Lab 01: SOC Architecture
Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash
Objectives
Design a Security Operations Centre (SOC) tier model
Understand SOC operational models (in-house, MSSP, hybrid)
Architect a SIEM pipeline
Calculate and interpret SOC performance metrics
Step 1: SOC Tier Model
A mature SOC operates across four functional tiers:
L1
Triage Analyst
Alert monitoring, initial triage, ticket creation, escalation
L2
Incident Handler
Deep investigation, containment decisions, playbook execution
L3
Senior Analyst / Threat Hunter
Threat hunting, custom detections, malware analysis, forensics
TI
Threat Intelligence
IOC management, threat actor tracking, MITRE ATT&CK mapping
💡 L1 handles volume; L3 handles depth. A well-tuned SIEM should allow L1 to close 70%+ of alerts within SLA.
Step 2: SOC Operational Models
In-House SOC
Full control, best for regulated industries (banking, defence)
High CAPEX: staff, SIEM licenses, 24/7 shifts
Suitable for organisations with >500 employees and dedicated security budget
MSSP (Managed Security Service Provider)
Low setup cost, immediate 24/7 coverage
Less customisation; shared analyst pool
Risk: limited knowledge of your environment
Hybrid SOC
MSSP handles L1/monitoring; internal team handles L2/L3 and TI
Best of both worlds — most common enterprise model
Requires clear escalation SLAs and runbook handoff
Step 3: SIEM Architecture
Key SIEM components:
Collectors: Beats (Filebeat, Winlogbeat, Packetbeat), Syslog agents
Processing: Logstash pipelines — parse, normalise, enrich (GeoIP, threat intel)
Storage: Elasticsearch indices with ILM (Index Lifecycle Management)
Analytics: Detection rules (EQL, Sigma), ML anomaly detection
Response: Integration with SOAR platforms (Splunk SOAR, Palo Alto XSOAR)
Step 4: SOC Metrics — Key Performance Indicators
MTTD
Mean Time to Detect — time from incident start to detection
< 4 hours
MTTR
Mean Time to Respond — time from detection to containment
< 24 hours
False Positive Rate
FP alerts / total alerts
< 30%
Alert-to-Case Ratio
Cases opened / total alerts
> 5% indicates under-investigation
Analyst Utilisation
% time on alert triage vs. proactive work
< 80% reactive
Dwell Time
Time attacker is undetected in environment
< 7 days
Step 5: Build the SOC Metrics Calculator
Run it:
📸 Verified Output:
Step 6: SOC Technology Stack
Tier 1 — Alert Management:
SIEM: Elastic Security, Splunk ES, Microsoft Sentinel
SOAR: Palo Alto XSOAR, Splunk SOAR, IBM Resilient
Ticketing: ServiceNow, Jira
Tier 2 — Investigation:
EDR: CrowdStrike Falcon, SentinelOne, Microsoft Defender for Endpoint
Network: Zeek/Bro, Suricata, Darktrace
Memory forensics: Volatility, Rekall
Tier 3 — Hunting & Intelligence:
TIP: MISP, OpenCTI, Recorded Future
Hunting: Elastic SIEM, Velociraptor, osquery
Step 7: SOC Design Principles
Detection-first mindset — assume breach; focus on reducing dwell time
Automation at L1 — auto-enrich and auto-close low-fidelity alerts
Metrics-driven tuning — review FPR weekly; update detection rules monthly
People, Process, Technology — 40% people investment, 30% process, 30% tools
Purple team integration — regular red/blue exercises to validate detections
💡 The SOC maturity model: Ad-hoc → Managed → Defined → Optimised. Most organisations are at "Managed"; targeting "Defined" (documented playbooks, SLAs, metrics) provides 3x improvement in MTTR.
Step 8: Capstone — SOC Design Exercise
Design a SOC for a 2,000-employee financial services company:
Requirements:
24/7 monitoring
Regulatory: PCI DSS, SOX, GDPR
Budget: USD 3M/year
Risk appetite: Low (zero-tolerance for payment card data breach)
Recommended Architecture:
Summary
SOC Tiers
L1 triage → L2 investigate → L3 hunt → TI intelligence
SOC Models
In-house (control), MSSP (cost), Hybrid (best of both)
SIEM Pipeline
Collect → Parse → Normalise → Enrich → Detect → Alert
Key Metrics
MTTD (<4h), MTTR (<24h), FPR (<30%), Dwell time (<7d)
Efficiency Score
Formula: 100 - FPR% - MTTD2 - MTTR0.5
Staffing
3-5 analysts per shift; 24/7 = minimum 8 FTEs
Last updated
