Phone: (+44) 113 216 3188
  • Email: info@koyertraining.com
Koyer Training Services
  • Home
  • About Us
  • Our Programs
  • Our Venues
  • Contact Us

Security Operations Center (SOC) Management and Threat Intelligence

Cybersecurity and Digital Risk October 25, 2025
Enquire About This Course

Introduction

The Security Operations Center (SOC) is the command center for an organisation's defensive cybersecurity posture, requiring skilled management and a data-driven approach. This course provides a comprehensive roadmap for designing, building, and operating a modern, effective SOC. It focuses on integrating cutting-edge technologies like SIEM, SOAR, and User and Entity Behavior Analytics (UEBA) with a robust Threat Intelligence program. Participants will gain the leadership and operational skills necessary to transform a basic monitoring function into a highly efficient, proactive, and mature threat detection and response capability.

Objectives

This program is designed to equip SOC Managers, analysts, and security leaders with the strategic and operational expertise to build, manage, and mature a modern Security Operations Center:

Target Audience

  • SOC Managers and Team Leads.
  • Tier 2 and Tier 3 Security Analysts.
  • CISO and Security Directors.
  • Threat Intelligence Analysts.
  • Incident Response Team Members.
  • Managed Security Service Provider (MSSP) Staff.
  • Security Automation Engineers.

Methodology

  • Group activity designing a SOC organizational structure and staffing plan.
  • Case studies on successful threat hunting campaigns and detection tuning.
  • Technical exercises analyzing raw log data and writing SIEM correlation rules.
  • Discussions on budgeting for SIEM/SOAR/TI platforms.
  • Individual assignment creating a threat intelligence report for executive briefing.

Personal Impact

  • Ability to design, staff, and manage a highly efficient, modern SOC.
  • Expertise in threat intelligence collection, analysis, and operationalization.
  • Mastery of detection engineering and advanced SIEM rule writing.
  • Skills to implement and measure the success of SOAR automation.
  • Enhanced leadership capability in a high-stress, 24/7 environment.
  • Deep understanding of security metrics (MTTD, MTTR) and executive reporting.

Organizational Impact

  • Significantly reduced Mean Time to Detect (MTTD) and Respond (MTTR) to threats.
  • Increased detection coverage against sophisticated and zero-day attacks.
  • Improved operational efficiency through SOAR automation, reducing manual toil.
  • Better prioritization of vulnerabilities and threat actors relevant to the business.
  • Lower staff burnout and turnover due to streamlined processes.
  • Demonstrable, measurable performance improvements in the security function.

Course Outline

Unit 1: The Modern SOC: Strategy and Design

Section 1.1: SOC Models and Functions
  • Defining the mission, vision, and core functions of a modern SOC.
  • Different SOC models: internal, outsourced, hybrid, and virtual.
  • Key roles and responsibilities within the SOC (Tier 1-3, Hunters, Engineers).
  • SOC maturity models and benchmarking performance.
Section 1.2: Technology Stack and Integration
  • Selecting and deploying Security Information and Event Management (SIEM).
  • Integrating Endpoint Detection and Response (EDR) and Network Detection and Response (NDR).
  • The role of Security Orchestration, Automation, and Response (SOAR).
  • Log collection strategy, data quality, and retention requirements.

Unit 2: Threat Intelligence Lifecycle and Integration

Section 2.1: Foundations of Threat Intelligence (TI)
  • Defining strategic, operational, and tactical threat intelligence.
  • The threat intelligence lifecycle (Direction, Collection, Processing, Analysis, Dissemination).
  • Sources of TI: commercial feeds, open-source, and internal data.
  • Understanding and using standards like STIX and TAXII.
Section 2.2: TI Operationalization
  • Integrating TI feeds into SIEM and security controls (e.g., firewalls, EDR).
  • Developing custom threat intelligence based on the organisation's risk profile.
  • Mapping threat actors and campaigns to the MITRE ATT&CK Framework.
  • Measuring the effectiveness of TI in detection and blocking.

Unit 3: Detection Engineering and Alert Management

Section 3.1: Building Effective Detections
  • Developing use cases and writing high-fidelity SIEM rules and queries.
  • Leveraging User and Entity Behavior Analytics (UEBA) for anomaly detection.
  • Techniques for reducing alert fatigue and managing false positives.
  • The concept of "Tuning the Signal" to focus on true threats.
Section 3.2: Alert Triage and Incident Prioritization
  • Establishing consistent triage processes and runbooks.
  • Prioritizing incidents based on risk, asset value, and confidence.
  • Effective shift-handover procedures in a 24/7 environment.
  • Implementing a knowledge base for incident resolution and sharing.

Unit 4: Security Automation and Orchestration (SOAR)

Section 4.1: SOAR Strategy and Adoption
  • Identifying high-value SOC tasks for automation (e.g., enrichment, phishing response).
  • Designing and building simple to complex playbooks.
  • Integration of SOAR with SIEM, EDR, and ticketing systems.
  • Assessing the ROI and maturity of SOAR implementation.
Section 4.2: Proactive Security Operations
  • The role and methodology of Proactive Threat Hunting.
  • Developing hypothesis-driven hunts using TI and MITRE ATT&CK.
  • Metrics for measuring threat hunting success and coverage gaps.
  • Vulnerability validation and management in the SOC.

Unit 5: SOC Management, Metrics, and People

Section 5.1: Performance Measurement and Reporting
  • Key Performance Indicators (KPIs) and Key Risk Indicators (KRIs) for the SOC.
  • Operational metrics: Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR).
  • Reporting SOC performance to executive leadership.
  • Financial justification and budget management for SOC resources.
Section 5.2: Leading the SOC Team
  • Addressing SOC staff burnout, turnover, and wellness.
  • Hiring, training, and career development pathways for analysts.
  • Cultivating collaboration between the SOC, Incident Response, and DevSecOps.
  • Tabletop exercises and continuous training for skill maintenance.

Ready to Learn More?

Have questions about this course? Get in touch with our training consultants.

Submit Your Enquiry

Upcoming Sessions

01 Dec

Casablanca

December 01, 2025 - December 05, 2025

Register Now
05 Jan

Cairo

January 05, 2026 - January 09, 2026

Register Now
19 Jan

Dubai

January 19, 2026 - January 21, 2026

Register Now

Explore More Courses

Discover our complete training portfolio

View All Courses

Need Help?

Our training consultants are here to help you.

(+44) 113 216 3188 info@koyertraining.com
Contact Us
© 2025 Koyer Training Services - Privacy Policy
Search for a Course
Recent Searches
HR Training IT Leadership AML/CFT