A SOC Analyst receives XDR-enriched data and cross-checks detection and signal attributes to validate events. They perform a thorough examination of metadata, encompassing endpoint activities, downloaded files, and network traffic summaries associated with the event.
Following this, they initiate a preliminary inquiry, which involves checking the reputation of the public IP address involved. They utilize diverse tools to gather data points and evaluate domains utilizing the IP for hosting.
Subsequently, the SOC Analyst reviews business-specific details such as workflow handling annotations, IP notes, and general knowledge notes to identify any factors that might impact the approach to the investigation.
The SOC Analyst will conduct an investigation to ascertain whether the triggered detection is due to rule noise, a malicious attack, a suspicious incident, or the actions of a benign actor. The assessment of the attack’s success is based on:
– Indicators of Compromise (IOCs) and/or Indicators of Attack (IOAs) for the intrusion
– Intrusion specifics
– The extent of access attained by the attacker
– Associated malicious activities
– Signs of lateral movement
Inform, Respond & Remediate
The SOC Analyst will assess whether the incident necessitates customer notification, adhering to documented escalation and containment protocols for communication via email and phone calls. Concurrently, our SOC team will segregate and neutralize the threat while initiating response measures aligned with our predefined processes, considering the signal type and customer preferences.
In the event that the SOC Analyst identifies an ongoing hands-on-keyboard attacker or a ransomware attack, they will involve our dedicated Incident Handling Team available during every shift. The Incident Handling Team assumes control of the situation and becomes the primary point of contact for the customer. They collaborate closely with THI. Threat Response Unit to assess the intrusion scope, identify threat actor activities, and ensure comprehensive remediation efforts.
Through collaborative efforts, our SOC team continuously strengthens your organization’s security stance and seamlessly integrates with your existing security team. Utilizing insights garnered from each investigation within our SOC, we continually enhance your MDR service, contributing to the enhancement of your organization’s cyber resilience.