Lesson 35 of 60 intermediate

SIEM, Alerts & SOC Triage

How a junior analyst adds value

Open interactive version (quiz + challenge)

Real-world analogy

A SIEM is an emergency room with thousands of patients arriving per minute. The Tier-1 analyst is the triage nurse: quickly assessing severity, catching the real emergencies, calmly noting everything, and handing the critical cases to specialists with a complete record.

What is it?

SOC Tier-1 is the on-call triage layer of security operations. It’s an achievable first security job with a clear progression to Tier-2 (deeper investigation), threat hunting, and detection engineering.

Real-world relevance

Alert: ‘Impossible travel — user signed in from Dhaka and Lagos within 30 minutes.’ Junior pulls sign-in logs, sees both IPs, matches location against travel calendar, identifies it as VPN/cloud proxy. Documents as false positive with context. Proposes a rule tweak. Handoff note is 8 lines. Senior approves.

Key points

Code example

// Sample SOC Tier-1 alert triage note

--- Alert #SIEM-00042 ---
Title:       Impossible travel - user alice@contoso.com
First seen:  2026-04-20 03:11 UTC
Severity:    Medium (per rule)
User:        alice@contoso.com
Source IPs:  203.0.113.42 (Dhaka), 198.51.100.77 (Lagos)
Timespan:    28 minutes

Checks:
  - Entra sign-in logs confirm both sign-ins succeeded
  - Second IP geolocates to a known cloud proxy / mobile VPN
  - User has no access to sensitive resources in the session
  - No MFA challenge failures observed
  - Endpoint compliance healthy
  - EDR timeline shows no malicious process activity

Decision: False positive (known VPN provider)
Action:   Close + propose rule tuning to allow-list this VPN ASN
Handoff:  N/A (closed at Tier-1)
Tagged:   FP, VPN, impossible-travel
Time spent: 18 min
---

Line-by-line walkthrough

  1. 1. Tier-1 triage template
  2. 2. Alert ID
  3. 3. First-seen timestamp
  4. 4. Severity
  5. 5. User
  6. 6. Source IPs
  7. 7. Timespan
  8. 8. Blank separator
  9. 9. Checks header
  10. 10. Entra sign-in confirmation
  11. 11. Geolocation check
  12. 12. Resource exposure check
  13. 13. MFA challenge check
  14. 14. Device compliance check
  15. 15. EDR timeline check
  16. 16. Blank separator
  17. 17. Decision
  18. 18. Action
  19. 19. Handoff
  20. 20. Tags
  21. 21. Time spent

Spot the bug

Tier-1 analyst closes 200 alerts in 2 hours with the note ‘false positive’ and no details.
Need a hint?
What risks does this create for the SOC and the analyst?
Show answer
Zero audit value, no tuning feedback, true positives can hide in the noise, and the analyst’s performance looks impressive but is indefensible. Each closure needs a concise why (source, check, decision). Fast without accuracy is worse than slow.

Explain like I'm 5

The SIEM is a wall of beeping alarms. Your job is to check each beep: is this real or a squirrel? If real, call the right team with clear notes. If fake, turn down that alarm’s sensitivity so it stops crying wolf.

Fun fact

Many SOC teams compete internally on ‘mean time to triage’ — how fast and accurately alerts are closed or escalated. Juniors who consistently close in under 15 minutes with high accuracy get moved to Tier-2 fastest.

Hands-on challenge

Install Wazuh or open Microsoft Sentinel free trial. Ingest some sample logs. Pick a rule, make it fire with test events, then write a Tier-1 triage note using the format in this lesson.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp