Identifying Your Role
Identifying Your RoleIdentifying Your Role
The roles listed here are the typical roles or functions of a Security Operations Center (SOC). Determine the role or roles that you perform in the SOC. You can use these functions as a guide to decide how to set up and navigate NetWitness so that you can efficiently perform your job tasks.
- Column 1:

- Column 2:

- Column 3:
- Column 1:
- Column 2:
- Manage SOC readiness
- Respond to incidents
- Respond to data breaches
- Column 3:
- Monitor and protect privacy
and sensitive information
- Monitor and protect privacy
- Column 1:

- Column 2:

- Column 3:

- Column 4:

- Column 1:
- Respond to incidents
- Remediate incidents
- Column 2:
-
Hunt for threats
-
Conduct forensic analysis
-
Recommend issues for remediation
-
Remediate issues
-
- Column 3:
-
Investigate new threat intelligence
-
Evaluate and create new feeds
-
Create correlation rules to flag indicators of compromise
-
- Column 4:
-
Install and configure equipment and software
-
Manage user access
-
Monitor and fine tune performance
-
Backup and restore data
-
Manage storage and archives
-
Update software
-
Create reports for regulatory compliance
-