SOC Analyst Entry Path
Audience : Tier 1 Analyst, Tier 2 Analyst, Junior Responder
Purpose : Use this guide to understand what to do first during live alerts and how to work safely inside the SOC process.
graph TD
A["Read IR Framework"] --> B["Use the Runbook"]
B --> C["Collect Evidence"]
C --> D["Escalate When Needed"]
D --> E["Document the Case"]
1. Start Here
2. Read These Documents First
3. Non-Negotiables
4. Minimum Outputs Per Case
5. Daily Improvement Focus
6. Operating Reviews You Should Attend
Review
Cadence
Why You Attend
What You Should Bring
Shift Handoff
Every shift
Transfer live case context and queue risk cleanly
Open cases, blockers, pending actions, and owner changes
Weekly Detection Review
Weekly
Share where false positives, missed signals, or noisy use cases are hurting triage
Examples of noisy alerts, missed context, and analyst pain points
Weekly Telemetry Review
Weekly when needed
Surface data gaps that blocked investigation or delayed confidence
Missing logs, broken fields, timestamp issues, and affected use cases
Training / Readiness Review
Weekly during onboarding
Confirm readiness for more independent handling
Ticket samples, escalation quality, and checklist progress
7. Metrics and Signals You Should Watch
Metric or Signal
Why It Matters
Escalate When
Alert response time (MTTA)
Shows whether you are keeping pace with incoming work
Priority alerts wait past team threshold
Case aging / stalled tickets
Shows whether work is getting stuck without movement
A case has no meaningful update by the next handoff
False positive repetition
Shows whether the same benign pattern is wasting analyst time
Same pattern appears repeatedly without tuning follow-up
Missing evidence or telemetry
Shows whether you are deciding with weak visibility
You cannot confirm or dismiss a case because required data is absent
Escalation hesitation
Shows whether uncertainty is being left in queue too long
You are still unsure after the runbook time limit or playbook threshold
8. Decisions You Personally Own
9. Analyst-to-Tier-2 Handoff Path
Handoff Trigger
What Tier 1 Must Finish First
What Tier 2 Must Receive
Runbook time limit exceeded
Record what was checked and what remains unclear
Alert summary, evidence reviewed, and unresolved questions
Playbook says escalate
Confirm severity, asset/user context, and decision point hit
Playbook reference, trigger condition, and current risk statement
Priority asset or privileged user involved
Verify business context and owner if known
Asset/user importance, impact concern, and current containment status
Missing telemetry blocks decision
Record exactly which data source or field is missing
Gap description, affected use case, and confidence limitation
10. Minimum Handoff Packet From Analyst
Ticket summary stating what happened, what is suspected, and why it matters.
Evidence references for the key logs, screenshots, queries, or exported artifacts already reviewed.
A short timeline of alert, triage, pivots performed, and escalation time.
A clear statement of what you know, what you do not know, and what Tier 2 should check next.
References