Skip to content
  • There are no suggestions because the search field is empty.

Identifying Your Role

Identifying Your RoleIdentifying Your Role

The roles listed here are the typical roles or functions of a Security Operations Center (SOC). Determine the role or roles that you perform in the SOC. You can use these functions as a guide to decide how to set up and navigate NetWitness so that you can efficiently perform your job tasks.

  • Column 1: netwitness_asocteam_96x142.png
  • Column 2: netwitness_socmgr_120x163.png
  • Column 3:

    netwitness_dpo_86x141.png


  • Column 1:
  • Column 2:
    • Manage SOC readiness
    • Respond to incidents
    • Respond to data breaches
  • Column 3:
    • Monitor and protect privacy
      and sensitive information

  • Column 1: netwitness_ir_105x123.png
  • Column 2: netwitness_hunt_86x122.png
  • Column 3: netwitness_conexp_105x115.png
  • Column 4: netwitness_sysadm_81x125.png

  • Column 1:
    • Respond to incidents
    • Remediate incidents
  • Column 2:
    • Hunt for threats

    • Conduct forensic analysis

    • Recommend issues for remediation

    • Remediate issues

  • Column 3:
    • Investigate new threat intelligence

    • Evaluate and create new feeds

    • Create correlation rules to flag indicators of compromise

  • Column 4:
    • Install and configure equipment and software

    • Manage user access

    • Monitor and fine tune performance

    • Backup and restore data

    • Manage storage and archives

    • Update software

    • Create reports for regulatory compliance