Roles and Responsibilities of L1, L2 and L3 With Scenarios
Roles and Responsibilities of L1, L2 and L3 With Scenarios
Responsibilities
of L1, L2 and L3
Cybersecurity
Analysts with
Scenarios
Examples v. 1.0
By Wojciech Ciemski
LN: https://www.linkedin.com/in/wojciech-ciemski/
PL: https://securitybeztabu.pl
EN: https://securitybeyondtaboo.com
Version Date Change Description
1.0 2025-01-28 Initial version of the
document.
P a g e 2 | 34
License and Disclaimer
Permission is hereby granted to copy and distribute this e-book under the following terms and
conditions:
1. Attribution
You must retain the author’s name (or pseudonym) and the original title of the e-book on
all copies. Any distribution must clearly attribute the work to the original author.
2. No Modification
You may not alter, transform, or build upon the content of this e-book in any way. All
copies must be distributed in their original, unmodified form, including this license text.
3. Disclaimer of Liability
The author is not liable for any misuse of the information contained in this e-book. All
material is provided for educational and informational purposes only. Any actions taken
based on the content are solely at the reader’s own risk.
4. No Warranty
The e-book is provided “as is,” without warranty of any kind, either expressed or implied.
The author does not guarantee the accuracy, completeness, or applicability of the
information herein, and shall not be held responsible for any errors, omissions, or
potential damages resulting from its use.
6. Final Provisions
This license aims to protect both the author’s rights and the freedom of access
to knowledge.
By using, copying, or distributing this e-book, you acknowledge and agree to be
bound by these terms.
P a g e 3 | 34
Table of Contents
License and Disclaimer ............................................................ 3
Table of Contents ..................................................................... 4
1. Introduction ......................................................................... 5
1.1 Importance of Defining SOC Roles................................................................................. 5
1.2 Overview of the L1, L2, L3 Model.................................................................................... 5
4. Conclusion ......................................................................... 31
4.1 Summary of Role Interdependence.............................................................................. 31
4.2 Importance of Continuous Training and Collaboration .................................................. 31
Bibliography ........................................................................... 33
P a g e 4 | 34
1. Introduction
The Security Operations Center (SOC) often serves as the central nervous system of an
organization’s cybersecurity strategy. With the increasing frequency and sophistication of
cyberattacks, many organizations have adopted a layered approach to incident detection and
response—commonly referred to as the L1, L2, L3 model. This structure assigns clear roles and
responsibilities to di erent analyst levels, ensuring that incidents are addressed swiftly and
e ectively.
L1 analysts can triage alerts rapidly, forwarding critical findings to higher-level analysts.
L3 analysts focus on root cause analysis, advanced threat hunting, and strategic
improvements to security posture.
A common pitfall in SOC environments arises when multiple analysts attempt to tackle the
same incident without clear role definitions. By formalizing an L1–L2–L3 structure, organizations
can avoid duplication of e ort and ensure the necessary expertise is applied to each incident at
the correct stage.
P a g e 5 | 34
awareness checks and may update basic firewall or endpoint security policies under
supervision.
L2 could utilize scripting skills (e.g., Python or PowerShell) to automate log analysis or
to parse suspicious payloads.
L3 might use advanced digital forensics software (e.g., Volatility, Autopsy) and threat
modeling frameworks (e.g., MITRE ATT&CK).
Below is a simplified schematic illustrating the alert flow in a three-tier SOC model:
Alert Origin -> SIEM (L1 Triages Alert) -> L2 Investigation -> Potential L3 Escalation
P a g e 6 | 34
This linear representation serves as a guideline, but actual SOC processes may loop back or
jump levels depending on the severity and nature of the incident. High-impact events might
warrant immediate involvement of L3 analysts even before L2 completes a full investigation.
Conversely, some minor incidents flagged by L1 can be resolved without further escalation.
P a g e 7 | 34
2. Roles and Responsibilities
When security teams organize their work within a Security Operations Center (SOC), they often
adopt a tiered approach that categorizes tasks and expertise into distinct levels—commonly
referred to as L1, L2, and L3. This structure helps distribute responsibilities according to
complexity and criticality, ensuring a clear workflow when responding to potential cyber
incidents. The ultimate goal is to minimize incident impact by detecting threats early, containing
them swiftly, and leveraging forensic insights to bolster the organization’s defenses.
In practice, each level of analyst plays a unique role in this layered defense:
L1 (Level 1) is usually the first point of contact when an alert or suspicious activity is
detected. Analysts at this level focus on real-time monitoring, basic triage, and
preliminary classification of events. Their role is often described as the “eyes on glass,”
since they typically watch dashboards, respond to alerts generated by tools such as
SIEM (Security Information and Event Management) systems, and perform initial
assessments. It is critical that L1 analysts maintain accuracy in logging incidents and
escalating them. Mistakes at this stage can lead to missed threats or false alarms
consuming valuable resources.
