INTRODUCTION
In a Security Operations Center (SOC), detecting an alert is only the beginning.
The real skill lies in how you investigate that alert, understand attacker behavior, and determine whether it is malicious or benign.
In this guide, I explain my step-by-step SOC L3 investigation workflow β the exact mindset I use when analyzing suspicious activity in my lab.
THE CORE PRINCIPLE
SOC L3 is not about tools.
It is about thinking.
You must always answer:
- What happened?
- Why did it happen?
- Is it normal or suspicious?
- What should I do next?
STEP 1 β START WITH THE DETECTION
Example:
PowerShell execution detected.
First question:
π Is this expected or suspicious?
STEP 2 β IDENTIFY KEY DETAILS
Always extract:
- User (who executed it)
- Host (where it happened)
- Process (what executed)
- Time (when it happened)
- Command Line (how it was executed)
These 5 fields are your foundation.
STEP 3 β ANALYZE COMMAND LINE (MOST IMPORTANT STEP)
The command line tells the real story.
Look for:
- Encoded commands
- Download activity (http/https)
- Bypass flags
- Hidden execution
Example:
powershell -enc β HIGHLY suspicious
STEP 4 β CHECK PARENT-CHILD RELATIONSHIP
Ask:
π Who launched this process?
Example:
- explorer.exe β powershell (normal)
- winword.exe β powershell (SUSPICIOUS)
This step alone detects many attacks.
STEP 5 β VALIDATE USER BEHAVIOR
Ask:
- Is this user technical?
- Do they normally run this command?
- Is this a service account?
Unexpected behavior = strong signal.
STEP 6 β CHECK FREQUENCY
Ask:
- One-time execution?
- Repeated execution?
Repeated patterns = automation or malware.
STEP 7 β PIVOT TO RELATED ACTIVITY
Now expand investigation:
- Search same host
- Search same user
- Look for:
- PowerShell
- WMI
- Scheduled tasks
- Registry changes
This builds the attack chain.
STEP 8 β MAP TO MITRE ATT&CK
Example:
PowerShell β T1059.001
Ask:
π What is attacker trying to achieve?
- Execution
- Persistence
- Lateral movement
STEP 9 β DETERMINE RISK LEVEL
Classify:
- Low β Normal behavior
- Medium β Suspicious
- High β Malicious
STEP 10 β DECIDE ACTION
SOC L3 actions:
- Escalate incident
- Continue monitoring
- Close as false positive
REAL EXAMPLE FLOW
Detection: PowerShell executed
Investigation:
- Command line shows encoded command
- Parent is Word document
- User is non-technical
Conclusion:
π Likely phishing attack
MITRE:
π T1566 + T1059
COMMON MISTAKES
β Jumping to conclusions
β Ignoring command line
β Not checking parent process
β Not pivoting
β Overlooking user context
SOC L3 MINDSET
Donβt think:
π βWhat does this query show?β
Think:
π βWhat is the attacker doing?β
FINAL THOUGHT
Tools detect.
But analysts investigate.
The difference between SOC L1 and SOC L3 is not tools β
it is thinking and decision making.

Comments are closed