
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
Every Security Operations Center organizes its analysts into tiers, creating a structure where straightforward issues resolve quickly while complex incidents receive expert attention. Understanding how this hierarchy works—and when to escalate—is fundamental to effective SOC operations.
Tier 1 analysts handle the initial flood of alerts. They are the first responders, responsible for quickly determining whether an alert represents a genuine threat or false positive. Speed matters here—a Tier 1 analyst might process hundreds of alerts during a shift. They follow established playbooks, apply known patterns, and make rapid triage decisions.
The skills needed at Tier 1 include pattern recognition, tool proficiency, and comfort with repetition. Most analysts begin their careers here, building the foundational knowledge that enables advancement. The role might seem basic, but catching real threats among thousands of false positives requires genuine skill.
Tier 2 analysts investigate escalated incidents in depth. When Tier 1 identifies something genuinely suspicious, Tier 2 takes over for thorough analysis. They correlate data across multiple sources, build timelines, and determine incident scope. This work requires deeper technical knowledge, investigative creativity, and strong analytical thinking.
Tier 2 also coordinates initial response actions—isolating systems, disabling accounts, blocking malicious IPs. They work with other teams when containment requires changes beyond SOC authority. Documentation becomes even more critical here, as complex incidents require clear records for legal, compliance, and improvement purposes.
Tier 3 analysts and specialists handle the most complex cases. They might reverse-engineer malware, perform advanced forensics, or investigate sophisticated persistent threats. Many Tier 3 roles are specialized—threat intelligence, detection engineering, forensics—rather than generalist investigation.
Knowing when to escalate is as important as knowing how to investigate. Escalation isn't admission of failure—it's proper process ensuring incidents get appropriate attention.
Escalate when the incident exceeds your scope. If your playbook says "escalate after X" or "escalate if Y," do so. Playbooks encode organizational decisions about resource allocation.
Escalate when you need access you don't have. Perhaps investigation requires looking at systems outside your permissions, or containment needs changes only other teams can make. Bring in whoever needs to be involved.
Escalate when time matters. If an active threat requires immediate expert attention, escalate rather than struggling for hours. The organization would rather have senior analysts handle urgent issues than wait while you learn.
Escalate when uncertain. If you've investigated thoroughly and remain unsure whether something is malicious, escalate with documented findings. Senior analysts can review your work and make the call.
Good escalation includes context. don't just send an alert ID and say "please look at this." Summarize what you found, what you checked, and why you believe escalation is warranted. Include relevant artifacts—logs, screenshots, timeline—that help the next analyst understand quickly.
Document your investigation so far. Whatever you learned shouldn't require rediscovery. If you ruled out certain explanations, say so. If you identified affected systems, list them.
Communicate through appropriate channels. Most SOCs have formal escalation procedures—ticketing systems, chat channels, phone trees for urgent issues. Follow them. Ad-hoc escalation creates confusion and drops things.
Similar principles apply to shift handoffs. The outgoing analyst should brief incoming colleagues on ongoing incidents. what's active? What needs attention? What decisions are pending?
Written shift summaries supplement verbal briefings. Key incidents, important findings from the shift, and known upcoming activities all belong in the handoff documentation. These records also serve as historical reference when future investigation needs context about what happened in the past.
How do SOC teams handle escalations?
What is the term for moving an alert up tiers?
What metrics measure SOC effectiveness?
What acronym describes time to detect?