•   sales@dolos.africa
  • +27 21 683 3899
DolosDolosDolosDolos
  • Home
  • Solutions
    • Endpoint Security
      • Endpoint Protection
      • Endpoint Detection & Response
      • Add-on Modules
      • DNS Protection
    • Advanced Endpoint Security
      • Advanced EDR & EPDR
      • Threat Hunting Platform
      • Add-on Modules
      • MDR
    • XDR – Unified Security
    • Network Security
    • Multi-Factor Authentication
    • Secure Wi-Fi
    • Document Security
    • RMM Solutions
    • Cyber Assessment
  • Partners
  • News
    • Blog
    • Press Office
  • Support
  • About Us
  • Contact

Modern SOC Series III: Managing risk – the professionals behind a modern SOC

    Home Advanced Endpoint Security Modern SOC Series III: Managing risk – the professionals behind a modern SOC

    Modern SOC Series III: Managing risk – the professionals behind a modern SOC

    By Andrea Kemsley | Advanced Endpoint Security, Endpoint Detection & Response | Comments are Closed | 7 July, 2023 | 0

    Modern SOCs are highly specialised security operations centres whose objective is to detect attackers who have gained access to an organisation’s device or network. Built around complex environments, a team of cybersecurity experts who have been assigned different roles coordinate operations at SOCs. These professionals execute a sequence of specific processes supported by tools capable of processing a large volume of data in real time to detect, analyse and respond to attacks as quickly as possible.

    The main roles in a modern SOC  

    Cybercriminals are always active, they lurk in the system, ready to attack as soon as organisations are careless about security. This means SOCs, and more specifically modern SOCs, have to operate 24 hours a day, 365 days a year at the same intensity and ensure the coverage provided by their teams and roles is sufficient to keep malicious activity under control. The key professionals working in a modern SOC include:

    1. Security Analyst:
      There are three tiers for security analysts with different responsibilities assigned to each level.  Tier 1 security analysts are tasked with proactively monitoring and classifying alerts, as well as detecting anomalies or indicators of attack and then identifying the root cause and recommending remediation. Tier 1 analysts filter out false positive alerts from real incidents, so efficiency is critical. They are also responsible for configuring security and monitoring tools. Tier 2 analysts are known as investigators and work closely with the response team. They are responsible for investigating the security incident and determining what has happened, which systems are affected, which techniques have been used, when and why. Then they need to work with the response team to develop response and remediation measures to prevent similar attacks in the future. Tier 2 analysts review any weaknesses found in an organisation’s preventive measures aiming to strengthen its resilience.  Finally, Tier 3 analysts are regarded as the expert analysts within the SOC team. They assist Tier 2 whenever complex incidents require new behavioural data analysis and security intelligence.
    2. Threat Hunter:
      The approach adopted by threat hunters centres on professional knowledge of key attacker techniques and behaviours more than on detection technologies. Their job is to locate unknown and sophisticated threats that have managed to circumvent existing controls.  Seeking to identify and respond to threats quickly, they assess the security of the organisation from a proactive point of view, enabling them to reduce the dwell time of a threat.
    3. The response team:
      This specialised team is tasked with developing and deploying containment, mitigation and eradication strategies. Sometimes, the response is carried out by a third team, the internal IT or security function at the company, guided by the response team that identifies which actions are needed to ensure a 100% effective response to eradicate the attacker’s presence in all affected systems.
    4. SOC Manager:
      He or she is in charge of leading the team by performing management and operational tasks rather than specific technical tasks. This role carries out management responsibilities such as budgeting, defining strategies, managing SOC members, coordinating operations, achieving the objectives set by the company’s management, purchasing solutions and tools for the SOC, reviewing incident reports and generating reports on the SOC’s activities to present to the company’s management and the client’s Central Information Security Officers (CISO).
    5. Architecture team:
      This team is responsible for creating and maintaining the architecture of the SOC’s infrastructure and applications through testing, evaluating and suggesting the appropriate tools for the SOC’s complex processes. In close collaboration with the other teams and experts, they suggest, assess, develop and test new tools and processes that improve efficiency in detecting sophisticated threats, are faster in triage and investigation, and more agile in providing a coordinated and multi-domain response. This ensures that the attacker has nowhere to hide and no chance to attack again once the response team decides to eradicate the threat from the organisation. They are also sometimes tasked with ensuring security compliance, which involves documenting, adhering to and constantly updating security practices against internal and industry frameworks.

    Defining tasks for optimal performance

    As mentioned above, a modern SOC team should have an organisational structure that helps deploy optimised and well-executed work processes, where each member of the team knows what his or her role is so that attackers lurking inside the network can be detected and dealt with as soon as possible.

