← hackandbuild.dev
Security Operations Center (SOC) Maturity Model Framework
With SFIA-Aligned Skills and Competency Levels

Security Operations Center (SOC) Maturity Model Framework

With SFIA-Aligned Skills and Competency Levels

SFIA Level Reference Guide

SFIA Level Reference Guide

Level 1 (Follow): Works under close supervision, uses limited discretion

Level 2 (Assist): Works under general direction, applies knowledge in routine contexts

Level 3 (Apply): Works under general direction, exercises discretion, applies skills in varied contexts

Level 4 (Enable): Works under general direction, fully responsible for meeting objectives, influences others

Level 5 (Ensure, Advise): Ensures correct application of standards, provides authoritative advice

Level 6 (Initiate, Influence): Sets policy, initiates and leads activities of strategic importance

Level 7 (Set Strategy, Inspire): Sets organizational strategy, inspires the industry

Level 1: Initial (Ad-Hoc)

Level 1: Initial (Ad-Hoc)

Organizational Characteristics

The SOC operates reactively with minimal formal processes. Security monitoring is inconsistent, with limited tooling and undefined responsibilities. Incident response is chaotic and driven by individual heroics rather than documented procedures.

SFIA Skills Required by Role

SOC Analyst (Tier 1) - Junior/Entry Level

SFIA Skill Code Skill Name Required Level Application in Role
INCAIncident managementLevel 2Assist with logging and tracking security incidents using basic ticketing systems
SCADSecurity administrationLevel 2Assist with monitoring basic security tools (antivirus, firewall logs)
NTASNetwork supportLevel 2Understand basic network protocols and connectivity for incident context
USUPUser supportLevel 2Respond to user-reported security concerns and provide initial guidance
KnowKnowledge managementLevel 1-2Document incident activities and maintain basic records

SOC Analyst (Tier 2) - Intermediate Level

SFIA Skill Code Skill Name Required Level Application in Role
INCAIncident managementLevel 3Apply incident response procedures independently for common scenarios
FORSIT forensicsLevel 2-3Assist with or apply basic forensic evidence collection
SCADSecurity administrationLevel 3Apply security controls and respond to security events
VISLVulnerability assessmentLevel 2Assist with vulnerability identification and basic analysis

SOC Manager

SFIA Skill Code Skill Name Required Level Application in Role
IRMGInformation securityLevel 3-4Apply security principles and enable basic security operations
INCAIncident managementLevel 4Enable effective incident response and ensure team capability
PEDGPeople managementLevel 3-4Apply team management and enable performance under constraints
BURMBusiness risk managementLevel 3Apply risk assessment to security decisions

Real-World Example

A small healthcare clinic with 200 employees has one IT person handling security reactively, checking antivirus alerts when time permits, with no formal processes or documentation.

Level 2: Developing (Repeatable)

Level 2: Developing (Repeatable)

Organizational Characteristics

The SOC has defined basic processes and some automation. Security monitoring occurs during business hours with documented escalation paths. Basic playbooks exist for common scenarios.

SFIA Skills Required by Role

SOC Analyst (Tier 1) - Foundational Level

SFIA Skill Code Skill Name Required Level Application in Role
INCAIncident managementLevel 3Apply documented playbooks and escalation procedures independently
SCADSecurity administrationLevel 3Apply SIEM queries and monitor security events using defined processes
BUANBusiness analysisLevel 2-3Analyze alert patterns and identify false positives
EMRGVulnerability researchLevel 2Assist with identifying and categorizing security vulnerabilities
KNOWKnowledge managementLevel 2-3Contribute to knowledge base and document procedures
ITMGIT managementLevel 2Understand the IT environment and business context for incidents

SOC Analyst (Tier 2) - Intermediate Level

SFIA Skill Code Skill Name Required Level Application in Role
FORSIT forensicsLevel 3Apply forensic techniques to investigate incidents independently
INCAIncident managementLevel 3-4Apply advanced incident analysis and enable team response
SCADSecurity administrationLevel 3-4Apply security controls and enable threat detection capabilities
PROGProgramming/software developmentLevel 2-3Assist with or apply scripting for automation (Python, PowerShell)
VISLVulnerability assessmentLevel 3Apply vulnerability analysis and prioritization
EMRGVulnerability researchLevel 3Apply threat research and IoC analysis
MALWMalware analysis*Level 2-3Assist with or apply basic malware identification and analysis