L2 (Level 2) analysts step in when alerts exceed the basic triage threshold or require
more in-depth investigation. They bring broader experience in correlating data across
di erent sources—logs from firewalls, endpoint protection platforms, intrusion
detection systems, and other security devices. L2 analysts dig into patterns, evaluate
the threat’s scope, and coordinate a more detailed response. They often have the
mandate to pull additional forensic data or collaborate with IT teams to isolate
suspicious hosts. In many SOCs, L2 analysts also perform limited threat hunting or test
the validity of alerts against known attack techniques documented in frameworks like
MITRE ATT&CK.
L3 (Level 3) analysts handle the most complex tasks, ranging from advanced malware
analysis to devising the overall response strategy. They often have deep expertise in
digital forensics, reverse engineering, threat intelligence, and even secure software
development practices. When an incident demands thorough investigation—such as
when sophisticated persistent threats arise—L3 specialists take the lead, performing
root-cause analysis, creating detection signatures, and recommending long-term
architectural changes to strengthen security posture. They also coordinate with
stakeholders outside the SOC, such as legal teams or external agencies. For guidance
on incident handling best practices, SOCs frequently refer to documents like NIST SP
800-61.
Although the term “Level” might imply a strict hierarchy, e ective SOCs view these roles as
complementary. Collaboration is paramount—L1 cannot function without strong processes for
escalation, L2 depends on thorough initial triage to avoid wasted e ort, and L3 benefits greatly
from the contextual information gathered by the previous tiers. In large organizations, each level
may be sta ed by separate teams. In smaller environments, a single analyst might span
multiple levels. Regardless of size, the key is to ensure that escalation paths, communication
protocols, and documentation practices are firmly in place.
P a g e 8 | 34
On a practical level, these roles interact with various tooling ecosystems. For instance, an L1
analyst might use scripts to quickly parse logs:
# Example script snippet that L1 might use for log parsing
grep "SuspiciousActivity" /var/log/syslog | tail -n 50
Whereas an L3 analyst investigating advanced threats could rely on deeper forensic tooling, for
example using Volatility to analyze memory captures:
# Memory analysis example for an L3 incident responder
volatility -f infected_memory_dump.vmem --profile=Win10x64 pstree
Such di erences in tooling highlight how responsibility shifts as incidents move from
preliminary assessment to intricate forensic analysis.
By understanding the core concepts behind these three levels—what each tier focuses on, how
they collaborate, and the typical skills required—you set the foundation for a SOC that can
respond more rapidly and with greater precision. The following sections explore each level in
depth, o ering both theoretical frameworks and real-world scenarios that illustrate the
competencies needed at L1, L2, and L3.
Core Duties
Alert Monitoring: L1 analysts continuously observe dashboards and alert queues
generated by SIEM (Security Information and Event Management) tools such as Splunk,
IBM QRadar, or Azure Sentinel. Their job is to filter out noise, investigate anomalies, and
ensure no critical events are missed.
Basic Triage: Once an alert is identified, L1 analysts perform initial investigations. This
includes verifying the alert’s legitimacy by checking log data, threat intelligence feeds, or
endpoint security console information. They typically follow SOC standard operating
procedures (SOPs) and playbooks for categorizing and prioritizing incidents.
Below is a simplified view of the types of alerts and common actions taken by L1 analysts:
P a g e 9 | 34
Alert Type Common Sources Typical L1 Action
Suspicious Network Network Tra ic Monitor, SIEM, Identify process/user involved, log
Flow IDS details
Such a search helps L1 analysts identify repeated failed login attempts, which could indicate a
brute force attack.
Knowledge of Common Attack Vectors: Familiarity with top threats, such as phishing,
ransomware, or web application exploits, helps L1 analysts recognize patterns quickly.
O icial resources like the MITRE ATT&CK framework provide extensive references on
adversarial techniques and tactics.
Communication and Collaboration: L1 analysts often work closely with other teams,
including IT support and network operations, especially when a suspected intrusion
involves immediate action like isolating a host or disabling a user account.
Practical Example
Imagine an L1 analyst receiving an alert for a suspicious file download on a company
workstation. The SIEM flags the event because the file’s hash matches a known malicious
signature on a threat intelligence list. The L1 analyst would:
2. Correlate with User Activity: Investigate if the user was accessing external websites
not typically associated with their role.
P a g e 10 | 34
3. Contain the Potential Threat: Depending on internal policies, the L1 analyst might
request that IT isolate the endpoint from the network to prevent lateral movement.
