration knowledge
 Very good in End-point security knowledge
 Experience in digital Forensics
 Experience in using network traffic analysis, deception systems,
vulnerability assessment and exploitation tools
16
TIER 4 SKILLS
(ARCHITECT)
 10-12 years of professional experience
 50% of the experience spent as Tier 2 analyst
 Very good programming knowledge
 Very good networking Knowledge
 Very good system administration knowledge
 Very good in End-point security knowledge
 Experience in SIEM, SOAR, VMDR, EDR and NDR
 Experience in using network traffic analysis, deception systems, vulnerability
assessment and exploitation tools
 Certifications: CISSP Certified Information Systems Security Professional (ISC)2,
CISM Certified Information Security Manager ISACA.
17
18
Dedicated SOC
Classic SOC with dedicated full time staff, operated fully in house 24/7/365
operations.
Distributed SOC
Some full time staff and some part time, typically operates 8x5 in each
region
Multifunctional
SOC / NOC
Dedicated team which perform both functions of a network operation
center and a SOC
Fusion SOC
Traditional SOC combined with new functions such as threat intelligence,
operational technology
Command SOC /
Global SOC
Coordinates other SOCs in global enterprise provide threat intelligence,
situational awareness and guidance
Virtual SOC
No dedicated facility, part time members usually reactive and activated by
security incident
Managed SOC
Many organizations turned to MSSP Managed Security Service Providers
to provide SOC services on outsourced basis

More Related Content

What's hot

What's hot (20)

Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Security operation center
Security operation centerSecurity operation center
Security operation center
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources7 Steps to Build a SOC with Limited Resources
7 Steps to Build a SOC with Limited Resources
 
Building a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdfBuilding a Security Operations Center (SOC).pdf
Building a Security Operations Center (SOC).pdf
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Soc
SocSoc
Soc
 
Beginner's Guide to SIEM
Beginner's Guide to SIEM Beginner's Guide to SIEM
Beginner's Guide to SIEM
 

Similar to Security operation center (SOC)

CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
TravarsaPrivateLimit
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsyPrezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Azim191210
 

Similar to Security operation center (SOC) (20)

Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdfUnlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
 
The Ultimate Security Operations Center Career Guide
The Ultimate Security Operations Center  Career GuideThe Ultimate Security Operations Center  Career Guide
The Ultimate Security Operations Center Career Guide
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
 
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
 
Unlock Your Ultimate SOC Career Guide - Infosectrain
Unlock Your  Ultimate SOC Career Guide - InfosectrainUnlock Your  Ultimate SOC Career Guide - Infosectrain
Unlock Your Ultimate SOC Career Guide - Infosectrain
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
 
CA_Module_2.pdf
CA_Module_2.pdfCA_Module_2.pdf
CA_Module_2.pdf
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
 
tarunidhar
tarunidhartarunidhar
tarunidhar
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
Mohammed imranuddin cv.DOC
Mohammed imranuddin cv.DOCMohammed imranuddin cv.DOC
Mohammed imranuddin cv.DOC
 
SIEM vs EDR
SIEM vs EDRSIEM vs EDR
SIEM vs EDR
 
McAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEMMcAfee - Enterprise Security Manager (ESM) - SIEM
McAfee - Enterprise Security Manager (ESM) - SIEM
 
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsyPrezentare_ANSSI.pptx gfdsry crsru drdrsy
Prezentare_ANSSI.pptx gfdsry crsru drdrsy
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 

More from Ahmed Ayman

More from Ahmed Ayman (10)

Absorption losses of ultra thin crystalline silicon solar cells
Absorption losses of ultra thin crystalline silicon solar cellsAbsorption losses of ultra thin crystalline silicon solar cells
Absorption losses of ultra thin crystalline silicon solar cells
 
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
 
Printed electronics for system application
Printed electronics for system applicationPrinted electronics for system application
Printed electronics for system application
 
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
Analysis and Implementation of Encapsulation Schemes  for Baseband Frame of D...Analysis and Implementation of Encapsulation Schemes  for Baseband Frame of D...
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
 
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
 
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
UPLINK, DOWNLINK ANDOVERALL LINK PERFORMANCE INTER-SATELLITE LINKSUPLINK, DOWNLINK ANDOVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
 
Satellite Communication
Satellite CommunicationSatellite Communication
Satellite Communication
 
Crowdsensing
CrowdsensingCrowdsensing
Crowdsensing
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
 

Recently uploaded

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Security operation center (SOC)