*Note: MALW is not a standard SFIA code but represents specialized security analysis

SOC Analyst (Tier 3) / Threat Hunter

SFIA Skill Code Skill Name Required Level Application in Role
EMRGVulnerability researchLevel 3-4Apply threat hunting techniques and enable proactive defense
INCAIncident managementLevel 4Enable complex incident response and mentor junior analysts
BUANBusiness analysisLevel 3-4Apply behavioral analysis and anomaly detection
SCADSecurity administrationLevel 4Enable custom detection rule development

SOC Manager

SFIA Skill Code Skill Name Required Level Application in Role
IRMGInformation securityLevel 4Enable security operations aligned with frameworks (NIST, SANS)
INCAIncident managementLevel 4-5Enable effective incident management and ensure process maturity
PEDGPeople managementLevel 4Enable team performance through leadership and development
BURMBusiness risk managementLevel 4Enable risk-based decision making for security operations
CFMGFinancial managementLevel 3-4Apply budget management for SOC operations
SUPPSupplier managementLevel 3-4Apply vendor management for security tools and services
MEASMeasurementLevel 3-4Apply metrics tracking (MTTD, MTTR) and reporting

Security Engineer

SFIA Skill Code Skill Name Required Level Application in Role
SCADSecurity administrationLevel 3-4Apply SIEM administration and enable tool integration
ARCHSolution architectureLevel 3Apply security architecture principles to SOC infrastructure
DESNSystems designLevel 3Apply design principles for security tool deployment
SYSPSystems integrationLevel 3-4Apply integration of security tools via APIs and agents

Real-World Example

A financial services company with 1,000 employees operates a 5-person SOC (8x5). They use a SIEM with documented playbooks for ransomware, phishing, and DDoS attacks, following standardized procedures with defined escalation paths.

Level 3: Defined (Managed)

Level 3: Defined (Managed)

Organizational Characteristics

The SOC operates 24x7 with clear roles, standardized processes, and continuous improvement. Proactive threat hunting occurs regularly with strong integration across security functions and business units.

SFIA Skills Required by Role

SOC Analyst (Tier 1) - Foundational Level

SFIA Skill Code Skill Name Required Level Application in Role
INCAIncident managementLevel 3-4Apply complex incident procedures and enable automated workflows
SCADSecurity administrationLevel 4Enable SIEM mastery and multi-source alert correlation
BUANBusiness analysisLevel 3Apply cloud security monitoring and alert correlation
ITMGIT managementLevel 3Apply knowledge of IT infrastructure including cloud (AWS/Azure/GCP)
VISLVulnerability assessmentLevel 3Apply vulnerability context to security events
GOVNGovernanceLevel 2-3Assist with or apply compliance requirements (PCI-DSS, HIPAA, ISO 27001)
EMRGVulnerability researchLevel 3Apply threat intelligence consumption and IoC analysis

SOC Analyst (Tier 2) - Intermediate Level

SFIA Skill Code Skill Name Required Level Application in Role
FORSIT forensicsLevel 4Enable network and memory forensics investigations
INCAIncident managementLevel 4Enable advanced incident response including APT investigations
SCADSecurity administrationLevel 4Enable security across hybrid and cloud environments
PROGProgramming/software developmentLevel 3-4Apply scripting and enable automation development
EMRGVulnerability researchLevel 4Enable malware reverse engineering and threat actor profiling
METLMethods and toolsLevel 4Enable MITRE ATT&CK framework application and kill chain analysis
ARCHSolution architectureLevel 3Apply understanding of cloud architecture security
NTASNetwork supportLevel 4Enable deep packet inspection and network forensics

SOC Analyst (Tier 3) / Threat Hunter - Advanced Level

SFIA Skill Code Skill Name Required Level Application in Role
EMRGVulnerability researchLevel 4-5Enable hypothesis-driven threat hunting and ensure detection effectiveness
INCAIncident managementLevel 4-5Enable complex investigations and ensure team capability
BUANBusiness analysisLevel 4Enable statistical analysis and behavioral anomaly detection
SCADSecurity administrationLevel 4-5Enable custom detection engineering at scale
DTANData analysisLevel 4Enable data science for security analytics
PROGProgramming/software developmentLevel 4Enable automation and tool development (Python, R)
METLMethods and toolsLevel 4-5Enable TTPs mapping and ensure MITRE ATT&CK utilization

