Unlocking the Secrets of the Security Operations Center: A Cybersecurity Enthusiast’s Quest

Fortune Edema
2 min readMar 6

--

Hello there, fellow cybersecurity enthusiasts! I am thrilled to share with you my journey towards becoming ISC2 certified in cybersecurity. Today, I want to talk about one of my favorite areas in this field — working with a team in a Security Operations Center (SOC).

For those of you who may not be familiar, a SOC is a functional organizational area where information security teams communicate to detect, monitor, and analyze events on a network. It is a hub for cybersecurity professionals, and I am excited to tell you all about the “incident response team” that works within it.

In many cases, IT professionals are classified as first responders for incidents. They are the first ones on the scene and know how to differentiate typical IT problems from security incidents. It is similar to how medical first responders have the skills and knowledge to provide medical assistance at accident scenes.

A typical incident response team is a cross-functional group of individuals who represent the management, technical, and functional areas of responsibility that are most directly impacted by a security incident. This team includes representatives of senior management, information security professionals, legal representatives, public affairs/communications representatives, and engineering representatives (system and network).

To be part of this team, members must undergo training on incident response and the organization’s incident response plan. Many organizations now have a dedicated team responsible for detecting any computer security incidents that take place, known as Computer Incident Response Teams (CIRTS).

When an incident occurs, the response team has four primary responsibilities:

  1. Determine the amount and scope of the damage caused by the incident.
  2. Determine whether any confidential information was compromised during the incident.
  3. Implement any necessary recovery procedures to restore security and recover from incident-related damage.
  4. Supervise the implementation of any additional security measures necessary to improve security and prevent recurrence of the incident.

As a cybersecurity enthusiast, I have always dreamt of working in a SOC. I am taking small steps to achieve this goal, and I pray it comes into fruition. Being part of a team that responds to security incidents would be a dream come true for me.

I hope you found this article as fascinating as I did. Stay tuned for more updates on my journey towards becoming ISC2 certified in cybersecurity. Until then, happy reading and keep learning!

--

--

Fortune Edema

Information Security Associate ISO IEC 27001 ||Tech Enthusiast||InfoSec Researcher|| Jnr SOC Analyst ||Security Awareness||Computer Science Student

Lists

See more recommendations