SOC Analyst / Threat Hunter
SOC Analysts and Threat Hunters monitor security telemetry, investigate alerts, and communicate findings to technical and non-technical audiences. Their English work includes writing escalation reports, documenting investigation timelines, producing threat intelligence summaries, and communicating incident impact to management. This path builds the language of proactive and reactive security operations.
Topics covered
- Alert triage & investigation
- Threat hunting
- MITRE ATT&CK
- SIEM & SOAR operations
- Threat intelligence
- Incident escalation
Vocabulary spotlight
4 terms every SOC Analyst / Threat Hunter should know in English:
Evidence that a system has been breached: a malicious IP, hash, domain, or behavioural pattern observed after the fact
"The threat actor's C2 server IPs were added to our IOC blocklist within 30 minutes of identification."
A proactive security practice of searching through systems for adversary activity that has evaded automated detection
"During threat hunting, the analyst found lateral movement that SIEM rules had not triggered on."
A knowledge base of adversary tactics, techniques, and procedures (TTPs) used as a framework for describing and categorising attack behaviour
"The intrusion mapped to T1566.001 (Spearphishing Attachment) in the MITRE ATT&CK framework."
An alert that fires for benign activity that resembles malicious behaviour — the alert is technically correct but the activity is not a real threat
"After tuning the rule, we reduced false positives from 200/day to under 10."
📚 Vocabulary Reference
Key terms organised by category for SOC Analyst / Threat Hunters:
Detection & Alerting
Threat Intelligence
Investigation
Communication
Recommended exercises
Real-world scenarios you'll practise
- Writing an escalation report for a suspected credential stuffing attack — factual, investigation-led
- Summarising a threat hunting finding for the CISO: TTP mapping, affected systems, confidence level
- Explaining the difference between a false positive and a true positive to a junior analyst
- Writing a post-incident IOC report that external partners can use for threat sharing