Skip to content

Next edition July 6th, 2026

Career

From SOC Analyst to Incident Responder: The Defensive Specialist Path

How SOC analysts move into incident response, with the certification stack, deeper investigative skills, and on-call expectations that define this specialisation.

Difficulty: IntermediateEstimated time: 24 weeks

Prerequisites

  • At least 12 to 18 months as a SOC analyst
  • Comfort triaging alerts and writing investigation notes
  • Working understanding of endpoint and network telemetry

Outcomes

  • Understand the difference between alert triage and full incident ownership
  • Plan a credible IR certification stack
  • Build forensic and timeline reconstruction skills at portfolio level
  • Prepare for the on-call dynamics of an incident response role

Steps

  1. 1. Reframe alerts as cases, not tickets

    Incident responders own outcomes, not just escalations. Practise treating alerts as the start of a full timeline reconstruction, not a hand-off to someone else.

  2. 2. Deepen forensic and timeline skills

    Memory analysis, disk artefacts, host triage, and timeline correlation across endpoints and network. These are the skills SOC analysts rarely touch but IR roles demand daily.

  3. 3. Earn an incident response certification

    GCIH from SANS is the standard credential. CySA+ works as a stepping stone. Vendor-specific EDR certifications add weight if you target a specific stack.

  4. 4. Build incident write-ups for portfolio

    Lab-driven incident scenarios with full timelines, indicators of compromise, and remediation recommendations. Recruiters want to see how you reason about cases end to end.

  5. 5. Prepare for the on-call shift

    Incident responders run on-call rotations. The tempo is bursty: long quiet stretches followed by intense periods. Build the personal systems for high-pressure work before you take the role.

Why This Transition Is The Natural Next Step

For most SOC analysts who want to deepen rather than pivot branches, incident response is the obvious next role. You stay defensive, you keep the same investigative discipline, but the depth and ownership change significantly. Where SOC work ends in escalation, IR work begins in escalation.

The transition is shorter than SOC to penetration testing because the mindset is the same. What you build is technical depth, not a new mental model.

What Carries Over

Almost all SOC habits transfer:

  1. Triage discipline. You already separate signal from noise. The job now is to take the signal further, not just label it.

  2. Documentation rigour. Incident reports demand the same clarity as SOC notes, just with more breadth. You already have most of this skill.

  3. Communication under pressure. You already write fast. Incident communication is similar but reaches more stakeholders.

What You Need to Build

The gap is in technical depth and ownership:

  • Memory forensics. Volatility, Rekall, basic memory artefact analysis. Most SOC analysts have never opened a memory dump.
  • Disk forensics. Filesystem timelines, registry artefacts, prefetch, shimcache. The standard Windows IR data sources.
  • Network forensics. Full packet capture analysis, protocol-level reconstruction, lateral movement detection.
  • Case ownership. Running an incident from initial alert to final report, including stakeholder communication. This is more about discipline than technique.

Certification Stack

GCIH (GIAC Certified Incident Handler) from SANS is the standard credential for serious IR roles. Course is expensive but the certification carries weight. CySA+ from CompTIA works as a more accessible stepping stone that some employers recognise. Vendor-specific EDR certifications (CrowdStrike, SentinelOne, Microsoft Defender) add weight if you know the target stack.

Where the Bootcamp Fits

The Unihackers Cybersecurity Bootcamp covers the SOC and incident handling foundation in modules m7 (Security Operations and Monitoring) and m8 (Advanced Security Operations). For SOC analysts who already have those foundations, the bootcamp is overkill. For career changers building toward IR, it is the most efficient single starting point. See bootcamp curriculum for details.

Common Stalls

Three patterns explain most stalled SOC to IR transitions:

  1. Certification stacking without case practice. Three IR certifications and zero documented incident write-ups signals exam ability, not response capability.

  2. Avoiding forensic depth. The biggest single skill gap is forensic technique. Avoiding memory and disk forensics means you stay in alert triage, not incident response.

