SlideShare a Scribd company logo
SECURITY
OPERATION
CENTER
Eng/ Ahmed Ayman Fahmy
Cyber Security Framework
What is SOC ?
SOC Team
SOC process
SOC Platform (Tools)
Skills needed in a SOC
Types of SOCs
2
3
Cyber
Security
Framework
Identify Protect Detect Respond Recover
(CONT.)
 Identify
Identify threats which needed to protect our enterprise.
Control who can access your business information.
Require individual user accounts for each employee.
Create policies and procedures.
 Protect
Install and activate security controls (Firewalls, IDS/IPS, ….).
Patch your operating systems and applications routinely.
Secure your wireless access point and networks.
Setup web and E-mail filters.
Use encryption for sensitive data.
Train employees for security awareness.
4
(CONT.)
 Detect
Install and update anti-virus, anti-spyware and other anti-malware programs.
Maintain and monitoring Logs.
 Respond
Develop a plan for disasters for information security incidents.
 Recovery
Make full pack up of important data and information.
5
SECURITY OPERATION
CENTER (SOC)
6
monitor, prevent, detect, investigate, and respond to cyber threats around the clock
 SOC Team
7
SOC Operation
Management
Leadership CISO
SOC manager
Tier 1
Analyst
Tier 2
Analyst
Tier 3
Analyst
Security
Engineer
SECURITY OPERATION
CENTER (SOC) (CONT.)
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Tier 1 Analyst (Alert Investigator) :
Monitor SIEM alerts.
Manages and configures security Monitoring Tools.
Alert priority.
Perform triage to confirm real security incident is taking place.
 Tier 2 Analyst (Incident responder):
Receives Incident and performs deep analysis.
Correlate with threat intelligence to identify threat actor.
Nature of the attack.
Data and systems affected.
Decide strategy for containment.
Remediation and recovery.
8
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Tier 3 Analyst (SME / Threat Hunters):
Vulnerability assessment.
Penetration testing.
Threat intelligence.
Threat Hunters who hunts threat which found their way into the network.
Unknown vulnerabilities and security gaps.
When major incident occurs join with Tier 2 analyst in responding and containing it.
9
Detect
Contain
Attack
Eradicate
Attack
Recover
SECURITY OPERATION
CENTER (SOC) (CONT.)
 Security Engineers (Platform Management):
Automated Tools.
Integration between security controls and SIEM.
 SOC manager:
Responsible for hiring and training SOC staff.
Manage resources. (Metrics)
Manage team when responding to critical security incident.
10
SECURITY OPERATION
CENTER (SOC) (CONT.)
 SOC process
Log source management
SIEM management
Use case management
Playbook management
Event management
Incident management
Vulnerability management
12
SOC PLATFORM (TOOLS)
 SIEM : Security Information and Event Management
 SOAR : Security Orchestration, Automation and Response
 VMDR : Vulnerability Management, Detection and response
 NDR : Network Detection and Response
 EDR : End-point Detection and response
 TIP : Threat Intelligence Platform
 OST : Offensive Security Tools
13
Tier 1 Analyst
2-3 years of professional experience.
Very good routing & switching knowledge.
Good system administration knowledge.
Understanding security system functions.
Knowledge of SIEM event management.
Certificates: CompTIA Cyber Security Analyst (CSA), SANS
GMON 14
TIER 2 SKILLS (INCIDENT
HANDLER)
 4-5 years of professional experience
 50% of the experience spent as Tier 1 analyst
 Very good routing & switching knowledge
 Very good Internetworking knowledge
 Very good system administration knowledge
 Good in End-point security knowledge
 Experience in operating Firewall, IDS, IPS,……
 Knowledge of SIEM event management and Use case writing
 Certificates SANA GCIH
15
TIER 3 SKILLS (THREAT
HUNTER)
 6-9 years of professional experience
 50% of the experience spent as Tier 2 analyst
 Very good programming knowledge
 Very good networking Knowledge
 Very good system administration knowledge
 Very good in End-point security knowledge
 Experience in digital Forensics
 Experience in using network traffic analysis, deception systems,
vulnerability assessment and exploitation tools
16
TIER 4 SKILLS
(ARCHITECT)
 10-12 years of professional experience
 50% of the experience spent as Tier 2 analyst
 Very good programming knowledge
 Very good networking Knowledge
 Very good system administration knowledge
 Very good in End-point security knowledge
 Experience in SIEM, SOAR, VMDR, EDR and NDR
 Experience in using network traffic analysis, deception systems, vulnerability
assessment and exploitation tools
 Certifications: CISSP Certified Information Systems Security Professional (ISC)2,
CISM Certified Information Security Manager ISACA.
17
18
Dedicated SOC
Classic SOC with dedicated full time staff, operated fully in house 24/7/365
operations.
Distributed SOC
Some full time staff and some part time, typically operates 8x5 in each
region
Multifunctional
SOC / NOC
Dedicated team which perform both functions of a network operation
center and a SOC
Fusion SOC
Traditional SOC combined with new functions such as threat intelligence,
operational technology
Command SOC /
Global SOC
Coordinates other SOCs in global enterprise provide threat intelligence,
situational awareness and guidance
Virtual SOC
No dedicated facility, part time members usually reactive and activated by
security incident
Managed SOC
Many organizations turned to MSSP Managed Security Service Providers
to provide SOC services on outsourced basis
Ad

