What You’ll Learn in 15 Minutes
You’re starting as a Tier-1 analyst tomorrow, or maybe you’re deciding if this career path is for you. This post cuts through confusion and gives you the exact map of what a SOC does, where Tier-1 fits, and what tools you’ll touch on day one.
No fluff. No 50-page guides. Just the essentials.
Part 1: What Is a SOC? (3 minutes)
A Security Operations Center (SOC) is a team of people and systems that watches for security threats 24/7/365.
The Core Job
Threats don’t follow office hours. A SOC monitors networks, logs, and user behavior continuously. When something looks suspicious—a failed login from an odd location, unexpected data transfer, malware detection—the SOC gets an alert and decides: Is this real or noise?
If real, the SOC escalates it to faster, higher-skilled teams. If noise, they suppress it and move on.
Why This Matters
Companies with sensitive data (financial institutions, healthcare, government, tech) must have a SOC. It’s often mandatory by regulation (HIPAA, PCI-DSS, SOX, etc.).
Part 2: The SOC Hierarchy (4 minutes)
Tier 1 (Alert Triage & First Response)
You, if you’re starting out.
What Tier-1 does:
- Monitors incoming alerts from SIEM and other tools
- Performs alert triage: determines if alert is true positive, false positive, or suspicious
- Collects evidence (IP, user, timestamps, process names)
- Opens tickets with clean context
- Escalates to Tier-2 if severity warrants it
- Documents findings in ticketing system
Speed is more important than depth. You’re not expected to resolve incidents alone. You’re expected to validate, document, and hand off cleanly.
Example Tier-1 Alert:
Alert: Failed login attempts (count: 15, user: john.smith, source: 203.45.67.89)
Triage steps:
1. Check if IP is internal → No (external)
2. Check if this is brute force pattern → Yes (15 failures in 5 min)
3. Check reputation → IP is flagged on AbuseIPDB
4. Decision: Real threat
5. Action: Escalate to Tier-2 with ticket #SOC-4521
Tier 2 (Deep Dive & Investigation)
Senior analysts. They investigate Tier-1 escalations in depth.
What Tier-2 does:
- Performs forensic investigation on Tier-1 escalations
- Writes detailed incident timelines
- Recommends containment actions
- Works with Incident Response on complex incidents
- Tunes alerts to reduce false positives
Tier 3 (Incident Response & Hunting)
Incident response specialists and threat hunters.
What Tier-3 does:
- Handles major incidents (breaches, ransomware, data exfiltration)
- Performs threat hunting (proactive investigation)
- Develops new detection rules
- Works with external law enforcement/agencies if needed
Other Critical Roles in a SOC
- SOC Manager: Staffing, SLAs, reporting to executive leadership
- Security Engineers: Build tools, tune SIEM, integrate new data sources
- Threat Intel Team: Researches threats, IOCs, vulnerabilities
Part 3: Tier-1 Core Responsibilities (3 minutes)
As a Tier-1 analyst, you own these tasks:
1. Alert Monitoring
You watch a dashboard. Alerts arrive continuously. Your job: triage them fast.
- Review alert details
- Check alert history for this user/IP/resource
- Assess severity (Low, Medium, High, Critical)
- Ask: Is this malicious or normal?
2. Evidence Collection
You gather facts, not opinions.
- Source IP/user: Where did the activity come from?
- Timestamp: When did it happen? (UTC always)
- Target: What was accessed?
- Action taken: What happened? (login attempt, file transfer, process launch)
- Indicators: File hashes, URLs, domain names
3. Context Enrichment
You add intelligence to the raw alert.
- Check IP geolocation and reputation databases
- Verify if user was on-call that night
- Look for previous alerts on same user/IP/resource
- Cross-check with other systems (firewall, EDR, DNS logs)
4. Escalation & Documentation
You write clear tickets.
A good escalation ticket includes:
- What happened (the alert)
- Why you think it matters (severity, context, indicators)
- What you tried (what you ruled out)
- Next step recommendation
Example:
Ticket: Possible credential stuffing on VPN
Severity: Medium
Alert: 47 failed login attempts, user sarah@company.com,
source 192.168.1.50 over 12 minutes
Evidence:
- IP is internal (corporate office subnet)
- User is currently at desk (verified via desk check)
- VPN policy allows max 3 failures before lockout
- No MFA bypass detected
Context:
- Sarah changed password 3 days ago
- No previous alerts on this user in past 30 days
- Time: 2:15 AM (unusual, but user on call)
Assessment: Likely false positive (new password entry practice)
Action: Reset VPN password for user, close ticket if no recurrence in 24 hrs
Next escalation: None required
5. Communication
You talk to other teams.
- End users: “We locked your account due to too many failed logins. Reset your password.”
