Skip to main content
Blue Team · SOC · DFIR · Threat Hunting
Created by Ahmed Eid

Detect. Hunt.
Respond.

Technical deep-dives for SOC Analysts, Threat Hunters, and Incident Responders. From SIEM queries to Malware Analysis. built by practitioners, for practitioners.

1Articles
8Topics
FreeAlways
soc-analyst@blueteam:~$
# Welcome to the Blue Team knowledge base
hunt --mode proactive --framework mitre-attack
[ ✓ ] Threat hunting session initialized
detect --siem sentinel --lang kql
[ ✓ ] Detection rules loaded — 200+ use cases
respond --playbook ir-lifecycle.yml

Blue Team Topics

Deep technical content across all Blue Team disciplines

Connect With Me

Follow along for cybersecurity content, career insights, and Blue Team knowledge

Recent Articles

Fresh content straight from the field

NETWORK PROTOCOLS

Network Protocols

Key protocols every SOC analyst must know — ports, monitoring techniques,
and common exploitation patterns

SECURITY MONITORING

Critical Windows Events

The most critical Event IDs for security analysis and threat detection

Event IDCategoryDescriptionSeverityAnalyst Notes
NIST SP 800-61R2 | INCIDENT RESPONSE

Incident Response Lifecycle

7 detailed steps built on the NIST SP 800-61r2 framework — with tasks and
tools for each phase

INCIDENT RESPONSE PLAYBOOKS

IR Playbooks

Step-by-step response playbooks for the most common incident scenarios — with commands and actions per phase

LOCKHEED MARTIN | CYBER KILL CHAIN

Cyber Kill Chain

7 phases of a cyber attack — attack techniques, SOC analyst role,
and MITRE ATT&CK mapping per phase

MITRE ATT&CK FRAMEWORK

MITRE ATT&CK Tactics

14 adversary tactics mapped to real-world techniques — from reconnaissance
to impact

SOC OPERATIONS

Alert Triage

Step-by-step checklist for every alert — plus the escalation matrix
from L1 to CIRT

CHECKLIST

Triage Checklist

Work through these steps on every alert

ESCALATION MATRIX

Who Handles What

Escalation path by severity and complexity

LOG MANAGEMENT

Log Sources

Critical log sources for every SOC analyst — where to look
and what to collect

About the Author

Ahmed Eid

Cyber Security Engineer

Public Cloud Security, Threat Detection & Response