Table of Contents

The Security Operations Center (SOC) analyst is one of the most in-demand professional profiles in the cybersecurity job market. According to data from the Spanish National Observatory of Technology and Society (ONTSI), Spain will need to fill over 83,000 cybersecurity positions between 2025 and 2028, and SOC analysts represent a significant share of that demand. But not all SOC analysts do the same thing: the role is structured into three tiers (Tier 1, Tier 2, and Tier 3) with very different responsibilities, skills, and professional profiles.
Key Takeaways
- Tier 1 (triage): monitors alerts and executes playbooks. Profile: 1-2 years experience, Security+/CySA+
- Tier 2 (incidents): investigates in depth and coordinates response. Profile: 3-5 years, GCIH/ECIH
- Tier 3 (threat hunter): proactive hunting and advanced malware analysis. Profile: 5+ years, GCFA/OSCP
- A 24/7 SOC needs at least 5-6 Tier 1 analysts to cover shifts with vacation and sick leave
- Salaries in Spain (2026): Tier 1 EUR 25-35K, Tier 2 EUR 38-55K, Tier 3 EUR 55-80K
What Is a SOC Analyst and What Do They Do?
A SOC analyst is the professional responsible for monitoring, detecting, investigating, and responding to cybersecurity threats affecting an organization. They work within a Security Operations Center, using specialized tools such as SIEM, EDR, and SOAR to protect the company’s digital assets.
The SOC analyst’s work is fundamentally operational: it is about being on the front line of defense, analyzing security alerts in real time, investigating suspicious activity, and executing response actions when an incident is confirmed. It is a role that demands attention to detail, the ability to analyze under pressure, and constant knowledge updates.
If you want to understand the full context in which these professionals work, we recommend our guide to building a SOC from scratch, where we explain the structure, tools, and processes of a Security Operations Center.
What Does a Tier 1 SOC Analyst Do?
The Tier 1 analyst (also called a triage analyst) is the entry point into the SOC world and the organization’s first line of defense. Their primary function is to monitor security alerts in real time, perform initial triage, and determine whether they require further investigation or are false positives.
Tier 1 Responsibilities
- Continuous alert monitoring: supervises SIEM consoles, EDR dashboards, and other security tools during their shift, identifying alerts that require attention.
- Triage and classification: for each alert, the Tier 1 analyst performs a quick assessment to determine whether it is a true positive, a false positive, or requires escalation to Tier 2. They use predefined playbooks to guide their analysis.
- Documentation: logs each alert in the ticketing system, documenting relevant information, actions taken, and the decision made (closed, escalated, or responded to).
- Basic playbook execution: for routine incidents (confirmed phishing, antivirus-detected malware, repeated failed access attempts), they execute predefined response procedures.
- Escalation communication: when an alert requires advanced investigation, they prepare a clear and detailed summary for the Tier 2 analyst.
Skills Required for Tier 1
Technical knowledge:
- Networking fundamentals: TCP/IP model, common ports and protocols (HTTP, HTTPS, DNS, SMTP, SSH, RDP), basic traffic analysis with Wireshark.
- Operating systems: functional knowledge of Windows and Linux, ability to navigate the file system, review system logs, and understand processes.
- Basic security: threat types (malware, phishing, denial of service, brute force), common attack vectors, authentication and authorization concepts.
- SIEM tools: ability to navigate the interface, perform basic searches, and understand alert logic.
Soft skills:
- Attention to detail: the ability to distinguish a real alert from a false positive depends on noticing the details.
- Working under pressure: SOC shifts can be intense, with multiple simultaneous alerts.
- Communication: clear and concise documentation is fundamental for efficient Tier 2 escalations.
- Discipline: following playbooks and procedures without shortcuts.
Tools Used by Tier 1
- SIEM (Splunk, QRadar, Elastic Security, Microsoft Sentinel) for monitoring and searching events.
- EDR (CrowdStrike, Defender for Endpoint, SentinelOne) for validating endpoint alerts.
- Ticketing system (ServiceNow, Jira, TheHive) for documenting and managing alerts.
- Reputation lookup tools: VirusTotal, AbuseIPDB, Shodan, OTX AlienVault.
- SOC playbooks and runbooks.
A Typical Day for a Tier 1 Analyst
The shift begins with a handover from the previous shift: reviewing pending alerts, ongoing incidents, and any relevant updates. Over the next 8-12 hours (depending on the rotation), the analyst reviews alerts coming into the SIEM console, triaging each one. During an active shift, a Tier 1 analyst may process between 40 and 100 alerts. Most will be false positives or low-severity alerts that are closed directly. Between 10 and 20 percent will require some additional analysis, and a smaller percentage will be escalated to Tier 2.