4. Gather Evidence: Document file hashes, download URL, user details, and attach any
relevant log entries to the incident ticket.
Real-World Considerations
High Volume, Rapid Decision-Making: In large organizations, the SOC may receive
thousands of alerts daily. L1 analysts must quickly spot the incidents that pose the
greatest risk. E ective filtering rules and SIEM dashboards help streamline this process.
Incident Priority Levels: L1 analysts often assign a severity level—e.g., Critical, High,
Medium, Low—based on the organization’s risk matrix or threat categorization. This
ensures the most dangerous threats are addressed first.
L1 analysts play an indispensable role in keeping organizations safe. By filtering out false
positives, escalating legitimate threats, and maintaining thorough documentation, they enable
the SOC to function e iciently and e ectively. This foundational work sets the stage for deeper
investigative e orts by L2 and L3 teams, ensuring a seamless escalation process that helps
contain and mitigate security incidents before they escalate into full-blown crises.
Key Responsibilities
1. Incident Investigation and Correlation
L2 analysts use Security Information and Event Management (SIEM) platforms, Endpoint
Detection and Response (EDR) solutions, and network monitoring tools to examine
alerts that L1 has escalated. Their focus is on determining the root cause, potential
a ected systems, and the extent of compromise. This often involves:
o Checking multiple log sources (firewall, IDS/IPS, endpoint logs) to see if there
are common indicators of compromise (IoCs) such as IP addresses, file hashes,
or domain names.
P a g e 11 | 34
o Building timelines to track attacker activities and pivot points within the
environment.
3. Playbook Execution
Many Security Operations Centers (SOCs) follow predefined incident response
playbooks to ensure consistency. L2 analysts are responsible for following these
procedures in a more detailed manner than L1. For example, if L1 identifies a potential
phishing attack, L2 might:
4. Quality Assurance
L2 analysts validate the findings and initial triage from L1. This includes confirming the
severity level, ensuring the correct categorization of alerts, and verifying that the initial
escalation notes are comprehensive. Where L1 might only note “Suspicious login from
unknown IP,” L2 will investigate if the IP belongs to a known threat actor or if it correlates
with user activity patterns.
Technical Competencies
An L2 analyst must be proficient in multiple technical areas to conduct thorough investigations:
P a g e 12 | 34
o In this example, an L2 analyst looks for users with more than ten login attempts
from the same IP to spot potential brute-force or compromised accounts.
Endpoint Forensics
L2 analysts use EDR solutions (e.g., CrowdStrike, Microsoft Defender for Endpoint) or
forensic tools (e.g., Volatility for memory analysis) to retrieve additional data from
compromised hosts. They might investigate processes, registry changes, or suspicious
executables.
o Checks the extracted URLs against known blacklists and threat intel feeds.
o Identifies that one URL is tied to a known phishing campaign targeting corporate
O365 credentials.
o Queries SIEM for concurrent events from the same IP, discovering a pattern of
repeated attempts over di erent user accounts.
P a g e 13 | 34
o Cross-references logs from intrusion detection systems to see if the same IP
triggered other alerts.
o Finds unusual file modifications in the /tmp directory after a successful login
attempt.
o Concludes that the threat actor managed to log in using stolen credentials. L2
coordinates with remediation teams to reset credentials and block the
attacker’s IP range.
Splunk, IBM QRadar, or Azure SIEM platforms for log Splunk Docs, IBM QRadar,
Sentinel correlation and alerting Azure Sentinel
These resources support L2 analysts in building a thorough picture of threats and responding
e ectively.
Core Responsibilities
1. Advanced Digital Forensics
L3 analysts conduct detailed investigations that require specialized tooling and
methodologies. This may involve memory analysis of compromised systems, deep dive
into network tra ic captures, or reconstruction of attacker timelines. The goal is to piece
together a complete picture of an incident to understand the root cause, method of
entry, and potential lateral movement within the environment.
3. Threat Hunting
L3 analysts proactively search for threats that have not yet triggered standard alerts.
They rely on indicators of compromise (IOCs), threat intelligence, and a deep familiarity
with the organization’s environment. The objective is to detect adversaries early in the
kill chain before major damage occurs.
P a g e 15 | 34
Specialized Skill Sets
Example
Skill Description
Tools/References
The transition from L2 to L3 often requires additional training, hands-on practice in specialized
labs, or certifications like GIAC Certified Forensic Analyst (GCFA) or GIAC Reverse Engineering
Malware (GREM). L3 analysts also benefit from leadership competencies, as they often shape
SOC strategy and drive large-scale changes.
