SOC Interview Questions & Answers Guide
1. What is the role of a SOC Analyst?
nswer:
A
A SOC Analyst is responsible for monitoring, detecting, analyzing, and
responding to cybersecurity incidents. They use SIEM & Network Security and
Traffic Analysis tools, analyze security alerts, investigate threats, and
coordinate incident response efforts to protect an organization’s IT
Infrastructure.
2. What are the different SOC tiers, and how do they function?
Answer:
● Tier 1 (L1)- Security Monitoring: Monitors alerts,performs initial
triage, and escalates incidents.
● Tier 2 (L2)- Incident Response: Investigate escalatedalerts, perform
deep analysis and mitigate threats.
● Tier 3 (L3)- THreat Hunting & Forensics: Proactivelysearches for
advanced threats, analyzes malware, and provides strategic
improvements.
● SOC Manager: Overseas operations, coordinates betweenteams, and
ensures security policies are enforced.
3. What are SIEM Tools, and Why are they Important?
nswer:
A
SIEM (Security Information and Event Management) tools collect,
analyze and correlate logs from various sources to detect security threats. Examples
include: Splunk, IBM, QRadar, Azure Sentinel, and ArcSight. They help identifying
anomalies, automating alerts, and supporting compliance.
4. What is the difference between IDS and IPS?
Answer:
● Intrusion Detection System (IDS):Monitors Network Traffic for
malicious activity and generates alerts.
● I ntrusion Prevention System (IPS):Acts as an active security measure
by blocking detection threats in real time.
5. What is Nmap and how does it work?
nswer:
A
Nmap (Network Mapper) is a tool to scan networks and discover hosts,
services, and open ports. It works by sending specially crafted packets to the
target and analyzing the responses.
6. How do you analyze packets for suspicious activity?
nswer:
A
In Wireshark, apply display filters like `http`, `tcp.port == 22`, or `dns` to
isolate traffic. Look for anomalies like repeated failed login attempts or
unusual destinations.
7. How do you respond to a phishing attack?
Answer:
● Analyse the emails headers and links using tools like VirusTotal,
URLScan, and IPVoid.
● Check sender reputation and email anomalies.
● Quarantine if any user clicked the link or downloaded malicious files.
● Educate users on phishing awareness and update email security
policies.
8. What are the steps in the Incident Response (IR) process?
Answer:
1. Identification:Detects and validates security incidents.
2. Containment:Isolate affected systems to prevent furtherdamage.
3. Eradication:Remove threats and malicious files.
4. Recovery:Restore affected systems and resume operations.
5. Lessons Learned:Conduct post-incident analysis to improve defences.
9. How do you differentiate between a False Positive and False Negative?
Answer:
● False Positive: A benign event incorrectly flaggedas a threat (e.g. a legitimate
login marked as a brute force.)
● False Negative:A real threat that goes undetected(e.g.: malware bypassing
detection systems).
● SOC analysts fine-tune security rules and thresholds to minimize false
positives/negatives.
10. What is MITRE ATT&CK Framework?
nswer:
A
MITRE ATT&CK is a Knowledge base of adversary tactics, techniques, and procedures
(TTPs) used for threat hunting, red teaming, and security assessment. It categorizes
cyber threats into Initial Access, Execution, Persistence, Privilege Escalation, etc.
11. What are some common log sources in a SOC?
Answer:
● Network Logs:Firewall, IDS/IPS, VPN logs
● Endpoint Logs: EDR solutions (e.g.: Microsoft Defender,Crowdstrike)
● Application Logs:Web servers, databases
● Cloud Logs:AWS cloudTrail, Azure Security Center
● Authentication Logs:Active Directory, Okta, Radius
12. What is a Brute Force Attack? How can you prevent it?
nswer:
A
A brute force attack is when an attacker repeatedly tries different
username-password
combinations to gain access.
Mitigation:
● Implement Account Lockout Policies
● Enforce Multi-Factor Authentication (MFA)
● Use CAPTCHA and rate limiting
● Monitor for multiple failed login attempts.
13. What are Indicators Of Compromise (IoCs)?
nswer:
A
IoCs are evidence of a security breach, such as:
● I P addresses of known attackers
● Malicious file hashes (MD5, SHA256)
● Suspicious domain names and URLs
● Unusual Login activities.
14. What is a DDoS attack, and how can it be mitigated?
nswer:
A
A Distributed Denial-of-Service (DDoS) attack overwhelms a server or network with
excessive traffic.
Mitigation:
● Use Rate Limiting andWAF (Web Application Firewall)
● DeployCDN (Content Delivery Network)to absorb traffic
● ImplementGeo-blockingfor suspicious locations.
15. Difference Between Vulnerability Scanning and Penetration Testing?
Answer:
● Vulnerability Scanning:Identifies security weaknessesin a system using
tools like Nessus ,Quals, and Rapid7.
● Penetration Testing:Actively exploits vulnerabilitiesto access the system’s
security.
16. Explain Splunk architecture (Forwarder, Indexer, Search Head)
nswer:
A
Splunk uses Forwarders to collect data, Indexers to store and process it, and Search
Head to query and visualize data via dashboards.
1 7. What is an index and sourcetype?
Answer:An index is a storage location for logs in Splunk, and a sourcetype is a
classification for the log format (e.g.: syslog, json, access_combined).
18. How do you use Burp to detect SQLi or XSS?
nswer:
A
Use the repeater to manually test inputs and scanner to automatically find
vulnerabilities SQLi shows database errors; XSS reflects injected scripts in responses.
19. What is Hydra Used for?
nswer:
A
Hydra is a brute-force tool used to crack login credentials for services like SSH, FTP,
HTTP, etc. by trying multiple username-password combinations.
0. (IMPORTANT) What tools have you used for securityanalysis and
2
investigations?
Answer:
● SIEM tools:Splunk, QRadar, Azure Sentinel
● Endpoint Security: Microsoft defender 365, CrowdStrike, SentinelOne
● Threat Intelligence:VirusTotal, Shodan.io, Cyberchat
● Firewall & Network Security:Palo Alto, FortiGate, F5 WAF
21. Port numbers for SSH, SMB, DNS, RDP?
nswer:
A
SSH:22,SMB:445,DNS:53,RDP:3389
22. How does a SOC use ATT&CK?
nswer:
A
SOC analyst map alerts to ATT&CK techniques to understand attacker behavior,
improve detection rules, and prioritize responses.
MITRE ATT&CK: Top 10 Tactics & Techniques with T-Numbers
1 . I nitial Access
- Phishing Email Attachment (T1566.001)
- Exploit Public-Facing Application (T1190)
. E
2 xecution
- PowerShell Execution (T1059.001)
- Command and Scripting Interpreter (T1059)
. P
3 ersistence
- Registry Run Keys / Startup Folder (T1547.001)
- Create Account (T1136)
. P
4 rivilege Escalation
- Bypass User Account Control (T1548.002)
- Exploitation for Privilege Escalation (T1068)
. D
5 efense Evasion
- Obfuscated Files or Information (T1027)
- Indicator Removal on Host (T1070.004)
. C
6 redential Access
- Credential Dumping (T1003)
- Brute Force (T1110)
. D
7 iscovery
- Network Service Scanning (T1046)
- System Information Discovery (T1082)
. L
8 ateral Movement
- Remote Services: SMB/RDP(T1021.002)
- Pass-the-Hash (T1550.002)
. C
9 ollection
- Screen Capture (T1113)
- Clipboard Collection (T1115)
1 0.Exfiltration
- Exfiltration Over Web Service (T1567)
- Exfiltration via Email (T1048)