Professional Services
SOC Prime Platform Setup & Fine-Tuning MITRE ATT&CK® Audit Log Source Audit SIEM Health Check Audit Threat Hunting Training Log Source Integration Hyperdrive: Custom Content Development
SOC Prime Platform Setup & Fine-Tuning
Our experts analyze your organization's threat profile and current cybersecurity environment to ensure a seamless SOC Prime Platform configuration tailored to your business needs and our best practices.
Request
What’s Included
Search Profiles
Custom Field Mapping
Log Source Coverage
MITRE ATT&CK® Coverage
Continuous Content Management / Outpost Module Setup
MITRE ATT&CK® Audit
SOC Prime Team of experts takes a data source-centric approach to delivering the MITRE ATT&CK visibility audit. This service provides a thorough review of the availability and usability of your data sources, including Firewall, operating system, and anti-virus logs. This audit is offered as a one-time service or quarterly for a year.
Request
What’s Included
Environment exploration
Visibility assessment
Detection capability assessment
Collection & review - detections/queries/SIEM content
Report - recommendations & guidance
Platform Support
Google SecOps
Microsoft Sentinel
Sumo Logic
QRadar
Elastic Stack
Splunk
ArcSight
Log Source Audit
The Log Source Audit provides an overview of SIEM, EDR & XDR visibility as it aligns with the MITRE ATT&CK tactics and techniques along with recommendations and insights for improving your organization’s cybersecurity posture. This audit is offered as a one-time service or quarterly for a year.
Request
What’s Included
General visibility of MITRE ATT&CK
Availability and usability of data sources
Platform Support
Google SecOps
Microsoft Sentinel
Sumo Logic
QRadar
Elastic Stack
Splunk
ArcSight
SIEM Health Check Audit
Our experts examine your SIEM for performance and reliability issues, assessing the architecture, services, hardware, and detection content together with log sources and their parsing. The SIEM Health Check Audit includes two phases:
  • Pre-assessment and info collection. During this phase, SOC Prime collects information about SIEM installation, including the data related to the following assets:
    • Performance issues description
    • SIEM architecture
    • Hardware
    • SIEM Components
    • Data Flows
  • Audit phase. During this phase, SOC Prime analyzes all collected information to identify possible causes of performance issues and assesses the following assets:
    • General SIEM architecture. Identifying possible bottlenecks related to architecture.
    • Hardware. Analysis of the hardware setup and utilization.
    • SIEM services. Analysis of SIEM services and identifying possible issues.
    • SIEM-native content. Analyzing the SIEM-native content (e.g., log sources, collection layer, configurations, custom parsers, rules, etc.) and identifying issues that may affect performance.
This audit is offered as a one-time service or quarterly for a year.
Request
What’s Included
SIEM components
Log source volume and collection
Parsing
SIEM content & analytics
SIEM productivity
Fine-tuning (available by request)
Platform Support
Google SecOps
Microsoft Sentinel
QRadar
Elastic Stack
Splunk
ArcSight
Threat Hunting Training
Train your security team to effectively protect and defend your enterprise against targeted cyber attacks with this hands-on, real-world course from SOC Prime. The Threat Hunting training will help your SOC members and Blue Teamers gain insights into how cyberattacks work and enrich their knowledge about TTPs while helping your team stay one step ahead of threat actors and saving time on detection activities.
Request
What’s Included
What is Threat Hunting? / What Threat Hunting isn’t
Related models & knowledge bases, critical concepts
Threat Hunting - people, processes & tools
Building a Threat Hunting hypothesis
Resources & staying up-to-date
Detection Engineering & resilient Sigma
Adversary techniques & tools deep dive
Common log sources
Platform Support
Microsoft Sentinel
Splunk
Elastic Stack
Threat Hunting Labs are also included in a service package covering the following:
  • Creating a robust detection
  • Creating and executing a hypothesis
  • Identifying critical gaps in data
Duration
3-day workshop
Number of Participants
For up to 5 attendees
Who Can Participate
Junior Security Analysts and Threat Hunters focused on finding malicious events/actors, network security professionals and incident responders
Log Source Integration
Our seasoned engineers integrate new log sources in your SIEM. We develop integration scripts and tools together with parsers to process the data and align it with your SIEM data schema.
What’s Included
The Log Source Integration service offers a number of solutions for both individual organizations and MSSPs & MDRs.
Request
Individual Organizations
Obtain integration scripts, tools, and parses
Align detection content with the SIEM-specific data schema
Acquire technical documentation on implementation and setup
MSSPs & MDRs
Deliver custom use cases for disparate SIEM, EDR, and XDR solutions at a lightning speed
Integrate multiple new log sources into the end customers’ environments
Provide technical documentation on implementation and setup
Platform Support
Google SecOps
Microsoft Sentinel
QRadar
Elastic Stack
Splunk
ArcSight
Hyperdrive: Custom Content Development
SOC Prime Team of experts will help your organization rapidly build up cyber defense capabilities in the specific threat area relevant to your business. With Hyperdrive, organizations enable security use cases end to end across people, processes and technology, at hyperspeed and with no extra costs for managed services.
Request
What’s Included
Development of customer-specific SOC content in less than 2 weeks, including curated rules, content packs, parsers, configs, search queries, Machine Learning models, Incident Response Playbooks, SOC ready dashboards and reports
Integration with SIEM, EDR, or XDR tools in use, including initial configuration, deployment, and fine-tuning according to an agreed SLA along with content updates and transition of customer-specific use cases to a different environment
Getting the cyber defense capabilities from point A to point B in a matter of weeks, at a fraction of the cost of professional service delivery
Smooth content onboarding and continuous training sessions directly from our engineering experts, including training in content deployment and customization hosted by experts in your SIEM, EDR, or XDR technologies, live demos, and extended documentation support
Platform Support
Google SecOps
Microsoft Sentinel
Sumo Logic
Elastic Stack
Splunk
You are in good company
BNP_paribas-icon
LTI-icon
TechLab-icon
Natio-icon
Deloitte-icon
Innotec-icon
Quantum-icon
BT-icon
Virgin-icon
WCI-icon
Neurosoft-icon
Maersk-icon