1. Acquire Memory: Use a trusted tool to create a memory dump. On Windows systems,
tools like Magnet RAM Capture or Belkasoft Live RAM Capture are typical choices.
2. Analyze with Volatility: Employ the Volatility framework to run plugins such as pstree,
malfind, or netscan.
# Example Volatility commands
volatility -f memory_dump.raw --profile=Win10x64 pstree
volatility -f memory_dump.raw --profile=Win10x64 malfind
P a g e 16 | 34
3. Identify Malicious Processes: Investigate unusual processes, suspicious command
lines, or code injections indicated by the tool’s output.
4. Extract and Reverse Engineer: Dump suspicious process memory sections for o line
reverse engineering using tools like x64dbg or IDA Pro.
By performing these steps, the L3 analyst uncovers hidden threats that conventional disk-based
antivirus solutions might miss. Findings from memory analysis inform subsequent containment
measures and guide the threat hunting process (for instance, searching for the same indicators
across other systems).
Hypothesis-Driven Hunts: Start with a well-defined hypothesis, e.g., “Threat actors are
using living-o -the-land binaries (LOLBins) for lateral movement.” The analyst then
queries logs and EDR solutions for suspicious use of tools like wmic.exe or rundll32.exe.
Custom Scripts: Write scripts in Python or PowerShell to query SIEM data, parse
system logs, or interrogate endpoints in bulk.
For references, the MITRE ATT&CK framework is widely used to categorize adversary techniques
and map them to detection strategies. Many SOCs adopt MITRE ATT&CK to structure their threat
hunting e orts and continuously improve coverage.
1. Static Analysis: Examine the file’s structure, strings, and metadata without executing it.
They look for clues like embedded URLs, suspicious API calls, and obfuscated code
segments.
P a g e 17 | 34
4. Indicators Extraction: Document the malware’s indicators (file paths, registry keys,
network callbacks) and share them with the rest of the SOC to improve detection
coverage.
These reverse engineering findings also inform long-term security strategies. For instance, if the
malware exploits a particular Windows service, the L3 team can work with infrastructure teams
to harden that service or apply custom access controls across the enterprise.
Training and Awareness: When an attack succeeds due to user error (e.g., enabling
macros in suspicious documents), L3 analysts might recommend more robust security
awareness training or stricter email filtering policies.
Additionally, L3 analysts often review escalations from L2 and decide whether the incident
demands threat hunting at scale, immediate IR (Incident Response) procedures, or policy
revisions. Their advanced perspective ensures the SOC remains agile and anticipates
sophisticated threats before they cause significant damage.
Real-World Example
Imagine an organization facing a targeted attack where an unknown threat actor deploys fileless
malware via PowerShell scripts. The L2 team escalates the case because typical endpoint
solutions fail to detect the malicious behavior. Here’s how an L3 analyst intervenes:
1. Collect Volatile Data: Capture memory from an a ected host and gather relevant
PowerShell logs.
2. Memory Analysis: Use Volatility to spot suspicious code running under the
powershell.exe process.
P a g e 18 | 34
3. Reverse Engineering: Extract the memory-resident script and analyze it in a sandbox to
pinpoint obfuscation and data exfiltration commands.
4. Threat Hunting: Search across the environment for similar PowerShell command
patterns or the same malicious script block.
6. Long-Term Strategy: Recommend additional EDR capabilities that can monitor script
usage in real time and block known malicious patterns.
This intervention not only resolves the immediate threat but also reduces the risk of future
fileless attacks, showcasing the importance of L3 expertise in advanced forensics and
overarching security strategy.
P a g e 19 | 34
3. Practical Scenario Examples
Chapter 3 delves into realistic incident scenarios that illustrate how SOC teams operate under
pressure, from the first moment an alert is triggered to the final stage of forensic analysis. The
theory behind L1, L2, and L3 roles can feel abstract until it is grounded in actual events that
demand swift action and collaboration. When facing phishing campaigns, ransomware attacks,
or insider threats, every analyst’s decision can significantly alter the outcome. This is why
scenario-driven training and documentation are invaluable: they bridge the gap between
textbook knowledge and day-to-day incident response.
In the sections that follow, you will see how each scenario unravels and how L1, L2, and L3
analysts coordinate their e orts. By observing concrete actions taken at every level, you can
better understand not only the technical steps—such as analyzing phishing emails,
quarantining malicious attachments, or performing forensic imaging—but also the strategic
thinking that underpins each move. Monitoring dashboards, SIEM alerts, and endpoint logs
might all point to suspicious activity, but it is the coordinated workflow across L1, L2, and L3
that ensures threats are identified, contained, and investigated properly.
