First-Ever Bounty Program for Cyber Defenders
Driven by a mission to unite cybercommunity on a global scale to proactively defend against emerging threats, SOC Prime has introduced its Threat Bounty Developer Program.
Craft your own SOC content
Custom SOC content based on the contributor’s research and published to the world-leading Detection as Code platform with 14K users.
Receive regular payouts
Rewards and rating system that reflects the need for your content by the global community of security performers.
Catch up with the latest trends
The verified Wanted List requests on the most demanded content for Threat Detection and Incident Response.
Join Defenders Working for Better Cybersecurityget started
Go through skills assessment
Complete entry submission by sharing your professional cybersecurity profile for the most efficient collaboration.
Contribute to our Detection as Code platform
Publish your original SOC content to Threat Detection Marketplace, including Sigma detections, Snort and YARA rules, log parsers, Azure Sentinel playbooks, analytic Dashboards, and more.
Receive your rating-based recurring rewards calculated in regards to the content type and users’ evaluation.
Gain More with Threat Bounty
Convert your threat hunting expertise into continuous financial benefits.
Continuous tech skills enhancement
Hone your cyber defense skills and broaden your expertise through collaborative research and content contribution.
Networking and knowledge sharing
Become part of the global community of cyber defenders, join our dedicated Slack space, and stay connected.
Personal brand with market leader
Build up your cybersecurity profile by publishing curated content in front of the global 14k+ Threat Detection Marketplace audience and gaining professional recognition.
How SOC Prime Supports Collaborative Research
Open source support
Community and knowledge- sharing
Paid in bounty
Threat bounty content
33%Of all content used by paid subscribers
Sigma can change not the way of how organizations build their cyber defense but the entire scenario for blue and red teams
SIGMA enables the sharing of detection logic between organizations with dissimilar architectures but familiar data...
Nate GuagentiEndpoint & NSM & Elastic
The Threat Bounty Program provides similar benefits as to how IDS rulesets are already used in thousands of organizations
Florian RothNextron Systems
New rule authors, that haven’t been in the market before, add content to market places like Threat Detection Marketplace and more content...
Once I got the main idea and a little bit of experience, I began designing content for my SOC in strictly Sigma...
Threat Bounty Program presents customers needs and allows deep dive into research