- Network team: “Can you check firewall logs from IP X?”
- Tier-2 analysts: “This looks real. Here’s my evidence.”
Part 4: Tools You’ll Need on Day 1 (3 minutes)
The Core Stack
SIEM (Security Information and Event Management)
- Examples: Splunk, Elastic, Microsoft Sentinel, ArcSight
- What it does: Collects and indexes millions of security logs
- Your use: Search for suspicious activity, build queries, watch dashboards
- First task: Learn the UI, run 3 sample searches
Ticketing System
- Examples: Jira, ServiceNow, Remedy
- What it does: Tracks incidents, escalations, and resolutions
- Your use: Open tickets, add evidence, close resolved alerts
- First task: Create a test ticket, practice adding notes
Threat Intelligence Platforms (optional for day 1)
- Examples: VirusTotal, AbuseIPDB, AlienVault OTX
- What it does: Enriches IPs, domains, file hashes with threat context
- Your use: Check if an IP or domain is known malicious
- First task: Look up 3 IPs, understand the ratings
EDR (Endpoint Detection & Response)
- Examples: CrowdStrike, Microsoft Defender for Endpoint, SentinelOne
- What it does: Monitors and protects individual computers
- Your use: Check if an endpoint has malware, see process history
- First task: Browse one user’s endpoint activity
Chat/Collaboration Tools
- Slack, Teams, Discord
- What it does: Real-time team communication
- Your use: Ask questions, escalate alerts, stay informed
- First task: Join SOC channel, introduce yourself
Your Day 1 Checklist
Print this or save to your notes:
- Tour the SOC: Where do you sit? Who’s around? What’s the vibe?
- Get credentials: SIEM, ticketing, EDR, threat intel platforms
- Learn the SIEM UI: Dashboard, search bar, common queries
- Read SOC playbooks: How does your SOC handle alerts? Ask for runbooks.
- Study alert severity levels: What’s Medium? What’s High? (Every SOC defines differently)
- Practice 3 searches: Query SIEM for common alerts (login, network traffic, process)
- Create a test ticket: Practice opening, adding notes, linking evidence
- Understand SLAs: How fast must Tier-1 respond? (Often 15-60 minutes depending on severity)
- Find escalation contacts: Who’s Tier-2? Phone? Slack? Email?
- Ask about shift timing: Is it 24/7 rotation? Do you cover nights?
FAQ: Quick Answers to Common Questions
“What if I don’t know what I’m looking at?”
That’s normal on day one. Your job is to flag it, not solve it. Write what you see, add your evidence, and escalate. Tier-2 exists to dig deeper.
“How do I know if an alert is a false positive?”
- False positive: Alert fires but nothing bad happened (e.g., user tried wrong password 5 times, then logged in successfully).
- True positive: Alert fires and there’s actual malicious activity.
You learn this by looking at context: user history, timing, behavior patterns, and previous outcomes.
“How long does each alert take to triage?”
Low severity: 5-10 minutes.
Medium: 10-20 minutes.
High/Critical: 5 minutes (escalate fast, investigate later).
Speed matters because the queue never stops.
“What’s the difference between SIEM and EDR?”
- SIEM: Watches the network and systems from a central point. Sees logins, network traffic, logs.
- EDR: Lives on each computer. Sees what programs ran, files accessed, process chains.
You need both to see the full picture.
“How do I not mess up?”
You will. Everyone does. The key: document everything and escalate when unsure. A Tier-1 analyst’s job is not to be perfect; it’s to be consistent, honest, and fast.
Key Takeaways
- SOC is 24/7 monitoring for threats. You’re the first line of defense.
- Tier-1 job: Validate alerts, collect evidence, escalate cleanly.
- Speed + clarity > perfect analysis. Tier-2 does the deep dive.
- Tools: SIEM, ticketing, EDR, threat intel, collaboration.
- Day 1 is about learning the UI and asking questions. Not about solving cases.
Next Steps
- Practice one SIEM query before your first shift
- Ask your team for their most common alert types
- Review your company’s incident response policy
- Set up your communication channels
You’ve got this. Thousands of SOC analysts started exactly where you are now. Focus on clean triage, good documentation, and learning one new thing each day.
Welcome to the SOC.
Further Reading
- How to Become a SOC Tier 1 Analyst: Series Kickoff and Roadmap
- SOC Tier 1 30-Day Practical Training Plan (Coming next)
- Alert Triage Workflow: The Tier-1 Analyst’s Decision Tree (Coming next)
Questions? Feedback? Share your SOC experiences or questions in the comments below.
This is Part 1 of the SOC Tier 1 Analyst Journey series. Each post builds on foundational concepts and adds practical depth to accelerate your career.