The upcoming scenarios are designed to cover a wide range of common attack vectors:
Phishing Attack with Malware: Showcasing how a single malicious email can serve as
the gateway to data compromise and how deeper analysis can reveal hidden payloads.
Ransomware Outbreak: Illustrating the critical need for rapid containment and cross-
team communication when widespread encryption cripples an organization’s
infrastructure.
Practical examples are not just about replication of steps; they help cultivate the analytical
mindset needed to anticipate attacker behavior and adapt defensive strategies. Whether you
are new to the field or already have some experience, these real-life scenarios will demonstrate
how theoretical duties translate into hands-on procedures and decisions. By walking through
each case study, you will gain clarity on why L1 focuses on quick response and basic triage, how
L2 digs deeper for correlations and patterns, and how L3 brings advanced forensics and
strategic oversight to the table.
P a g e 20 | 34
enticing users to click a malicious link or open an infected attachment. Once a user interacts
with the email, malware can be silently installed, potentially allowing the attacker to pivot inside
the network. In this section, we examine how each Security Operations Center (SOC) tier—L1,
L2, and L3—plays a role in managing a phishing incident that includes malware delivery.
Monitoring Alerts and User Reports: L1 analysts keep an eye on SIEM dashboards,
spam filter alerts, and inbox tra ic patterns. They often serve as the first point of contact
when employees report suspicious emails.
Example in Practice:
An employee forwards an email with the subject line: “Urgent: Invoice Overdue!” to the
SOC’s mailbox.
The L1 analyst inspects the sender domain, noticing a slight misspelling (e.g., @myco-
accouts.com instead of @myco-accounts.com).
After a quick review, the L1 analyst checks the attachment’s hash against a threat
intelligence database (e.g., VirusTotal). If the file is flagged, the analyst immediately tags
the alert as High Priority and escalates.
(This is a simplified example; in many cases, this lookup happens automatically through SOC
tooling rather than a raw API call.)
P a g e 21 | 34
Coordinating with Incident Response Procedures: Based on the findings, L2 analysts
may trigger an o icial incident response playbook, working closely with IT teams to
isolate infected systems or block known malicious IP addresses at the firewall.
Detailed Steps:
The L2 analyst opens a sandbox environment (e.g., Cuckoo Sandbox) and uploads the
suspicious attachment.
The sandbox analysis reveals the file attempts to download an executable from a
malicious URL or modifies certain registry keys associated with persistence.
L2 searches the organization’s endpoint logs to see if any hosts have called out to the
same IP or domain. This correlation might uncover additional compromised machines.
After confirming these indicators, L2 updates the internal threat intelligence platform (e.g.,
MISP) with new IOCs—such as domains, IP addresses, file hashes—and coordinates any
immediate containment measures like blocking the domain at the proxy level.
1. Reverse Engineering and In-Depth Analysis: L3 analysts perform full static and
dynamic analysis on the malware sample, potentially deobfuscating code and
extracting embedded configuration details (e.g., C2 server addresses).
2. Threat Hunting Across the Enterprise: Using EDR (Endpoint Detection and Response)
tools or log analysis, L3 analysts search for traces of the same malware family or TTPs
(Tactics, Techniques, and Procedures) that might indicate a broader compromise.
P a g e 22 | 34
3. Identify encoded strings that reveal remote hosts or command-and-
control infrastructure.
4. Extract embedded resources to see if there are hidden modules or
secondary payloads.
This deeper analysis can help the SOC (and potentially law enforcement or other external
parties) attribute the campaign to a known threat actor. It also informs the security architecture
team about how to fine-tune detection signatures. For instance, L3 might create a custom Yara
rule to detect the unique strings or file characteristics of this malware:
rule Malware_Phishing_Sample {
meta:
description = "Detects malicious attachments commonly used
in phishing"
author = "L3 SOC Analyst"
strings:
$a = "InternetOpenUrlA" nocase
$b = "CreateProcessA" nocase
$c = { 68 ?? ?? ?? ?? 8B ?? 55 ?? }
condition:
all of them
}
L3 analysts pivot on newly discovered IOCs (domains, IP addresses, file hashes) across
the enterprise environment using SIEM queries.
Patterns found during hunting (e.g., consistent registry modifications) might indicate
advanced persistent threats or multiple infection attempts, leading to further
investigation.
P a g e 23 | 34
Role Key Tasks Tools & Methods
Conduct deep file and behavioral analysis, Sandbox environments, EDR, threat
L2
correlate IOCs intelligence feeds
Though each level has distinct responsibilities, seamless communication and well-defined
processes ensure rapid detection, thorough analysis, and e ective remediation. In more
sophisticated phishing campaigns—especially those using advanced social engineering and
zero-day exploits—this multi-tiered approach is crucial for minimizing damage and preventing
future attacks.