  3. Underestimating on-call. The on-call rotation is real and changes your life. People who do not prepare for it burn out within twelve months.

The transition is faster than SOC to pentest and rewards the same patient documentation habits you already have. Read the salary guide for incident responder compensation context.

The NIST Incident Response Lifecycle You Will Live Inside

As a SOC analyst, the lifecycle stops at detection and escalation. As an incident responder, you live inside the full NIST SP 800-61 Computer Security Incident Handling Guide: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned. SANS frames the same flow as PICERL (Preparation, Identification, Containment, Eradication, Recovery, Lessons Learned). The Mandiant attack lifecycle, which most threat intelligence reports use, maps the adversary side of the same picture.

Each phase has owners, deliverables, and decision points that a SOC L1 rarely sees:

  • Preparation is everything you do before the incident: runbooks, tabletop exercises, retainers, IR Jump Kit, contact trees, jurisdiction maps. SOC analysts inherit these. IR analysts maintain them.
  • Identification is where SOC and IR overlap. The shift is moving from "is this real" to "what is the scope".
  • Containment is short term (isolate hosts, block IPs at the firewall) and long term (segment, rotate credentials, pull tokens). IR owns both.
  • Eradication removes the adversary and root cause. Rebuilds, full credential resets, persistence cleanup.
  • Recovery brings systems back into production with monitoring tuned to detect re-entry.
  • Lessons Learned is the postmortem with stakeholders. This is where careers are made or lost.

When you can talk fluently about each phase with concrete examples from your home lab, you sound like an IR candidate, not a SOC candidate.

From Triage Mindset to Investigation Mindset (the real shift)

A SOC analyst is rewarded for closing tickets accurately and fast. An incident responder is rewarded for not stopping until the scope is fully understood. That is the real cognitive shift.

In practice it looks like this. A SOC analyst sees a Cobalt Strike beacon detection on one endpoint, validates it, escalates with full context, and moves to the next ticket. An incident responder takes that same alert and asks: which other hosts beaconed to the same C2 in the last 90 days, what creds did the user have, what did the user authenticate to, what lateral movement signals do we see, what is the dwell time. The investigation does not stop at one host because adversaries do not stop at one host.

Building this mindset takes deliberate practice. Re-open old SOC cases you closed and ask the IR questions on top. You will find scope you missed.

The IR Tools You Add on Top of Your SIEM Skill Set

Your SIEM skills (Splunk, Sentinel, QRadar, Elastic) carry over directly. On top, IR teams typically use:

  • TheHive as the case management platform for incidents, with structured tasks, observables, and TTPs.
  • Cortex for automated enrichment of observables (IPs, hashes, domains) against threat intelligence sources.
  • Splunk SOAR (formerly Phantom) or Tines for orchestrating containment playbooks across EDR, firewall, IAM, and ticketing.
  • Velociraptor for at-scale endpoint visibility and live forensic collection across thousands of hosts.
  • KAPE (Kroll Artifact Parser and Extractor) for triage collection of the most useful Windows artefacts in minutes.
  • FTK Imager and Magnet AXIOM for full disk imaging when an incident escalates to forensic preservation.
  • Volatility 3 for memory analysis when ransomware, fileless malware, or advanced persistence is suspected.

You do not need expert depth in all of them on day one. You do need lab time on TheHive, Cortex, KAPE, and Velociraptor before you interview, because those are the tools you will be asked to demo.

Threat Hunting: Why It Is Your Bridge Skill

Threat hunting is the cleanest bridge from reactive SOC work to proactive IR work. A hunt starts with a hypothesis ("adversaries are abusing scheduled tasks for persistence"), translates it to data sources (EDR process events, registry creation events, AutoRuns), runs queries, and confirms or rejects.

Build hunting fluency with the MITRE ATT&CK Navigator. Pick a tactic (say, TA0003 Persistence), pick a technique (T1053.005 Scheduled Task), and write the detection logic in your SIEM. Repeat across ten techniques and you have a small but real hunt portfolio. Recruiters love this because it shows you can think proactively, which is the IR mindset.