    Modern SOCs automate critical yet repetitive tasks while elevating the maturity and efficiency of the security operations team. These teams are also able to prepare more effectively and administer critical equipment upgrades and expansions, lowering costs and complexity further, allowing them to provide greater value to businesses. Get in touch with the Dolos team to find out more about how your organisation can build a modern SOC.

    Contact us
    Advanced Endpoint Detection & Response
    WatchGuard Technologies

    Related Post

    • Modern SOC Series V: how modern SOCs help organisations manage cyber risk

      By Andrea Kemsley | Comments are Closed

      Cyber adversaries constantly leverage sophisticated, malicious applications and legitimate tools to infiltrate organisations and evade existing security controls. To counter such attacks, security teams need to transition from security management to proactive security operations, efficientlyRead more

    • Modern SOC Series IV: the various deployment models of a modern SOC operation

      By Andrea Kemsley | Comments are Closed

      Constructing a modern SOC A modern SOC (Security Operations Centre) can be built internally, although many organisations lack the in-house resources to accomplish this and struggle to find suitable staff members due to the deepRead more

    • Modern SOC Series II: six meaningful benefits of modernising SOCs

      By Andrea Kemsley | Comments are Closed

      The growing number and complexity of threats, combined with the expansion of the attack surface, complicate the primary purpose of a Security Operations Centre (SOC): detecting, analysing, and responding to security incidents. These factors generateRead more

    • Modern SOC Series I: The Significance of Modern SOC and MDR Services

      By Andrea Kemsley | Comments are Closed

      In these modern times, the threat landscape continues to expand. Tactics previously used by cyber criminals have evolved – they are now highly skilled and are motivated by financial and geopolitical gains, circumventing security controlsRead more

    • Threat Hunting Enhances Overall IT Security Strategies

      By Andrea Kemsley | Comments are Closed

      Threat hunting is vitally important to organisations of all sizes and varieties, as advanced threats can slip past automated cybersecurity. Also, if the hackers have sufficient time and resources, they can break into any givenRead more

    Recent Posts

    • 6 May, 2025
      0

      The Top Cyber Challenges in an Increasingly Digital World

    • 1 April, 2025
      Comments Off on Exciting Q2 Promotions on WatchGuard Fireboxes

      Exciting Q2 Promotions on WatchGuard Fireboxes

    • 5 March, 2025
      Comments Off on Insider Threats: Why Companies Can’t Afford to Ignore the Danger Within

      Insider Threats: Why Companies Can’t Afford to Ignore the Danger Within

    • 18 February, 2025
      Comments Off on Strengthen Cybersecurity in Financial Services Companies

      Strengthen Cybersecurity in Financial Services Companies

    Categories

    • Add-on Modules
    • Advanced Endpoint Security
    • Channel Partner Program
    • DNS Protection
    • Endpoint Detection & Response
    • Endpoint Protection
    • Multi-Factor Authentication
    • Network Security
    • Secure Wi-Fi
    • Unified Security

    Tags

    Adaptive Defense Adaptive Defense 360 AuthPoint DNSWatchGo Panda Security Patch Management Premium Threat Hunting Service Threat Hunting Platform WatchGuard WatchGuardONE WatchGuard Technologies
    • Dax Data Logo
    •   Unit 1 Melomed Office Park
      Punters Way
      Kenilworth
      Cape Town
      7708
    •   +27 21 683 3899
    •   sales@dolos.africa

    Useful Links

    • Solutions
    • Contact
    • Partners
    • Support

    News

    • The Top Cyber Challenges in an Increasingly Digital World

      2025 could be the most challenging year yet for the digital environment.

      6 May, 2025
    • Exciting Q2 Promotions on WatchGuard Fireboxes

      Upgrade your customers to XDR from WatchGuard with these exciting offers for

      1 April, 2025
    Copyright © 2025 Dolos. All Rights Reserved.  |  Privacy Policy
    • Home
    • Solutions
      • Endpoint Security
        • Endpoint Protection
        • Endpoint Detection & Response
        • Add-on Modules
        • DNS Protection
      • Advanced Endpoint Security
        • Advanced EDR & EPDR
        • Threat Hunting Platform
        • Add-on Modules
        • MDR
      • XDR – Unified Security
      • Network Security
      • Multi-Factor Authentication
      • Secure Wi-Fi
      • Document Security
      • RMM Solutions
      • Cyber Assessment
    • Partners
    • News
      • Blog
      • Press Office
    • Support
    • About Us
    • Contact
    Dolos
    Contact us for more information