A world-class SOC measures everything, documents everything, and continuously improves. Today covers key performance metrics, playbook development, and how to build a career in security operations.
Key metrics: Mean Time to Detect (MTTD) — average time from attacker entry to alert; Mean Time to Respond (MTTR) — alert to containment; False Positive Rate — percentage of alerts that are not real attacks (industry average: 40-70%); Dwell Time — time attacker operates before detection (industry average: 21 days). These metrics drive analyst hiring, tool investment, and process improvement decisions.
A detection rule has: name, ATT&CK technique mapping, data source, query logic, tuning notes, and expected alert volume. A playbook has: trigger condition, triage steps, investigation steps, escalation criteria, and response actions. Both must be version-controlled (Git), reviewed quarterly, and tested annually against real or simulated attacks. SOC maturity correlates directly with documentation quality.
Tier 1 Analyst → Tier 2 Analyst → Tier 3 Analyst/Threat Hunter → SOC Manager/CISO. Salary ranges (2025): T1 $55-75K, T2 $80-110K, T3 $100-140K, SOC Manager $120-160K. Key certifications: CompTIA Security+ (entry), Splunk Core Certified User (T1-T2), Blue Team Labs certifications, GCIH (GIAC Certified Incident Handler), GCIA (GIAC Certified Intrusion Analyst), CISSP (management). Federal SOC roles add 15-25% salary premium.
SOC DETECTION RULE DOCUMENTATION TEMPLATE
Rule Name: PowerShell Encoded Command Execution
ATT&CK Technique: T1059.001 (Command and Scripting: PowerShell)
Data Source: Windows Security Event Log, Sysmon
Event IDs: 4104 (Script Block Logging), Sysmon 1
Query (Splunk):
index=windows (EventCode=4104 OR source=Sysmon EventCode=1)
| regex CommandLine="(?i)(-enc|-encodedcommand)"
| stats count by host, user, CommandLine
| where count > 0
Tuning Notes:
- Exclude hosts: [SCCM server, patching servers] — they use encoded PS legitimately
- Alert threshold: any occurrence (0 expected in non-admin population)
- Expected false positive rate: ~5% from legitimate admin scripts
Escalation Criteria:
- Any P1: PowerShell + outbound network connection
- Any P2: Encoded command from non-admin account
- P3: Encoded command from admin account during business hours
Complete the 'The Report' or 'Infection Monkey' challenge on Blue Team Labs Online. Write a detailed analyst report documenting your investigation methodology, findings, and IOCs in a format suitable for a job interview portfolio.