What Does a Tier 2 SOC Analyst Do?
The Tier 2 analyst (incident analyst) is the SOC’s investigator. They receive alerts escalated by Tier 1 and perform in-depth analysis to determine the scope, severity, and impact of the incident. They are responsible for coordinating the technical response.
Tier 2 Responsibilities
- Deep incident investigation: analyzes escalated alerts, correlates events from multiple sources (SIEM, EDR, application logs, network traffic), and determines the nature and scope of the incident.
- Basic malware analysis: performs basic static and dynamic analysis of suspicious samples in sandboxes, identifies indicators of compromise (IoCs), and assesses potential impact.
- Preliminary forensics: collects and preserves digital evidence, performs memory, disk, and network analysis when needed to understand the attack chain.
- Response coordination: directs containment actions (host isolation, IP blocking, credential revocation) and works with IT teams on remediation.
- Detection rule development: based on investigated incidents, proposes and develops new SIEM correlation rules and improves existing playbooks.
- Report generation: writes detailed incident reports including timeline, technical analysis, actions taken, and recommendations.
Skills Required for Tier 2
Technical knowledge:
- Advanced log analysis: ability to correlate events from multiple sources to reconstruct the complete attack chain.
- MITRE ATT&CK framework knowledge: mapping attacker techniques and tactics to understand and document incidents.
- Malware analysis: static analysis (strings, hashes, imports, PE headers) and basic dynamic analysis (sandbox execution, behavior analysis).
- Digital forensics: evidence acquisition, memory analysis (Volatility), disk analysis (Autopsy), network traffic analysis (Wireshark, Zeek).
- Scripting: Python and/or PowerShell for automating investigation and analysis tasks.
- Deep knowledge of attacks: lateral movement techniques, privilege escalation, persistence, data exfiltration.
Soft skills:
- Analytical thinking: ability to connect disparate dots to form a coherent picture of the incident.
- Stress management: serious incidents generate pressure from management and affected teams.
- Technical communication: explaining complex findings to both technical and non-technical audiences.
- Mentoring: Tier 2 analysts should help with the professional development of Tier 1 analysts.
Tools Used by Tier 2
In addition to all Tier 1 tools, the Tier 2 analyst uses:
- SOAR (Palo Alto XSOAR, Splunk SOAR, Tines) for orchestrating the response.
- Forensic tools: Velociraptor, Autopsy, Volatility, FTK Imager.
- Malware sandboxes: Any.Run, Joe Sandbox, Cuckoo Sandbox.
- Threat intelligence platforms: MISP, Recorded Future, Mandiant Advantage.
- Network analysis tools: Zeek, NetworkMiner, Arkime.
- Scripting languages: Python, PowerShell, Bash.
What Does a Tier 3 SOC Analyst Do?
The Tier 3 analyst (threat hunter or senior analyst) represents the highest level of technical expertise within the SOC. Their role goes beyond reactive incident response: they focus on proactive threat hunting, advanced analysis, and strategic improvement of detection capabilities.
Tier 3 Responsibilities
- Proactive threat hunting: formulates threat hypotheses based on threat intelligence, industry trends, and environmental knowledge, and actively investigates them looking for signs of compromise that have evaded automated detections.
- Malware reverse engineering: advanced malware sample analysis, including unpacking, debugging, code analysis, and extraction of configurations and command-and-control (C2) server communications.
- Advanced digital forensics: complex investigations that may involve multiple systems, extended time periods, and sophisticated concealment techniques by the attacker.
- Threat intelligence development: analyzes trends, generates strategic threat reports, and translates intelligence into concrete detection improvements.
- Detection architecture: designs the SOC’s detection strategy, defines priority use cases based on MITRE ATT&CK, and optimizes overall rule effectiveness.
- Red teaming and purple teaming: collaborates with red teams to validate detection capabilities and participates in joint exercises (purple team) to improve coverage.
- Mentoring and training: trains Tier 1 and Tier 2 analysts, shares knowledge, and raises the overall technical level of the team.
Skills Required for Tier 3
Technical knowledge:
- Reverse engineering: fluent use of tools like Ghidra, IDA Pro, x64dbg. Knowledge of assembly language (x86/x64) and ability to analyze complex binaries.
- Threat hunting: structured threat hunting methodologies, ability to formulate and test hypotheses, deep knowledge of APT group TTPs.
- Detection development: creating Sigma, YARA, Snort/Suricata rules, writing advanced queries in the SIEM’s query language.
- Programming: advanced Python, ability to develop custom tools for analysis, automation, and integration.
- Deep infrastructure knowledge: Active Directory, cloud environments (AWS, Azure, GCP), containers, microservices architectures.