More Related Content

What's hot (20)

When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
Komand
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
Steppa Cyber Security
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Siem ppt
Siem pptSiem ppt
Siem ppt
kmehul
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Security operation center
Security operation centerSecurity operation center
Security operation center
MuthuKumaran267
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
Virginia Fernandez
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
DNIF
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 
When and How to Set up a Security Operations Center
When and How to Set up a Security Operations CenterWhen and How to Set up a Security Operations Center
When and How to Set up a Security Operations Center
Komand
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
AlienVault
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
Priyanka Aash
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
From SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity ChasmFrom SIEM to SOC: Crossing the Cybersecurity Chasm
From SIEM to SOC: Crossing the Cybersecurity Chasm
Priyanka Aash
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
Ben Rothke
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
ReZa AdineH
 
Siem ppt
Siem pptSiem ppt
Siem ppt
kmehul
 
NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
Security operation center
Security operation centerSecurity operation center
Security operation center
MuthuKumaran267
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
CMR WORLD TECH
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
IBM Security
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
Shah Sheikh
 
Insight into SOAR
Insight into SOARInsight into SOAR
Insight into SOAR
DNIF
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
AlienVault
 
SIEM presentation final
SIEM presentation finalSIEM presentation final
SIEM presentation final
Rizwan S
 

Similar to Security operation center (SOC) (20)

Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
infosecTrain
 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdfUnlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
InfosecTrain Education
 
The Ultimate Security Operations Center Career Guide
The Ultimate Security Operations Center  Career GuideThe Ultimate Security Operations Center  Career Guide
The Ultimate Security Operations Center Career Guide
priyanshamadhwal2
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
infosec train
 
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
Mansi Kandari
 
Unlock Your Ultimate SOC Career Guide - Infosectrain
Unlock Your  Ultimate SOC Career Guide - InfosectrainUnlock Your  Ultimate SOC Career Guide - Infosectrain
Unlock Your Ultimate SOC Career Guide - Infosectrain
infosecTrain
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
Sanket Shikhar
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
TravarsaPrivateLimit
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
Olufemi37
 
CA_Module_2.pdf
CA_Module_2.pdfCA_Module_2.pdf
CA_Module_2.pdf
EhabRushdy1
 
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
dikshanfc
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
 
Different SOC Career Opportunities by InfosecTrain
Different SOC Career Opportunities by InfosecTrainDifferent SOC Career Opportunities by InfosecTrain
Different SOC Career Opportunities by InfosecTrain
priyanshamadhwal2
 
Exploring the SOC Career Pathway in 2025.pdf
Exploring the SOC Career Pathway in 2025.pdfExploring the SOC Career Pathway in 2025.pdf
Exploring the SOC Career Pathway in 2025.pdf
infosecTrain
 
Different SOC Career Opportunities 2025.pdf
Different SOC Career Opportunities 2025.pdfDifferent SOC Career Opportunities 2025.pdf
Different SOC Career Opportunities 2025.pdf
infosec train
 
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
Mansi Kandari
 
The Security Operations Centre Career Pathways in 2025
The Security Operations Centre Career Pathways in 2025The Security Operations Centre Career Pathways in 2025
The Security Operations Centre Career Pathways in 2025
InfosecTrain
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
tarunidhar
tarunidhartarunidhar
tarunidhar
tarunidhar chitirala
 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER GUIDE FOR BE...
infosecTrain
 
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdfUnlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
Unlock Your Future in Cybersecurity with the ULTIMATE SOC CAREER.pdf
InfosecTrain Education
 
The Ultimate Security Operations Center Career Guide
The Ultimate Security Operations Center  Career GuideThe Ultimate Security Operations Center  Career Guide
The Ultimate Security Operations Center Career Guide
priyanshamadhwal2
 
