Detection, Response & GRC

Security Operations & SIEM

4 min read

Security operations center (SOC) skills are essential for defensive security roles. This lesson covers SIEM platforms, detection engineering, and threat hunting.

SIEM Fundamentals

What Is a SIEM?

Security Information and Event Management (SIEM) systems:

  • Collect logs from across the environment
  • Normalize data into a common format
  • Correlate events to detect patterns
  • Alert on suspicious activity
  • Enable investigation and response

Major SIEM Platforms

PlatformStrengthBest For
SplunkPowerful search, extensive ecosystemEnterprise, custom analytics
Microsoft SentinelAzure integration, AI featuresMicrosoft environments
Google ChronicleMassive scale, threat intelLarge data volumes
Elastic SIEMOpen source, cost-effectiveStartups, budget-conscious
IBM QRadarCompliance, offense analysisRegulated industries

Interview Question

Q: "Walk me through setting up detection for a brute force attack."

Answer:

1. DATA SOURCES
   └── Authentication logs (AD, LDAP, SSO)
   └── VPN logs
   └── Application logs

2. DETECTION LOGIC
   └── Count failed logins per user/IP
   └── Time window (e.g., 5 minutes)
   └── Threshold (e.g., 10 failures)

3. SPLUNK QUERY EXAMPLE:
index=auth sourcetype=windows:security EventCode=4625
| bin _time span=5m
| stats count as failures by src_ip, user
| where failures > 10
| eval severity=case(
    failures > 50, "critical",
    failures > 20, "high",
    true(), "medium"
)
4. ALERT CONFIGURATION
   └── Trigger: Real-time or scheduled
   └── Throttling: Once per IP per hour
   └── Response: Ticket creation, blocking

Detection Engineering

Detection Types

TypeDescriptionExample
SignatureKnown bad patternsMalware hash, specific exploit
BehavioralAnomalous activityUnusual login times
StatisticalDeviations from baselineTraffic volume spikes
Threat IntelExternal indicatorsKnown C2 domains

MITRE ATT&CK Integration

# Detection rule with ATT&CK mapping
name: Suspicious PowerShell Execution
description: Detects encoded PowerShell commands
mitre:
  tactic: Execution
  technique: T1059.001
  subtechnique: PowerShell

detection:
  selection:
    EventID: 4104
    ScriptBlockText|contains:
      - '-EncodedCommand'
      - '-enc'
      - 'FromBase64String'
  condition: selection

severity: high
false_positive_rate: low

Detection Maturity Model

LevelCharacteristics
Level 0No detection capability
Level 1Basic vendor rules
Level 2Custom rules for environment
Level 3Threat-informed detection
Level 4Automated hunting and ML

Threat Hunting

Hunt Hypothesis Framework

HYPOTHESIS STRUCTURE:
"Based on [threat intelligence/trend], attackers may be
using [technique] to [objective]. We can detect this by
looking for [observable]."

EXAMPLE:
"Based on recent ransomware campaigns, attackers may be
using PsExec for lateral movement. We can detect this by
looking for remote service creation events."

Hunting Techniques

TechniqueDescriptionData Source
StackingFind rare valuesProcess names, service names
GroupingCluster related activityNetwork connections
TemporalTime-based correlationLogin times vs working hours
IOC SweepSearch for known badHashes, IPs, domains

Splunk Hunting Query Example

# Find rare parent-child process relationships
index=sysmon EventCode=1
| stats count by ParentImage, Image
| where count < 5
| sort count
| head 20

Log Management Best Practices

What to Log

CategoryLog SourcesKey Events
IdentityAD, IAM, SSOLogins, MFA, privilege changes
NetworkFirewall, DNS, ProxyConnections, blocks, queries
EndpointEDR, SysmonProcess creation, file changes
CloudCloudTrail, Activity LogAPI calls, configuration changes
ApplicationWeb servers, databasesErrors, access, transactions

Log Retention Strategy

Log TypeRetentionReason
Security events1 yearCompliance, investigations
Authentication90 daysActive Directory requirements
Network flows30 daysStorage costs
Debug logs7 daysTroubleshooting only

SOC Metrics

Track these for interview discussions:

MetricDescriptionTarget
MTTDMean Time to Detect< 24 hours
MTTRMean Time to Respond< 4 hours (critical)
False Positive RateAlerts without incidents< 10%
Alert VolumeAlerts per analyst per day< 50
Detection CoverageATT&CK techniques covered> 70%

Interview Tip: When discussing SIEM, emphasize the importance of tuning. Raw out-of-the-box rules generate too many false positives. Show you understand that effective detection requires ongoing refinement.

Next, we'll cover incident response procedures. :::

Quick check: how does this lesson land for you?

Quiz

Module 5: Detection, Response & GRC

Take Quiz
FREE WEEKLY NEWSLETTER

Stay on the Nerd Track

One email per week — courses, deep dives, tools, and AI experiments.

No spam. Unsubscribe anytime.