Skip to main content
S
SOCSimulatorDocumentation
Training Modes

Shift Mode

Real-time SOC analyst shift simulation with live alerts, multi-tool workstation, and hidden attack scenarios.

Shift Mode

Shift Mode places you inside a fully functional SOC Workstation where live alerts stream across multiple security tools simultaneously. Hidden attack scenarios are injected into the noise. Your job is to triage, investigate, and respond -- exactly as you would in a production security operations center.

Quick Start

1. Configure Your Shift

Select your shift parameters before starting:

SettingOptions
Duration30 minutes, 1 hour, 2 hours, 3 hours
DifficultyEasy, Medium, Hard, Expert
Scenario FocusRandom, or a specific MITRE ATT&CK category

2. Briefing

Before your shift begins, you receive a briefing that describes the organization you are defending, the threat landscape, and any active advisories. Read it carefully -- it contains context that will help you distinguish real threats from noise.

3. Triage

Your workstation opens with multiple tool windows. Alerts stream in across SIEM, XDR, and Firewall panels. For each alert, decide:

ActionWhen to Use
InvestigateNeeds deeper analysis before a decision
EscalateConfirmed or high-confidence threat requiring response
ResolveLegitimate activity, handled, no further action
False PositiveBenign activity that triggered a detection rule

Hidden in the alert flow are true positive attack chains. Finding and correctly escalating them is the core challenge.

4. Debrief

When the shift ends, a full performance report breaks down your decisions across four scoring pillars: Detection Rate, Precision, Response Time, and Procedure. The debrief also reveals the hidden scenario, shows which alerts were part of the attack chain, and provides fatigue analysis.

Tool Windows

The SOC Workstation provides six tool windows, each replicating a real-world SOC platform:

WindowPurpose
SIEMLog search, correlation rules, alert timeline
XDREndpoint telemetry, process trees, detection alerts
FirewallNetwork traffic, connection logs, blocked requests
Ember ThreatIntReal-time threat intelligence from 20+ open-source feeds
Case ManagementTicket creation, evidence pinning, incident tracking
CommsSOC team communication channel with simulated colleagues

Learn More

On this page

We use cookies to improve your experience and measure usage. Learn more