Alert Monitoring: The first clue might be a sudden spike in file I/O operations or security
software notifications highlighting file modifications. Some next-generation antivirus
(NGAV) solutions, such as Microsoft Defender or CrowdStrike, can flag anomalous
activity when large numbers of files are encrypted in quick succession.
Basic Triage: L1 analysts confirm whether these alerts are genuine. They look for
patterns like unknown processes (e.g., encrypt.exe) or suspicious command-line
executions that rename or delete file backups (for instance, using vssadmin commands
to remove Volume Shadow Copies).
This command deletes all Volume Shadow Copies, a known tactic used by many ransomware
variants to prevent easy file recovery.
Gathering Initial Context: L1 analysts review the user reports or any help desk tickets
that come in with descriptions of locked files or pop-up ransom notes. They also verify
which endpoints are a ected and check whether multiple users are reporting similar
symptoms.
Escalation Criteria
P a g e 24 | 34
Detection of known ransomware signatures in antivirus or EDR tools.
Once L1 sees a pattern indicating a large-scale encryption event rather than a false positive,
they escalate to L2.
Log Correlation: L2 analysts collect logs from various sources—endpoint detection and
response (EDR) platforms, firewalls, file servers—and correlate timestamps to pinpoint
when the malicious activity started. They often use a SIEM (Security Information and
Event Management) solution like Splunk, IBM QRadar, or the Elastic Stack to perform
queries such as:
index=endpoint sourcetype=edr process="*encrypt*" OR
process="*ransom*"
These queries help identify how many hosts have run suspicious processes.
Containment Measures: L2 usually takes steps to limit the damage. This can include:
Communication and Coordination: L2 often leads the internal incident response team,
scheduling priority calls or coordinating chat channels where IT teams, management,
and security sta can collaborate. They compile findings to ensure everyone
understands the nature and severity of the outbreak.
Entry Point Identification: By looking at system event logs, L2 might discover that the
ransomware was introduced via a phishing email that tricked a user into enabling
macros in a malicious spreadsheet. Alternatively, an unpatched server could have been
exploited as an initial foothold.
Malware Reverse Engineering: L3 analysts often deconstruct the malicious file using
tools like REMnux or IDA Pro to see how the ransomware executes, what persistence
P a g e 25 | 34
methods it might employ, and whether it has worm-like capabilities. This helps in
creating specific detection rules (e.g., YARA rules) for future prevention.
Root Cause Analysis: While L2 might have contained the immediate spread, L3 focuses
on how the attackers entered the environment in the first place. If an unpatched RDP
server was compromised, L3 will recommend disabling direct RDP access or enforcing
multi-factor authentication (MFA).
o Gaps in Security Controls: Identify which controls failed or were absent (e.g.,
missing patches, weak email filtering, insu icient network segmentation).
Strategic Recommendations: This may include segmenting critical servers from the
rest of the corporate network, enforcing least privilege, and testing the organization’s
disaster recovery plan more frequently. Sometimes, L3 also leads the development of
custom scripts or processes to automate detection and containment of similar threats
in the future.
Coordinates mass
Isolation and Assists in isolating Advises on enterprise-wide
isolation e orts across
Containment single endpoints quarantine protocols
infrastructure
P a g e 26 | 34
Activity L1 L2 L3
By understanding how each SOC tier responds during a ransomware outbreak, teams can
orchestrate a swift containment and limit the disruption to business operations. Each level
plays a complementary role: L1 quickly identifies and escalates, L2 thoroughly investigates and
coordinates, and L3 ensures a comprehensive eradication plan and strengthened policies to
guard against future attacks.
Typical Tasks
1. Alert Verification: L1 analysts receive alerts from automated systems that flag out-of-
norm user actions. For example, a data loss prevention (DLP) system might generate an
alert if sensitive files are attached to personal email accounts.
Example in Practice
An L1 analyst notices an unusually large file transfer via a secure file transfer protocol (SFTP)
going to an external IP address. The security platform’s user behavior analytics (UBA) module
raises an alert due to the volume of data sent. The analyst quickly reviews the user’s recent login
history and sees multiple late-night sessions. This anomaly is outside the employee’s normal
P a g e 27 | 34
work hours and job function, so the analyst escalates the alert with screenshots from the
monitoring console and relevant log entries.
This query could help identify a user generating an unusual number of login events or
permission changes within a short timeframe.
DLP Solutions: McAfee DLP, Forcepoint DLP, or Symantec DLP for policy-based alerts
regarding sensitive data movement.
Key Activities
1. Contextual Analysis: L2 analysts combine endpoint logs, network tra ic, and identity
management alerts to reconstruct the user’s actions and timeline. They look for
sequences of events—such as privilege escalation followed by data exfiltration.
