The triage process defines how SOC teams handle alerts as they move from first-level analysis to deep investigation and threat containment.
It ensures every alert is handled efficiently, escalated properly, and investigated with increasing technical depth.
A well-structured triage process prevents alert fatigue, reduces false positives, and ensures true incidents are escalated quickly.
This chapter explains each triage level in full-scale SOC depth, covering responsibilities, workflows, tools, escalation criteria, and real investigation examples.
Overview of SOC Triage Levels
Triage is divided into three levels:
-
L1 (Initial Triage / Monitoring) → quick validation
-
L2 (Advanced Analysis / Investigation) → deep log analysis
-
L3 (Threat Hunting / IR / Expert Analysis) → root-cause + complete remediation
Each level has different access, responsibilities, and technical requirements.
L1 Triage (Alert Monitoring & First Validation)
L1 analysts are the first responders in the SOC.
Their job is to validate alerts quickly, filter false positives, and escalate only meaningful threats.
Primary Responsibilities
-
Monitor SIEM alerts in real time
-
Validate whether an alert is true or false
-
Gather initial context
-
Check if the user or host is legitimate
-
Review basic logs (authentication, proxy, EDR summaries)
-
Open tickets and escalate when needed
-
Follow pre-built playbooks
L1 does not perform deep investigations — they confirm whether something requires investigation.
What L1 Checks
1. Alert accuracy
Check if the detection triggered on something benign.
Example:
PowerShell alert triggered by IT admin → false positive
2. Basic log context
-
Failed vs successful logins
-
Known admin activity
-
Expected scripts
-
User behavior baseline
3. Reputation checks
-
Domain reputation
-
IP reputation
-
Hash reputation
4. User verification
Confirm if activity is:
-
Expected
-
Approved
-
Part of routine operations
5. Determine escalation need
If anything looks suspicious → escalate to L2.
L1 Escalation Criteria
L1 MUST escalate when:
-
Malware execution found
-
Outbound C2 traffic observed
-
Multiple failed → successful login attempts
-
Unknown PowerShell execution
-
DNS tunneling indicators
-
Lateral movement footprints
-
Unauthorized admin activity
-
Any alert involving critical systems
If unclear → escalate.
L2 Triage (Deep Investigation & Analysis)
L2 analysts are investigators responsible for performing detailed analysis using all available logs and tools.
Once L1 escalates, L2 performs full root-cause analysis and determines whether an incident exists.
Primary Responsibilities
-
Deep log analysis across all sources
-
Build full attack timeline
-
Confirm compromise
-
Identify root cause
-
Evaluate attacker movement (lateral movement, privilege escalation)
-
Check for persistence
-
Verify scope of breach
-
Recommend containment actions
-
Communicate with L3/IR if needed
L2 owns the investigation and determines what exactly happened.
What L2 Analyzes
L2 checks logs such as:
-
Windows Security logs
-
Sysmon
-
PowerShell logs
-
Linux auth logs
-
Cron/service logs
-
Firewall events
-
IDS/IPS alerts
-
Proxy and DNS logs
-
EDR telemetry
-
Cloud logs (AWS/Azure/GCP)
L2 Workflow (Full SOC Example)
-
Start with the L1 alert
Example: encoded PowerShell execution. -
Check surrounding logs
Sysmon:WINWORD.exe → powershell.exe -
Check DNS logs
beacon.randomdomain.biz -
Check firewall logs
outbound 443 → 91.22.113.10 -
Check persistence
HKCU\Run\Updater = C:\Users\Public\bd.exe -
Check lateral movement
4624 LogonType 3 from infected host -
Determine if full incident
If malware executed + C2 → incident confirmed. -
Recommend immediate containment
-
Isolate endpoint
-
Disable account
-
Block malicious domain/IP
-
L2 creates the full analytical story.
L3 Triage (Expert Analysis, Threat Hunting, Incident Response)
L3 analysts are senior SOC members who perform:
-
Advanced IR
-
Malware analysis
-
Forensics
-
Threat hunting
-
Detection engineering
-
TTP mapping (MITRE ATT&CK)
-
Rule tuning
-
Architecture-level improvements
L3 focuses on eliminating root cause, improving defenses, and responding to complex intrusions.
Primary Responsibilities
-
Perform deep forensic analysis
-
Memory analysis for fileless malware
-
Malware reverse engineering
-
Analyze persistence mechanisms in detail
-
Investigate lateral movement paths
-
Map entire attack to ATT&CK
-
Develop new SIEM rules
-
Tune false positives
-
Lead containment and eradication
-
Handle major incidents (ransomware, APT attack)
L3 essentially “closes the loop” and ensures the SOC learns from each incident.
L3 Investigation Activities
1. Memory Forensics
Identify:
-
Injected threads
-
Suspicious DLLs
-
Reflective loading
2. Disk Forensics
Inspect:
-
Persistence entries
-
Dropped payloads
-
Hidden directories
-
Deleted file recovery
3. Network Forensics
-
PCAP review
-
Beacon pattern correlation
-
C2 protocol decoding
4. Threat Hunting
Look for:
-
Unseen attacker movement
-
Dormant implants
-
Unexplained anomalies
5. Detection Engineering
Build new detection rules based on the incident.
How Alerts Flow from L1 → L2 → L3
Example: Encoded PowerShell Alert
L1
Checks:
Is this normal admin activity?
Was the script legitimate?
Finds it suspicious → escalates.
L2
Finds:
-
PowerShell spawned by Office
-
Downloaded payload
-
C2 communication
-
Persistence
-
Lateral movement attempt
Confirms incident → escalates to L3.
L3
Finds:
-
Memory injection
-
DNS tunneling
-
Mapped to ATT&CK techniques
-
Creates new detection rules
-
Leads eradication and recovery
L3 resolves the full incident.
When to Escalate
L1 → L2
When activity is:
-
Suspicious
-
Unknown
-
Malicious
-
Outside playbook
-
Involves critical assets
L2 → L3
When activity requires:
-
Malware reversing
-
Memory forensics
-
Threat hunting
-
Root cause identification
-
High-risk containment
-
Detection tuning
Tools Used by Each Level
L1 Tools
-
SIEM dashboard
-
Ticketing platform
-
Threat intel portals
-
Basic endpoint tools
-
WHOIS/IP reputation tools
L2 Tools
-
Sysmon logs
-
Linux logs
-
Cloud logs
-
EDR dashboards
-
Proxy/DNS logs
-
Firewall/IDS
-
Timeline reconstruction tools
L3 Tools
-
Memory forensics (Volatility)
-
Disk forensics (Autopsy, FTK)
-
PCAP analysis (Wireshark)
-
Malware sandboxing
-
Detection engineering platforms
-
ATT&CK mapping tools
Intel Dump
-
L1 validates alerts, filters false positives, and escalates suspicious activity.
-
L2 performs deep log analysis, confirms compromise, identifies scope, and recommends containment.
-
L3 handles root cause, forensics, malware analysis, threat hunting, and detection engineering.
-
Triage moves from simple verification (L1) to full investigation (L2) to expert remediation (L3).
-
Each level uses different tools and has distinct responsibilities.
-
Proper triage flow prevents missed alerts, speeds detection, and reduces incident impact.