  • 2. Cyber Security Framework What is SOC ? SOC Team SOC process SOC Platform (Tools) Skills needed in a SOC Types of SOCs 2
  • 4. (CONT.)  Identify Identify threats which needed to protect our enterprise. Control who can access your business information. Require individual user accounts for each employee. Create policies and procedures.  Protect Install and activate security controls (Firewalls, IDS/IPS, ….). Patch your operating systems and applications routinely. Secure your wireless access point and networks. Setup web and E-mail filters. Use encryption for sensitive data. Train employees for security awareness. 4
  • 5. (CONT.)  Detect Install and update anti-virus, anti-spyware and other anti-malware programs. Maintain and monitoring Logs.  Respond Develop a plan for disasters for information security incidents.  Recovery Make full pack up of important data and information. 5
  • 6. SECURITY OPERATION CENTER (SOC) 6 monitor, prevent, detect, investigate, and respond to cyber threats around the clock
  • 7.  SOC Team 7 SOC Operation Management Leadership CISO SOC manager Tier 1 Analyst Tier 2 Analyst Tier 3 Analyst Security Engineer SECURITY OPERATION CENTER (SOC) (CONT.)
  • 8. SECURITY OPERATION CENTER (SOC) (CONT.)  Tier 1 Analyst (Alert Investigator) : Monitor SIEM alerts. Manages and configures security Monitoring Tools. Alert priority. Perform triage to confirm real security incident is taking place.  Tier 2 Analyst (Incident responder): Receives Incident and performs deep analysis. Correlate with threat intelligence to identify threat actor. Nature of the attack. Data and systems affected. Decide strategy for containment. Remediation and recovery. 8
  • 9. SECURITY OPERATION CENTER (SOC) (CONT.)  Tier 3 Analyst (SME / Threat Hunters): Vulnerability assessment. Penetration testing. Threat intelligence. Threat Hunters who hunts threat which found their way into the network. Unknown vulnerabilities and security gaps. When major incident occurs join with Tier 2 analyst in responding and containing it. 9 Detect Contain Attack Eradicate Attack Recover
  • 10. SECURITY OPERATION CENTER (SOC) (CONT.)  Security Engineers (Platform Management): Automated Tools. Integration between security controls and SIEM.  SOC manager: Responsible for hiring and training SOC staff. Manage resources. (Metrics) Manage team when responding to critical security incident. 10
  • 11. SECURITY OPERATION CENTER (SOC) (CONT.)  SOC process Log source management SIEM management Use case management Playbook management Event management Incident management Vulnerability management 12
  • 12. SOC PLATFORM (TOOLS)  SIEM : Security Information and Event Management  SOAR : Security Orchestration, Automation and Response  VMDR : Vulnerability Management, Detection and response  NDR : Network Detection and Response  EDR : End-point Detection and response  TIP : Threat Intelligence Platform  OST : Offensive Security Tools 13
  • 13. Tier 1 Analyst 2-3 years of professional experience. Very good routing & switching knowledge. Good system administration knowledge. Understanding security system functions. Knowledge of SIEM event management. Certificates: CompTIA Cyber Security Analyst (CSA), SANS GMON 14
  • 14. TIER 2 SKILLS (INCIDENT HANDLER)  4-5 years of professional experience  50% of the experience spent as Tier 1 analyst  Very good routing & switching knowledge  Very good Internetworking knowledge  Very good system administration knowledge  Good in End-point security knowledge  Experience in operating Firewall, IDS, IPS,……  Knowledge of SIEM event management and Use case writing  Certificates SANA GCIH 15
  • 15. TIER 3 SKILLS (THREAT HUNTER)  6-9 years of professional experience  50% of the experience spent as Tier 2 analyst  Very good programming knowledge  Very good networking Knowledge  Very good system administration knowledge  Very good in End-point security knowledge  Experience in digital Forensics  Experience in using network traffic analysis, deception systems, vulnerability assessment and exploitation tools 16
  • 16. TIER 4 SKILLS (ARCHITECT)  10-12 years of professional experience  50% of the experience spent as Tier 2 analyst  Very good programming knowledge  Very good networking Knowledge  Very good system administration knowledge  Very good in End-point security knowledge  Experience in SIEM, SOAR, VMDR, EDR and NDR  Experience in using network traffic analysis, deception systems, vulnerability assessment and exploitation tools  Certifications: CISSP Certified Information Systems Security Professional (ISC)2, CISM Certified Information Security Manager ISACA. 17
  • 17. 18 Dedicated SOC Classic SOC with dedicated full time staff, operated fully in house 24/7/365 operations. Distributed SOC Some full time staff and some part time, typically operates 8x5 in each region Multifunctional SOC / NOC Dedicated team which perform both functions of a network operation center and a SOC Fusion SOC Traditional SOC combined with new functions such as threat intelligence, operational technology Command SOC / Global SOC Coordinates other SOCs in global enterprise provide threat intelligence, situational awareness and guidance Virtual SOC No dedicated facility, part time members usually reactive and activated by security incident Managed SOC Many organizations turned to MSSP Managed Security Service Providers to provide SOC services on outsourced basis