// About SOC Analyst Hub
A community resource for security operations professionals focused on practical, actionable detection engineering content. From SIEM rule writing to advanced threat hunting, we cover the tradecraft that matters.
Empowering Detection Engineers and SOC Analysts
The SOC Analyst Hub exists because the gap between "knowing an attack happened" and "having a detection rule that catches it" is still too wide for most teams. We bridge that gap with deeply practical content written by practitioners for practitioners.
We don't do vendor press releases or surface-level explainers. Every article on this site is written to help you build or improve a detection, execute a hunt, or choose a tool that actually fits your environment.
- 01
Practical Over Theoretical
Every guide includes real detection logic — Sigma rules, KQL queries, Splunk SPL, or VQL — that you can adapt and deploy today.
- 02
MITRE ATT&CK Aligned
Content is mapped to MITRE ATT&CK techniques so you can understand coverage gaps and prioritize detection investments against real adversary behavior.
- 03
Adversary-Emulation Tested
Detection guidance is developed against actual tooling — Mimikatz, CobaltStrike, Impacket, and open-source red team frameworks — not hypothetical threat models.
- 04
Vendor-Neutral
Detection logic is expressed in portable formats (Sigma, pseudocode) first, with platform-specific translations where helpful. We don't favor any SIEM vendor.
What's In the Hub
A growing library of detection engineering resources, organized by type and mapped to adversary techniques.
How Content Is Organized
Content is tagged by type to help you find what you need quickly.
Detection Guide
Step-by-step guides for building detections around specific techniques. Includes log sources, detection logic, tuning advice, and false positive analysis.
Hunt Playbook
Structured hunting procedures for uncovering threats that evade alerting. Hypothesis-driven, with specific queries and pivot points for each phase.
Tool Review
Hands-on evaluations of detection, hunting, and forensics tools from an analyst's perspective — setup, key features, realistic use cases, and limitations.
Technique Analysis
Deep dives into how specific adversary techniques work at the OS and network level, providing the understanding needed to build better detections.
Start Reading
Browse our detection guides and hunt playbooks, or subscribe to the RSS feed to get new content as it's published.
Browse All Articles →