Best SOC Career Guide InfosecTrain .pdf
Best SOC Career Guide  InfosecTrain .pdfBest SOC Career Guide  InfosecTrain .pdf
Best SOC Career Guide InfosecTrain .pdf
infosec train
 
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
𝐔𝐥𝐭𝐢𝐦𝐚𝐭𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐆𝐮𝐢𝐝𝐞!
Mansi Kandari
 
Unlock Your Ultimate SOC Career Guide - Infosectrain
Unlock Your  Ultimate SOC Career Guide - InfosectrainUnlock Your  Ultimate SOC Career Guide - Infosectrain
Unlock Your Ultimate SOC Career Guide - Infosectrain
infosecTrain
 
Course overview Cybersecurity and its applications
Course overview Cybersecurity and its applicationsCourse overview Cybersecurity and its applications
Course overview Cybersecurity and its applications
Sanket Shikhar
 
CYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEETCYBER SECURITY CAREER GUIDE CHEAT SHEET
CYBER SECURITY CAREER GUIDE CHEAT SHEET
TravarsaPrivateLimit
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
Infocyte
 
endpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdfendpoint-detection-and-response-datasheet.pdf
endpoint-detection-and-response-datasheet.pdf
Olufemi37
 
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
NetForChoice SOC: Advanced Security Operations Center for 24/7 Protection"
dikshanfc
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
Dhishant Abrol
 
Different SOC Career Opportunities by InfosecTrain
Different SOC Career Opportunities by InfosecTrainDifferent SOC Career Opportunities by InfosecTrain
Different SOC Career Opportunities by InfosecTrain
priyanshamadhwal2
 
Exploring the SOC Career Pathway in 2025.pdf
Exploring the SOC Career Pathway in 2025.pdfExploring the SOC Career Pathway in 2025.pdf
Exploring the SOC Career Pathway in 2025.pdf
infosecTrain
 
Different SOC Career Opportunities 2025.pdf
Different SOC Career Opportunities 2025.pdfDifferent SOC Career Opportunities 2025.pdf
Different SOC Career Opportunities 2025.pdf
infosec train
 
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
𝐄𝐱𝐩𝐥𝐨𝐫𝐢𝐧𝐠 𝐭𝐡𝐞 𝐒𝐎𝐂 𝐂𝐚𝐫𝐞𝐞𝐫 𝐏𝐚𝐭𝐡𝐰𝐚𝐲 𝐢𝐧 𝟐𝟎𝟐𝟓: 𝐘𝐨𝐮𝐫 𝐂𝐲𝐛𝐞𝐫𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐉𝐨𝐮𝐫𝐧𝐞𝐲 𝐒𝐭𝐚𝐫𝐭𝐬 𝐇...
Mansi Kandari
 
The Security Operations Centre Career Pathways in 2025
The Security Operations Centre Career Pathways in 2025The Security Operations Centre Career Pathways in 2025
The Security Operations Centre Career Pathways in 2025
InfosecTrain
 
David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016David Patterson IT Security Resumes 2016
David Patterson IT Security Resumes 2016
David Patterson
 
Ad

More from Ahmed Ayman (10)

Absorption losses of ultra thin crystalline silicon solar cells
Absorption losses of ultra thin crystalline silicon solar cellsAbsorption losses of ultra thin crystalline silicon solar cells
Absorption losses of ultra thin crystalline silicon solar cells
Ahmed Ayman
 
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
Ahmed Ayman
 
Printed electronics for system application
Printed electronics for system applicationPrinted electronics for system application
Printed electronics for system application
Ahmed Ayman
 
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
Analysis and Implementation of Encapsulation Schemes  for Baseband Frame of D...Analysis and Implementation of Encapsulation Schemes  for Baseband Frame of D...
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
Ahmed Ayman
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
Ahmed Ayman
 
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Ahmed Ayman
 
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
UPLINK, DOWNLINK ANDOVERALL LINK PERFORMANCE INTER-SATELLITE LINKSUPLINK, DOWNLINK ANDOVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
Ahmed Ayman
 
Satellite Communication
Satellite CommunicationSatellite Communication
Satellite Communication
Ahmed Ayman
 
Crowdsensing
CrowdsensingCrowdsensing
Crowdsensing
Ahmed Ayman
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
Ahmed Ayman
 
Absorption losses of ultra thin crystalline silicon solar cells
Absorption losses of ultra thin crystalline silicon solar cellsAbsorption losses of ultra thin crystalline silicon solar cells
Absorption losses of ultra thin crystalline silicon solar cells
Ahmed Ayman
 