2. Deep Dive into Access Controls: Investigations often involve checking Active Directory
(AD) logs or cloud IAM (Identity and Access Management) reports to see if the user’s
role-based access was changed or abused.
3. Collaboration with HR and Legal: In the case of a serious insider threat, L2 may
coordinate with human resources and legal teams to gather background information on
the user’s role, performance issues, or any history of policy violations.
Real-Life Example
A L2 analyst investigates an engineer who accessed a Git repository containing proprietary code
outside normal business hours. By correlating firewall logs, the analyst notices connections to
the repository from a personal VPN service. Cross-referencing HR data reveals the engineer has
recently accepted a position at a competitor. This pattern indicates possible data exfiltration,
prompting a deeper investigation and swift escalation to L3.
Useful Tools
SIEM Correlation Rules: Correlate suspicious AD logins with file share access logs and
identity management alerts.
P a g e 28 | 34
PowerShell for Windows Event Log Review:
Get-WinEvent -LogName Security |
Where-Object { $_.Id -eq 4624 -and $_.Properties[5].Value -
eq "Domain Admins" }
This helps identify logins tied to privileged groups like Domain Admins.
Critical Responsibilities
1. In-Depth Digital Forensics: L3 analysts collect and analyze disk images, memory
dumps, and network packet captures. For instance, they might use tools like EnCase or
Autopsy to identify hidden files, track data transfers, and uncover attempts to delete or
obfuscate activity.
2. Threat Hunting: Using Indicators of Compromise (IoCs) derived from the forensic
investigation, L3 analysts proactively search across the enterprise environment to
uncover additional systems or accounts that may be compromised by the same insider
or associated threat actor.
Practical Example
A manufacturing company discovers that a senior engineer downloaded a large number of
proprietary design documents. L3 analysts perform a forensic image of the engineer’s
workstation, retrieve deleted files, and confirm the use of encrypted external media. They also
review the network tra ic logs for suspicious outbound connections. With these findings, the
SOC team updates policies by limiting access to design documents, enforcing geoblocking, and
requiring encryption keys to be stored in a secure vault.
P a g e 29 | 34
Role Typical Actions Tools/Techniques Outcome
- Correlate multiple
- SIEM correlation
data sources
rules
- Investigate privileged Deep dive investigations to confirm an
L2 - AD reports
misuse insider threat and gather evidence
- Incident tracking
- Collaborate with
platforms
HR/Legal
- Perform full
- Forensic imaging
forensics
tools
- Update policies Thorough root-cause analysis; strategic
L3 - Threat hunting
- Implement changes to prevent similar incidents
frameworks
advanced threat
- Policy revision
hunting
Insider threats often demand collaboration across multiple departments, not just di erent SOC
tiers. By combining L1’s vigilant monitoring, L2’s investigative rigor, and L3’s deep forensics and
strategic oversight, organizations stand a better chance of uncovering and mitigating insider
risks before they escalate into major incidents.
P a g e 30 | 34
4. Conclusion
4.1 Summary of Role Interdependence
In a well-structured SOC, the L1, L2, and L3 roles function like interlocking gears. Each level
depends on the accuracy, thoroughness, and timeliness of the others. When an L1 analyst flags
suspicious indicators—perhaps a repetitive login failure or an unusual process spawning on
multiple endpoints—L2 picks up the initial triage data and builds a more in-depth picture. This
deeper analysis often involves correlating information from SIEM tools, threat intelligence
feeds, and even raw network captures. L2 must trust that L1’s preliminary checks are solid,
because any gap or oversight at the first level can undermine more complex incident
investigations.
Once a case escalates to L3, the potential scope grows larger. L3 teams operate at a level of
advanced forensic analysis and threat hunting that can be decisive in understanding not just the
immediate compromise, but also the adversary’s motivations and potential pivot techniques.
For example, during a ransomware outbreak, if L2 analysts identify indicators of compromise
(IoCs) and notice that the threat spreads through a Windows service vulnerability, the L3 team
might replicate the scenario in a controlled environment. They could run detailed memory
forensics using tools like Volatility or Rekall, dissect malicious binaries with Ghidra, and trace
lateral movement patterns. This advanced insight then feeds back into L2’s standard operating
procedures and L1’s alert logic, creating a continuous feedback loop of improvement.
In practice, the synergy among these levels ensures that even if an adversary tries to bypass
standard controls, each line of defense has the awareness and capability to catch the threat at
some point along the kill chain.