Incident Response Lead

SFIA Skill Code Skill Name Required Level Application in Role
INCAIncident managementLevel 5Ensure effective incident command and coordination
FORSIT forensicsLevel 4-5Enable DFIR and ensure forensic integrity
BURMBusiness risk managementLevel 4-5Enable business impact analysis and ensure risk communication
RLMTRelationship managementLevel 4-5Enable stakeholder coordination including legal and regulatory
GOVNGovernanceLevel 4Enable compliance during incident response
КОМCommunication*Level 5Ensure effective crisis communication

*Note: Using approximation as SFIA doesn't have direct "communication" code

SOC Manager

SFIA Skill Code Skill Name Required Level Application in Role
IRMGInformation securityLevel 5Ensure strategic security operations aligned with business objectives
INCAIncident managementLevel 5Ensure program effectiveness and advise on incident management strategy
PEDGPeople managementLevel 4-5Enable team development and ensure succession planning
BURMBusiness risk managementLevel 4-5Enable risk frameworks and ensure risk-based decisions
CFMGFinancial managementLevel 4-5Enable budget optimization and resource allocation
PRMGProgramme managementLevel 4Enable SOC improvement programs and initiatives
RLMTRelationship managementLevel 4-5Enable executive communication and stakeholder management
MEASMeasurementLevel 4-5Enable advanced metrics and ensure performance reporting

Security Engineer/Architect

SFIA Skill Code Skill Name Required Level Application in Role
ARCHSolution architectureLevel 4-5Enable security architecture design and ensure alignment
SCADSecurity administrationLevel 4-5Enable SIEM/SOAR engineering and ensure optimization
PROGProgramming/software developmentLevel 4Enable API development and integration
DESNSystems designLevel 4Enable security infrastructure design
EMRGVulnerability researchLevel 4Enable detection engineering at scale
HCEVSystems development managementLevel 3-4Apply infrastructure as code (Terraform, Ansible)

Threat Intelligence Analyst

SFIA Skill Code Skill Name Required Level Application in Role
EMRGVulnerability researchLevel 4Enable OSINT collection and threat actor tracking
INCAIncident managementLevel 3-4Apply intelligence to incident context
BUANBusiness analysisLevel 4Enable intelligence analysis and reporting
INFOInformation managementLevel 4Enable indicator management and sharing (STIX, TAXII)
KNOWKnowledge managementLevel 4Enable intelligence documentation and dissemination

Real-World Example

A multinational manufacturing company with 10,000 employees operates a 15-person SOC across two geographies. When behavioral analytics detect anomalous database queries at 2 AM, automated enrichment workflows trigger, SOAR platform creates tickets, and automated containment actions execute while the Tier 2 analyst investigates credential compromise.

Level 4: Managed (Quantitatively Controlled)

Level 4: Managed (Quantitatively Controlled)

Organizational Characteristics

The SOC operates as a strategic business enabler with predictable, measurable outcomes. Advanced analytics, machine learning, and threat intelligence drive decision-making. Performance is measured against industry benchmarks with continuous optimization.

SFIA Skills Required by Role

SOC Analyst (Tier 1) - Foundational Level

SFIA Skill Code Skill Name Required Level Application in Role
INCAIncident managementLevel 4Enable advanced automation and orchestration workflows
SCADSecurity administrationLevel 4-5Enable cross-domain correlation and ensure detection quality
BUANBusiness analysisLevel 4Enable ML alert interpretation and risk-based prioritization
DTANData analysisLevel 3-4Apply advanced analytics to security data
GOVNGovernanceLevel 3-4Apply compliance automation and reporting

SOC Analyst (Tier 2) - Intermediate Level

SFIA Skill Code Skill Name Required Level Application in Role
FORSIT forensicsLevel 4-5Enable advanced forensics and ensure investigative excellence
INCAIncident managementLevel 4-5Enable complex response and ensure incident handling quality
EMRGVulnerability researchLevel 5Ensure threat research quality and advise on emerging threats
PROGProgramming/software developmentLevel 4-5Enable tool development and automation at scale
SCADSecurity administrationLevel 5Ensure security control effectiveness across enterprise
METLMethods and toolsLevel 5Ensure methodology application and tool optimization