- Threat intelligence: Diamond, Kill Chain, MITRE ATT&CK models at expert level. Knowledge of APT groups relevant to the sector.
Soft skills:
- Strategic thinking: ability to see beyond the individual incident and design systemic improvements.
- Autonomy: Tier 3 analysts work with little direct supervision and must be able to plan and execute complex investigations independently.
- Technical leadership: ability to influence the SOC’s technical direction without necessarily having direct hierarchical authority.
- Executive communication: ability to translate complex technical findings into business risks that leadership can understand.
Tools Used by Tier 3
In addition to Tier 1 and Tier 2 tools:
- Reverse engineering: Ghidra, IDA Pro, x64dbg, Binary Ninja.
- Malware analysis: Remnux, FlareVM, PEStudio, dnSpy.
- Detection development: Sigma (generic detection rules), YARA (malware detection), Snort/Suricata (network detection).
- Advanced threat intelligence: STIX/TAXII, OpenCTI, MITRE ATT&CK Navigator.
- Lab environments: dedicated virtual machines, isolated networks for malware analysis.
- Development tools: Git, Docker, CI/CD environments for analysis pipeline automation.
Riskitera empowers your SOC analysts with AI-powered automated triage, reducing noise at Tier 1 and freeing up time for Tier 2 and Tier 3.
Learn moreWhat Does the SOC Analyst Career Path Look Like?
A SOC analyst’s career is a natural progression that, with dedication and continuous training, can lead from a junior profile to technical leadership or management positions.
Typical Path
Initial training (0-1 year): degree in computer science, telecommunications engineering, or vocational training in cybersecurity. Entry-level certifications such as CompTIA Security+ or CEH.
Tier 1 analyst (1-2 years): first contact with the SOC. Intensive learning of tools, processes, and threat types. This is the phase where the practical foundation is built.
Tier 2 analyst (3-5 years): after demonstrating competence in triage and acquiring deeper investigation and response knowledge, the analyst progresses to Tier 2. It is common to obtain certifications such as GCIH, ECIH, or BTL1 during this phase.
Tier 3 analyst / Threat Hunter (5+ years): requires specialization in a specific area (forensics, malware, threat intelligence) and a strategic view of security. Certifications such as GCFA, GREM, OSCP, or GXPN make the difference.
Advanced roles (7+ years): SOC Manager, threat intelligence lead, security architect, CISO. The fork between the technical track and the management track typically occurs between 5 and 8 years into the career.
Continuous Training
The cybersecurity field evolves at a pace that makes continuous training essential:
- Practice platforms: TryHackMe, HackTheBox, LetsDefend, CyberDefenders.
- CTF competitions: participating in Capture The Flag events is an excellent way to develop practical skills.
- Community: participation in groups like FIRST, CSIRT.es, or CCN-CERT events (STIC Congress).
- Conferences: RootedCON, Navaja Negra, CyberCamp (INCIBE), h-c0n, Ekoparty.
- Publications and blogs: regular reading of threat reports from Mandiant, CrowdStrike, Microsoft Threat Intelligence, Recorded Future.
How Much Does a SOC Analyst Earn in Spain in 2026?
Cybersecurity salaries in Spain have experienced sustained growth in recent years, driven by talent scarcity and increasing regulatory demand. These are indicative salary ranges for 2026, based on job portal data, industry surveys, and our market experience:
Tier 1 Analyst
- Junior (0-1 year of experience): EUR 22,000 - 28,000 gross annual.
- Experienced (1-2 years): EUR 28,000 - 35,000 gross annual.
- In Madrid and Barcelona, salaries tend to be at the upper end of the range. Night shift and weekend work may include additional supplements.
Tier 2 Analyst
- 3-4 years of experience: EUR 35,000 - 45,000 gross annual.
- 4-5 years with certifications: EUR 45,000 - 55,000 gross annual.
- Profiles with incident response experience in regulated sectors (banking, energy, healthcare) tend to be at the upper end of the range.
Tier 3 Analyst / Threat Hunter
- 5-7 years of experience: EUR 50,000 - 65,000 gross annual.
- 7+ years, highly specialized: EUR 65,000 - 80,000 gross annual.
- Exceptional profiles specializing in malware reverse engineering or advanced threat hunting can exceed EUR 80,000, especially if working for international companies with offices in Spain.
SOC Manager
- Mid-level experience: EUR 55,000 - 70,000 gross annual.
- Senior SOC Manager at large organizations: EUR 70,000 - 95,000 gross annual.
It is worth noting that remote work has broadened the options: many Spanish SOC analysts work for European or American companies at salaries significantly higher than the local market.
