SIEM Basics & Log Analysis

SOC Analyst Core Skill Module

1. What is SIEM?

SIEM stands for Security Information and Event Management. It is a centralized system used in SOC to collect, analyze, and correlate security logs from multiple sources.

SIEM is the brain of a SOC.

2. Why SIEM is Required

3. What is a Log?

A log is a recorded event generated by a system, application, network device, or security tool.

Log Source Example Event
Firewall Blocked malicious IP
Server User login / logout
Application Failed authentication
Endpoint Malware detected

4. SIEM Architecture (Simplified)

5. Common SIEM Tools

Tool Usage
Splunk Log search, alerts, dashboards
IBM QRadar Real-time threat correlation
ArcSight Enterprise SIEM monitoring
Elastic (ELK) Open-source log analysis

6. What is Log Correlation?

Log correlation is the process of linking multiple events to identify a potential attack.

Example: Multiple failed logins + successful login + data download = Possible brute-force attack

7. Alerts vs Events

Event Alert
Any logged activity Suspicious or malicious activity
Informational Requires analyst attention

8. Role of SOC Analyst in SIEM

SOC Analysts must think logically, not panic.

9. Skills Required for SIEM & Log Analysis

10. Learning Path Ahead