SOC Analyst (Tier 3) / Threat Hunter - Expert Level

SFIA Skill Code Skill Name Required Level Application in Role
EMRGVulnerability researchLevel 5-6Ensure advanced threat detection and initiate hunting programs
DTANData analysisLevel 5Ensure analytics-driven threat detection and predictive modeling
INCAIncident managementLevel 5Ensure hunting program effectiveness and advise on threats
SCADSecurity administrationLevel 5Ensure detection engineering excellence
BUANBusiness analysisLevel 5Ensure behavioral analytics and business-aligned threat priorities
PROGProgramming/software developmentLevel 5Ensure automation and advanced tool development
KNOWKnowledge managementLevel 5Ensure knowledge sharing and industry contribution

Incident Response Lead / DFIR Manager

SFIA Skill Code Skill Name Required Level Application in Role
INCAIncident managementLevel 5-6Ensure IR program excellence and initiate strategic improvements
FORSIT forensicsLevel 5-6Ensure forensic program quality and initiate advanced capabilities
BURMBusiness risk managementLevel 5Ensure risk quantification and advise executives
RLMTRelationship managementLevel 5Ensure stakeholder engagement including law enforcement
GOVNGovernanceLevel 5Ensure regulatory compliance and advise on legal matters
METLMethods and toolsLevel 5Ensure methodology adherence and continuous improvement

SOC Manager / SOC Director

SFIA Skill Code Skill Name Required Level Application in Role
IRMGInformation securityLevel 5-6Ensure security operations excellence and initiate strategic programs
INCAIncident managementLevel 5-6Ensure incident program maturity and initiate industry improvements
PEDGPeople managementLevel 5-6Ensure team excellence and initiate talent development programs
BURMBusiness risk managementLevel 5-6Ensure risk-based operations and initiate risk management strategy
CFMGFinancial managementLevel 5Ensure budget effectiveness and value demonstration
PRMGProgramme managementLevel 5Ensure program delivery and strategic initiative success
RLMTRelationship managementLevel 5-6Ensure executive alignment and initiate strategic partnerships
MEASMeasurementLevel 5Ensure metrics program and predictive performance analysis
GOVNGovernanceLevel 5Ensure compliance and advise on security governance

Principal Security Architect

SFIA Skill Code Skill Name Required Level Application in Role
ARCHSolution architectureLevel 5-6Ensure architecture excellence and initiate strategic designs
SCADSecurity administrationLevel 5-6Ensure platform excellence and initiate next-gen capabilities
TECHEmerging technology monitoringLevel 5Ensure awareness of emerging threats and technologies
DESNSystems designLevel 5Ensure design quality and innovation
PROGProgramming/software developmentLevel 5Ensure development standards and automation architecture
IRMGInformation securityLevel 5Ensure security architecture alignment with strategy

Lead Threat Intelligence Analyst

SFIA Skill Code Skill Name Required Level Application in Role
EMRGVulnerability researchLevel 5-6Ensure intelligence program quality and initiate threat research
BUANBusiness analysisLevel 5Ensure intelligence drives business decisions
INFOInformation managementLevel 5Ensure intelligence sharing and industry collaboration
KNOWKnowledge managementLevel 5Ensure knowledge dissemination and thought leadership
RLMTRelationship managementLevel 5Ensure external intelligence partnerships (ISACs, law enforcement)

Security Data Scientist

SFIA Skill Code Skill Name Required Level Application in Role
DTANData analysisLevel 5Ensure advanced analytics and predictive modeling
PROGProgramming/software developmentLevel 4-5Enable ML/AI model development for security
SCADSecurity administrationLevel 4Enable security data pipeline and analytics integration
METLMethods and toolsLevel 5Ensure analytical methodology and statistical rigor

Real-World Example

A global technology company with 50,000 employees operates a 40-person SOC with predictive threat modeling. Machine learning detects credential stuffing patterns before widespread compromise. Automated SOAR playbooks handle 85% of routine incidents. The SOC publishes threat research, shares intelligence with ISACs, and regularly briefs the board with quantified risk metrics. Annual red team exercises show measurable year-over-year improvements in detection and response times.

Level 5: Optimizing (Continuously Improving)

Level 5: Optimizing (Continuously Improving)

Organizational Characteristics

The SOC is an industry leader driving innovation in threat detection and response. Continuous optimization through advanced research, automation, and strategic intelligence. The organization influences industry standards and contributes to the global security community.