Threat hunting is also where threat intelligence becomes practical. Pulling adversary TTPs from a vendor report and turning them into hunts is exactly what an IR analyst does after a CISA advisory drops.

Writing IR Runbooks and Postmortems Recruiters Care About

Two artefacts mark the shift in your portfolio: an IR runbook and a postmortem.

An IR runbook codifies how the team handles a class of incidents (ransomware, business email compromise, insider data exfiltration, web shell on a public server). It defines triggers, roles via a RACI matrix, decision points, communication templates, and rollback paths. Pick three classes of incident and write runbooks for each. Even at lab quality, this signals senior thinking.

A postmortem documents a single incident: what happened, when, who did what, what worked, what did not, and what changes follow. The lessons learned section is the most read part of the document. Practice writing them on your home lab incidents. The discipline is the same as a SOC investigation note, but the audience is broader and the consequences are bigger.

Salary Reality: SOC L1 to SOC L2 to IR L2 in EU

Compensation in the EU follows a predictable curve. SOC L1 starts around 32 to 40 thousand euros. SOC L2 sits in the 38 to 50 range. IR L2 typically prices at 45 to 60, with consultancy IR roles and breach response retainers reaching higher with on-call premiums and bonus components. London and Switzerland skew higher. Eastern Europe skews lower.

The salary jump is real but it is not the headline. The headline is the slope. SOC roles plateau around L3 unless you specialise. IR roles compound: each engagement adds a story, each new tool adds depth, each new vertical (finance, healthcare, OT) opens a new market. Five years into IR, the curve looks very different from five years into SOC.

The salary guide gives the up-to-date breakdown by region and seniority.

Certifications That Map to This Transition

The cert ladder for the SOC to IR move is reasonably well defined:

  • Security+ is your baseline if you do not yet have it. Most SOC analysts already have it. It anchors the foundational vocabulary.
  • CySA+ is the natural mid-tier credential. It bridges SOC operations and IR analysis with a focus on threat detection, incident response, and vulnerability management. A strong CySA+ is the right signal for a first IR-aligned role.
  • GCIH from SANS is the gold standard for the IR specialist. Expensive but high signal at consultancies and retainers.
  • BTL1 (Blue Team Level 1) from Security Blue Team is increasingly recognised as a hands-on alternative for blue team practitioners on a tighter budget.
  • ECIH from EC-Council is also accepted in some markets but carries less weight than GCIH or BTL1.

Pair one certification with one strong portfolio artefact (a runbook, a hunt, a forensic write-up). One plus one beats three plus zero every time.

A Realistic 9-Month Promotion Plan

A nine-month plan, run alongside your current SOC role, looks like this:

  1. Months 1 to 2. Audit your current SOC cases for missed scope. Pick five and rewrite them with full IR thinking. Set up a home lab with TheHive, Cortex, and a Velociraptor server.
  2. Months 3 to 4. Work through CySA+ if you do not yet have it. In parallel, write your first three IR runbooks (ransomware, BEC, web shell) using a clear RACI.
  3. Months 5 to 6. Run a tabletop on each runbook with a peer. Build three threat hunts mapped to MITRE ATT&CK techniques. Begin BTL1 or GCIH preparation.
  4. Months 7 to 8. Take an active role in real incidents at your current employer: ask to shadow IR retainers, volunteer for after-hours coverage, write the lessons learned section of any incident you touched.
  5. Month 9. Apply for IR roles or push for an internal move. Bring a portfolio of three runbooks, three hunts, and a forensic write-up.

This is conservative. With strong forensic skills already in place, the move can happen faster. The point is the structure: certifications never replace artefacts, artefacts never replace operational reps. All three together change the conversation with hiring managers from "potentially" to "yes".

Need Help?

Want a clearer route into cybersecurity?

Start with one pathway, build momentum, and keep shipping small wins until you're job-ready.