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
High-Performance Low-Energy Implementation of Cryptographic Algorithms on a P...
Ahmed Ayman
 
Printed electronics for system application
Printed electronics for system applicationPrinted electronics for system application
Printed electronics for system application
Ahmed Ayman
 
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
Analysis and Implementation of Encapsulation Schemes  for Baseband Frame of D...Analysis and Implementation of Encapsulation Schemes  for Baseband Frame of D...
Analysis and Implementation of Encapsulation Schemes for Baseband Frame of D...
Ahmed Ayman
 
Voice over IP (VOIP)
Voice over IP (VOIP)Voice over IP (VOIP)
Voice over IP (VOIP)
Ahmed Ayman
 
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Joint MFCC-and-Vector Quantization based Text-Independent Speaker Recognition...
Ahmed Ayman
 
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
UPLINK, DOWNLINK ANDOVERALL LINK PERFORMANCE INTER-SATELLITE LINKSUPLINK, DOWNLINK ANDOVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
UPLINK, DOWNLINK AND OVERALL LINK PERFORMANCE INTER-SATELLITE LINKS
Ahmed Ayman
 
Satellite Communication
Satellite CommunicationSatellite Communication
Satellite Communication
Ahmed Ayman
 
Software Defined Network (SDN)
Software Defined Network (SDN)Software Defined Network (SDN)
Software Defined Network (SDN)
Ahmed Ayman
 
Ad

Recently uploaded (20)

"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
Salesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docxSalesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docx
José Enrique López Rivera
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Learn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step GuideLearn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step Guide
Marcel David
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko"Rebranding for Growth", Anna Velykoivanenko
"Rebranding for Growth", Anna Velykoivanenko
Fwdays
 
Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)Into The Box Conference Keynote Day 1 (ITB2025)
Into The Box Conference Keynote Day 1 (ITB2025)
Ortus Solutions, Corp
 
Big Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur MorganBig Data Analytics Quick Research Guide by Arthur Morgan
Big Data Analytics Quick Research Guide by Arthur Morgan
Arthur Morgan
 
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
AI EngineHost Review: Revolutionary USA Datacenter-Based Hosting with NVIDIA ...
SOFTTECHHUB
 
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdfThe Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
The Evolution of Meme Coins A New Era for Digital Currency ppt.pdf
Abi john
 
Role of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered ManufacturingRole of Data Annotation Services in AI-Powered Manufacturing
Role of Data Annotation Services in AI-Powered Manufacturing
Andrew Leo
 
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical DebtBuckeye Dreamin 2024: Assessing and Resolving Technical Debt
Buckeye Dreamin 2024: Assessing and Resolving Technical Debt
Lynda Kane
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5..."Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
"Client Partnership — the Path to Exponential Growth for Companies Sized 50-5...
Fwdays
 
Salesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docxSalesforce AI Associate 2 of 2 Certification.docx
Salesforce AI Associate 2 of 2 Certification.docx
José Enrique López Rivera
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptxDevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
DevOpsDays Atlanta 2025 - Building 10x Development Organizations.pptx
Justin Reock
 
Learn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step GuideLearn the Basics of Agile Development: Your Step-by-Step Guide
Learn the Basics of Agile Development: Your Step-by-Step Guide
Marcel David
 
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptxSpecial Meetup Edition - TDX Bengaluru Meetup #52.pptx
Special Meetup Edition - TDX Bengaluru Meetup #52.pptx
shyamraj55
 
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath MaestroDev Dives: Automate and orchestrate your processes with UiPath Maestro
Dev Dives: Automate and orchestrate your processes with UiPath Maestro
UiPathCommunity
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc Webinar: Consumer Expectations vs Corporate Realities on Data Broker...
TrustArc
 
Electronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploitElectronic_Mail_Attacks-1-35.pdf by xploit
Electronic_Mail_Attacks-1-35.pdf by xploit
niftliyevhuseyn
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 

Security operation center (SOC)