Riskitera’s SOC team is made up of analysts at all levels with experience in regulated sectors, offering 24/7 monitoring, detection, and response services to organizations that need SOC capabilities without the complexity of building one internally.
How to Become a SOC Analyst
For those looking to start a career as a SOC analyst, here is the recommended path:
Step 1: Foundational Training
A university degree in computer science, telecommunications, or cybersecurity provides a solid foundation, but it is not strictly required. Higher vocational training programs in cybersecurity, systems administration, or application development are also valid entry points. The fundamentals are strong foundations in networking, operating systems, and basic programming.
Step 2: Entry-Level Certifications
CompTIA Security+ is the most recommended starting certification. CompTIA Network+ (if you need to strengthen your networking knowledge) and Microsoft’s SC-900 certification as a first introduction to cloud security are also useful.
Step 3: Hands-On Lab Practice
Platforms like TryHackMe (especially the SOC Analyst and Cyber Defense learning paths), LetsDefend, and CyberDefenders offer realistic practice environments that simulate the daily work of a SOC analyst. Spending 2-3 months on these platforms before job hunting makes a notable difference in interviews.
Step 4: Build a Visible Profile
Document your learning journey on a technical blog or LinkedIn. Participate in blue team (defensive) CTFs. Contribute to open source security projects. Recruiters value profiles that demonstrate initiative and passion for cybersecurity.
Step 5: First Job
Look for Tier 1 SOC analyst, junior SOC, or security analyst positions at managed cybersecurity service providers (MSSP/MDR), large consultancies, or security departments of mid-sized and large companies. Managed service providers are often the best entry point because they expose analysts to a variety of technologies and incident types.
Looking to improve your SOC team's efficiency? Discover how Riskitera automates triage and escalates alerts with context.
Solicitar demoFrequently Asked Questions
Do I Need a University Degree to Be a SOC Analyst?
It is not strictly necessary, although it is recommended. Many successful SOC analysts come from higher vocational training in cybersecurity or systems administration. What really matters is demonstrable practical knowledge: recognized certifications (CompTIA Security+, CySA+, GCIH), experience in labs and practice platforms, and the ability to analyze and solve technical problems. That said, a university degree is still a requirement in many job postings, especially at large corporations and in the public sector.
How Long Does It Take to Progress from Tier 1 to Tier 2?
The typical progression from Tier 1 to Tier 2 is 2 to 3 years, although it depends on individual factors such as learning ability, quality of mentoring received, volume and complexity of incidents handled, and supplementary training. Tier 1 analysts who take initiative to learn beyond their role (participating in Tier 2 investigations, studying malware, developing automation scripts) tend to progress faster.
What Is the Difference Between a SOC Analyst and a Pentester?
They are complementary but distinct roles. The SOC analyst is a defensive profile (blue team): they detect, investigate, and respond to real threats against the organization’s systems. The pentester is an offensive profile (red team): they simulate attacks to find vulnerabilities before real attackers exploit them. Both require solid technical knowledge, but the daily mindset and skills are different. Some professionals evolve toward purple teaming, which combines both approaches.
Is Working SOC Shifts Sustainable Long-Term?
Rotating shifts (morning, afternoon, night) are a reality of 24/7 SOC work and can cause burnout if not managed well. The key is team organization: a balanced rotation with enough staff to cover vacations and rest periods, clear compensation policies for night and weekend shifts, and a culture that values team wellbeing. Many analysts work shifts during the early years of their career (Tier 1 and Tier 2) and progressively move to roles with more regular hours (Tier 3, SOC Manager, detection engineering) as they gain experience.
What Languages Does a SOC Analyst Need?
Spanish is obviously necessary for the Spanish job market. English is essential: technical documentation, threat reports, professional communities, and most tools are in English. A B2 or higher level of technical English is a de facto requirement for any SOC position. Other languages (Portuguese, German, French) are a plus, especially in SOCs that serve international clients.
Do you know your cybersecurity maturity level?
Free diagnostic in 3 minutes. Personalized score, gap map and action plan adapted to your sector.
Related Posts

Threat Hunting: How to Hunt Threats Before They Strike
Practical threat hunting guide: PEAK and TaHiTI methodologies, SIEM and EDR tools, Sigma rules, MITRE ATT&CK integration, and how to build an effective threat hunting program.

How to Build a SOC from Scratch: A Practical Guide for Businesses
Complete guide to building a Security Operations Center (SOC): types, team roles, required tools, processes, costs, and common mistakes to avoid.

What Is a SIEM and Why Your Business Needs One
Complete guide to SIEM: what it is, how it works, top solutions on the market (Splunk, QRadar, Elastic, Sentinel), open source vs commercial, and when you actually need one.