P a g e 31 | 34
Collaboration within and across levels is the backbone of a resilient SOC. Regular tabletop
exercises and cross-functional drills bring everyone onto the same page, showing how L1’s
alerting, L2’s correlation e orts, and L3’s investigative deep dives converge to form a cohesive
defense. One illustrative example is a quarterly “purple team” exercise, where a red team
simulates an attack and the blue team—comprising L1, L2, and L3—must detect, respond, and
report in real time. This not only hones technical abilities but also fosters clear communication
channels and an atmosphere of trust.
1. L1 Focus
o Expected Outcome: Faster response times and higher accuracy in initial triage.
2. L2 Focus
3. L3 Focus
As these examples show, continuous learning and structured collaboration translate directly
into stronger security postures. By sharing experiences and refining processes, each level not
only improves its own e icacy but also bolsters the capabilities of the entire team. This
comprehensive approach ensures that when new threats emerge, the SOC is ready to respond
collectively, minimizing damage and shortening recovery time.
P a g e 32 | 34
Bibliography
NIST Special Publication 800-61: Computer Security Incident Handling Guide -
https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final
MITRE ATT&CK Framework - https://attack.mitre.org
CISA Ransomware Guidance - https://www.cisa.gov/stopransomware
ISO/IEC 27001: Information Security Management Systems -
https://www.iso.org/standard/54534.html
Cyber Kill Chain (Lockheed Martin) - https://www.lockheedmartin.com/en-
us/capabilities/cyber/cyber-kill-chain.html
Splunk Documentation - https://docs.splunk.com
Elastic Stack Documentation (Elasticsearch, Kibana) - https://www.elastic.co/guide
IBM QRadar Documentation - https://www.ibm.com/docs/en/qradar
CrowdStrike Falcon Platform Documentation - https://www.crowdstrike.com
Microsoft Defender for Endpoint Documentation - https://learn.microsoft.com/en-
us/microsoft-365/security/defender-endpoint
Cuckoo Sandbox Documentation - https://cuckoosandbox.org
Volatility Framework Documentation - https://volatilityfoundation.org
Ghidra Reverse Engineering Tool - https://ghidra-sre.org
Wireshark O icial Site - https://www.wireshark.org
Zeek (formerly Bro) Network Security Monitor - https://zeek.org
YARA Rules Framework - https://virustotal.github.io/yara/
VirusTotal - https://www.virustotal.com
AbuseIPDB: IP Threat Intelligence - https://www.abuseipdb.com
MISP Threat Intelligence Platform - https://www.misp-project.org
AlienVault Open Threat Exchange (OTX) - https://otx.alienvault.com
FireEye Threat Research - https://www.fireeye.com/current-threats.html
SANS Digital Forensics and Incident Response - https://www.sans.org/digital-forensics-
incident-response
Microsoft Cybersecurity Reference Architectures -
https://aka.ms/cybersecurityreferencearchitectures
NCSC Incident Response and Management Guidelines -
https://www.ncsc.gov.uk/collection/incident-management
REMnux Linux Toolkit for Malware Analysis - https://remnux.org
IDA Pro Disassembler - https://hex-rays.com/ida-pro/
x64dbg Debugger - https://x64dbg.com
Magnet Forensics Tools - https://www.magnetforensics.com
Autopsy Digital Forensics - https://www.sleuthkit.org/autopsy
Rekall Memory Forensics - https://github.com/google/rekall
NIST Cybersecurity Framework - https://www.nist.gov/cyberframework
OWASP Top Ten Security Risks - https://owasp.org/www-project-top-ten
CIS Controls and Benchmarks - https://www.cisecurity.org/controls
PhishMe (Cofense) Anti-Phishing Training - https://cofense.com/phishme
KnowBe4 Security Awareness Training - https://www.knowbe4.com
GIAC Certified Incident Handler (GCIH) - https://www.giac.org/certifications/incident-
handler-gcih/
Certified Information Systems Security Professional (CISSP) -
https://www.isc2.org/certifications/CISSP
P a g e 33 | 34
GIAC Reverse Engineering Malware (GREM) -
https://www.giac.org/certifications/reverse-engineering-malware-grem/
Insider Threat Program Best Practices (CERT) -
https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=636261
Data Loss Prevention Guidelines (DLP) - https://www.forcepoint.com/data-loss-
prevention
McAfee DLP Resources - https://www.mcafee.com/enterprise/en-us/solutions/data-
loss-prevention.html
Purple Team Exercises (Attack/Defend) - https://www.redcanary.com/blog/purple-team-
exercises/
Living-o -the-Land Binaries (LOLBins) - https://lolbas-project.github.io
Cyber Threat Hunting Playbooks (CrowdStrike) -
https://www.crowdstrike.com/resources/threat-hunting-playbook/
P a g e 34 | 34