SFIA Skills Required by Role

SOC Leadership (Director/VP Level)

SFIA Skill Code Skill Name Required Level Application in Role
IRMGInformation securityLevel 6-7Initiate industry-leading security operations and set organizational strategy
INCAIncident managementLevel 6Initiate global incident response capabilities and influence industry standards
STPLStrategic planningLevel 6-7Set security operations strategy aligned with business transformation
BURMBusiness risk managementLevel 6Initiate risk management innovation and influence enterprise risk strategy
ORDIOrganizational designLevel 5-6Ensure organizational structure supports innovation and strategic goals
PEDGPeople managementLevel 6Initiate talent programs and inspire security professionals globally
RLMTRelationship managementLevel 6-7Initiate strategic partnerships and influence industry direction

Principal/Distinguished Engineer

SFIA Skill Code Skill Name Required Level Application in Role
ARCHSolution architectureLevel 6-7Initiate revolutionary security architectures and set industry direction
TECHEmerging technology monitoringLevel 6Initiate research programs and influence technology adoption
EMRGVulnerability researchLevel 6Initiate advanced research and publish industry-recognized findings
IRMGInformation securityLevel 6Initiate security innovation and influence global security practices

Senior Staff Roles (All Functions)

SFIA Skill Code Skill Name Required Level Application in Role
KNOWKnowledge managementLevel 6Initiate knowledge sharing programs and influence industry education
METLMethods and toolsLevel 6Initiate methodology development and set industry standards
GOVNGovernanceLevel 6Initiate governance frameworks and influence regulatory approaches

Real-World Example

A Fortune 100 financial institution operates a 100+ person global SOC that has published multiple CVEs, contributes to MITRE ATT&CK, and partners with national CERTs. Their custom ML models predict zero-day exploitation with 72-hour lead time. They've open-sourced threat hunting frameworks used by 500+ organizations globally. The CISO regularly testifies before regulatory bodies on cybersecurity best practices.

Implementation Guidance for Organizations

Implementation Guidance for Organizations

Assessing Current Maturity

  1. Conduct SFIA skills assessment for each SOC team member
  2. Map current capabilities against target maturity level
  3. Identify skill gaps using the framework above
  4. Prioritize training and hiring based on business-critical gaps

Career Progression Planning

  • Define clear SFIA level progression paths for each role
  • Establish competency assessments tied to SFIA levels
  • Create professional development plans targeting specific SFIA skills
  • Implement certification requirements aligned with SFIA competencies

Training Recommendations by SFIA Level

Levels 1-2 (Follow/Assist):

  • Security+, Network+, CySA+
  • Vendor certifications (Splunk, Microsoft Security)
  • Basic scripting courses

Levels 3-4 (Apply/Enable):

  • GCIH, GCIA, GCFA, GMON
  • CISSP, CISM
  • Cloud security certifications (AWS/Azure Security Specialty)
  • Advanced programming courses

Levels 5-6 (Ensure/Initiate):

  • GIAC Advanced certifications (GSE)
  • CISM, CISA, CRISC
  • Executive security programs
  • Research and publication

Sri Lankan Context Considerations

  • Adapt training to local certification availability
  • Consider remote/online options for advanced certifications
  • Leverage regional ISACA, (ISC)², and SANS events
  • Build partnerships with local universities for talent pipeline
  • Account for salary benchmarks appropriate to Sri Lankan market when defining roles

Exam-Style Assessment Questions

Exam-Style Assessment Questions

Question 1: Analyze a SOC operating with SIEM deployed but no documented playbooks, 8x5 coverage, and manual incident response. Identify the maturity level and list five SFIA skills (with target levels) that must be developed to progress to the next maturity level.

Question 2: A SOC Manager (IRMG Level 4, INCA Level 4) wants to implement threat hunting capabilities. Map the required SFIA skills and levels for a new Threat Hunter role at Maturity Level 3. Justify each skill selection.

Question 3: Compare the SFIA skill requirements for a Tier 2 SOC Analyst at Maturity Level 2 versus Level 4. Explain how the FORS, EMRG, and PROG skills evolve across these levels.

This framework provides a structured, SFIA-aligned approach to SOC maturity assessment and workforce development suitable for academic instruction, professional development, and organizational planning.