  • 2. Cyber Security Framework What is SOC ? SOC Team SOC process SOC Platform (Tools) Skills needed in a SOC Types of SOCs 2
  • 4. (CONT.)  Identify Identify threats which needed to protect our enterprise. Control who can access your business information. Require individual user accounts for each employee. Create policies and procedures.  Protect Install and activate security controls (Firewalls, IDS/IPS, ….). Patch your operating systems and applications routinely. Secure your wireless access point and networks. Setup web and E-mail filters. Use encryption for sensitive data. Train employees for security awareness. 4
  • 5. (CONT.)  Detect Install and update anti-virus, anti-spyware and other anti-malware programs. Maintain and monitoring Logs.  Respond Develop a plan for disasters for information security incidents.  Recovery Make full pack up of important data and information. 5
  • 6. SECURITY OPERATION CENTER (SOC) 6 monitor, prevent, detect, investigate, and respond to cyber threats around the clock
  • 7.  SOC Team 7 SOC Operation Management Leadership CISO SOC manager Tier 1 Analyst Tier 2 Analyst Tier 3 Analyst Security Engineer SECURITY OPERATION CENTER (SOC) (CONT.)
  • 8. SECURITY OPERATION CENTER (SOC) (CONT.)  Tier 1 Analyst (Alert Investigator) : Monitor SIEM alerts. Manages and configures security Monitoring Tools. Alert priority. Perform triage to confirm real security incident is taking place.  Tier 2 Analyst (Incident responder): Receives Incident and performs deep analysis. Correlate with threat intelligence to identify threat actor. Nature of the attack. Data and systems affected. Decide strategy for containment. Remediation and recovery. 8
  • 9. SECURITY OPERATION CENTER (SOC) (CONT.)  Tier 3 Analyst (SME / Threat Hunters): Vulnerability assessment. Penetration testing. Threat intelligence. Threat Hunters who hunts threat which found their way into the network. Unknown vulnerabilities and security gaps. When major incident occurs join with Tier 2 analyst in responding and containing it. 9 Detect Contain Attack Eradicate Attack Recover
  • 10. SECURITY OPERATION CENTER (SOC) (CONT.)  Security Engineers (Platform Management): Automated Tools. Integration between security controls and SIEM.  SOC manager: Responsible for hiring and training SOC staff. Manage resources. (Metrics) Manage team when responding to critical security incident. 10
  • 11. SECURITY OPERATION CENTER (SOC) (CONT.)  SOC process Log source management SIEM management Use case management Playbook management Event management Incident management Vulnerability management 12
  • 12. SOC PLATFORM (TOOLS)  SIEM : Security Information and Event Management  SOAR : Security Orchestration, Automation and Response  VMDR : Vulnerability Management, Detection and response  NDR : Network Detection and Response  EDR : End-point Detection and response  TIP : Threat Intelligence Platform  OST : Offensive Security Tools 13
  • 13. Tier 1 Analyst 2-3 years of professional experience. Very good routing & switching knowledge. Good system administration knowledge. Understanding security system functions. Knowledge of SIEM event management. Certificates: CompTIA Cyber Security Analyst (CSA), SANS GMON 14
  • 14. TIER 2 SKILLS (INCIDENT HANDLER)  4-5 years of professional experience  50% of the experience spent as Tier 1 analyst  Very good routing & switching knowledge  Very good Internetworking knowledge  Very good system administration knowledge  Good in End-point security knowledge  Experience in operating Firewall, IDS, IPS,……  Knowledge of SIEM event management and Use case writing  Certificates SANA GCIH 15
  • 15. TIER 3 SKILLS (THREAT HUNTER)  6-9 years of professional experience  50% of the experience spent as Tier 2 analyst  Very good programming knowledge  Very good networking Knowledge  Very good system administration knowledge  Very good in End-point security knowledge  Experience in digital Forensics  Experience in using network traffic analysis, deception systems, vulnerability assessment and exploitation tools 16
  • 16. TIER 4 SKILLS (ARCHITECT)  10-12 years of professional experience  50% of the experience spent as Tier 2 analyst  Very good programming knowledge  Very good networking Knowledge  Very good system administration knowledge  Very good in End-point security knowledge  Experience in SIEM, SOAR, VMDR, EDR and NDR  Experience in using network traffic analysis, deception systems, vulnerability assessment and exploitation tools  Certifications: CISSP Certified Information Systems Security Professional (ISC)2, CISM Certified Information Security Manager ISACA. 17
  • 17. 18 Dedicated SOC Classic SOC with dedicated full time staff, operated fully in house 24/7/365 operations. Distributed SOC Some full time staff and some part time, typically operates 8x5 in each region Multifunctional SOC / NOC Dedicated team which perform both functions of a network operation center and a SOC Fusion SOC Traditional SOC combined with new functions such as threat intelligence, operational technology Command SOC / Global SOC Coordinates other SOCs in global enterprise provide threat intelligence, situational awareness and guidance Virtual SOC No dedicated facility, part time members usually reactive and activated by security incident Managed SOC Many organizations turned to MSSP Managed Security Service Providers to provide SOC services on outsourced basis