Cyb3rSn0rlax
Social MediaGitHub
  • About Cyb3rSn0rlax
  • 🛡️ SOC Engineering
  • 🧞Building an Open SIEM From Scratch
    • 1. Introduction to Elastic Stack
      • a. Installing and configuring Elasticsearch
      • b. Installing and configuring Kibana
      • c. Installing and configuring Logstash
    • 2. Installing OpenDistro for Elasticsearch Plugins
    • 3. Installing ElastAlert
    • 4. ELK Stack: "L" is for Lord of the Stack
      • a- Event Parsing: Pipelines
      • b - Event Parsing : From Beats to Logstash
      • c- Event Normalization with ECS
    • 5. Alerting in ELK
    • 6. Building Detection Rules
    • 7. Metrics Reports & Dashboards
  • 🛡️A Primer to Detection Engineering Dimensions in a SOC Universe
    • Operationalization
    • Execution
    • Analytics
  • 😺GitHub Projects
    • ELK4QRadar
    • Automating ELK Health Check
  • 💾DFIR
    • DFIR-01 : $MFT
    • DFIR-02 : Journal Forensics
    • DFIR-03: RDP Authentication Artifacts
  • ☢️ DEATH : Detection Engineering And Threat Hunting
    • 🔑TA0006 : Credential Access
      • Detecting Remote Credentials Dumping via comsvcs.dll
    • 🦘TA0008 : Lateral Movement
      • Detecting Lateral Movement via Service Configuration Manager
      • Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 1
      • Detecting CONTI CobaltStrike Lateral Movement Techniques - Part 2
  • 🔎Misc
    • Infosec Game-Sense
Powered by GitBook
On this page
  • Introduction
  • TL;DR

A Primer to Detection Engineering Dimensions in a SOC Universe

In these three blog articles I will go through different dimensions that impact directly or indirectly the detection engineering process from a SOC perspective.

Previous7. Metrics Reports & DashboardsNextOperationalization

Last updated 3 years ago

Introduction

During my three years in cybersecurity, I have been lucky enough, as an analyst, to work on several vectors inside the SOC pipelines, from alert triage and DFIR engagement to SIEM engineering and detection development which allowed me to experience first hand different challenges that we face on a daily basis.

Detection engineering is now considered one of the most important operations inside a SOC, MSSP or an MDR. In this article I will try to present detection engineering dimensions from my personal point of view of a SOC analyst.

TL;DR

Here is a Mind Map where I tried to group the main ideas of these blog posts. For further details, please follow along.

🛡️
Dimension 1 : Operationalization
Dimension 2 : Execution
Dimension 3 : Analytics
Detection Engineering Dimensions
Page cover image