Cybersecurity & AI Security · Security Guide

What Is a Security Operations Center (SOC)?

A SOC monitors for and responds to threats 24/7. Here is how SOCs work, the three SOC models for financial institutions, and the metrics that measure real-world effectiveness.

ATM Fortify Security Team Payment fraud & ATM security specialists — Updated February 2026

Last Updated: February 2026


Key Takeaways:

  • A SOC is the combination of people, processes, and technology that monitors for, detects, and responds to security threats around the clock
  • Financial institutions without a SOC rely on perimeter defences — which fail silently when breached, leaving attackers undetected for an average of 204 days
  • Three SOC models exist: in-house, outsourced (MSSP), and hybrid — most mid-size banks and credit unions benefit from a hybrid approach
  • MTTD (Mean Time to Detect) and MTTR (Mean Time to Respond) are the two metrics that determine a SOC's real-world effectiveness
  • ATM network monitoring requires specialised SIEM rules and playbooks that standard SOC vendors may not include without customisation

When a financial institution is breached, the question asked in the post-mortem is almost never "how did they get in?" It is "why did it take us so long to notice?"

The IBM Cost of a Data Breach Report consistently shows that financial sector breaches remain undetected for an average of over six months. During those months, attackers extract cardholder data, install persistence mechanisms, and conduct reconnaissance at their leisure.

A Security Operations Center (SOC) exists to close that gap — to reduce dwell time from months to hours.


What Is a Security Operations Center (SOC)?

A Security Operations Center is a dedicated team — supported by specific tools and defined processes — responsible for monitoring an organisation's security posture in real time, detecting threats, and coordinating the response to security incidents.

The SOC is the nerve centre of an organisation's defensive capability. It is where alerts are triaged, incidents are investigated, and response actions are executed.

Quick Definition: A SOC (Security Operations Center) is the combination of people, processes, and technology that provides continuous monitoring and analysis of an organisation's security posture, with the goal of preventing, detecting, and responding to cybersecurity threats.

A SOC is distinct from:

  • IT operations (which manages availability and performance, not security)
  • Network operations (NOC — focused on uptime, not threat detection)
  • IT security teams (who set policy and manage controls) — though in smaller organisations, these may overlap

What a SOC Does: Core Functions

A mature SOC performs seven core functions:

1. Continuous monitoring. Security events from across the environment — endpoints, servers, network devices, cloud services, ATM management systems — are ingested into the SIEM. Analysts review alert queues 24 hours a day.

2. Alert triage. The SOC receives thousands of alerts per day. Tier 1 analysts triage each alert: is this a true positive, a false positive, or a benign event that needs no action?

3. Threat detection. Beyond rules-based alerts, mature SOCs use behavioural analytics and threat hunting to identify patterns that rules miss — slow reconnaissance, credential harvesting, lateral movement using legitimate tools.

4. Incident investigation. When a credible threat is confirmed, Tier 2 analysts investigate the full scope: what was accessed, how far did the attacker get, what data may have been exfiltrated.

5. Incident response. The SOC coordinates containment and remediation — isolating affected systems, blocking malicious IPs, resetting compromised credentials, and preserving forensic evidence.

6. Threat intelligence. SOCs consume threat intelligence from commercial feeds, ISACs (Information Sharing and Analysis Centres), and open sources to understand current adversary tactics and update detection rules accordingly.

7. Reporting and improvement. SOC metrics, trend analysis, and post-incident reports inform the organisation's risk posture and drive continuous improvement.


SOC Structure: Analyst Tiers Explained

Most SOC models use a tiered analyst structure:

Tier 1 — Alert Triage Analyst

Tier 1 analysts monitor alert queues and make the initial determination: real threat, false positive, or needs escalation. They follow documented playbooks and work high volume with defined response time targets (typically 15–30 minutes per alert).

Focus: Volume management, initial classification, playbook execution.

Tier 2 — Incident Investigator

Tier 2 analysts handle escalations from Tier 1. They conduct deeper forensic analysis: reviewing log correlations, examining endpoint telemetry, mapping the incident to the MITRE ATT&CK framework, and determining full scope.

Focus: Investigation depth, scope determination, root cause analysis.

Tier 3 — Threat Hunter / Senior Responder

Tier 3 analysts proactively hunt for threats that have evaded automated detection. They assume breach and look for indicators of compromise (IOCs) that do not trigger rules — unusual authentication patterns, subtle data staging, slow credential enumeration.

Focus: Proactive detection, complex incident response, capability development.

Tier 4 — Threat Intelligence / Red Team (Larger SOCs)

The most mature SOCs include dedicated threat intelligence analysts who contextualise threat actor activity and advise on defensive priorities. Some also maintain a red team that continuously tests the SOC's detection capability.

Focus: Strategic intelligence, adversary emulation, detection engineering.


The Three SOC Models: In-House, MSSP, Hybrid

The right SOC model depends on institution size, budget, and risk tolerance.

In-House SOC

All analysts, tooling, and processes are owned and operated internally.

Best for: Large financial institutions with complex, highly regulated environments and budget for 8–15 full-time security analysts.

Advantages: Full control over detection rules, deep institutional knowledge, no data residency issues.

Disadvantages: Expensive (fully-staffed 24/7 SOC requires 8–10 analysts minimum), difficult to staff specialised roles, knowledge concentration risk.

Outsourced SOC (MSSP — Managed Security Service Provider)

A third-party provider delivers SOC services — monitoring, detection, and basic response — typically via a shared SOC model serving multiple clients.

Best for: Smaller community banks, credit unions, and fintechs that need 24/7 coverage but cannot justify in-house staffing.

Advantages: Immediate 24/7 coverage, access to broad threat intelligence, predictable cost model.

Disadvantages: Shared attention across many clients, generic detection rules not tailored to your environment, potential latency in response authorisation.

Hybrid SOC

Internal staff handle business-hours monitoring, complex investigations, and institutional knowledge development. An MSSP provides 24/7 coverage for out-of-hours monitoring and escalation.

Best for: Mid-size financial institutions (100–2,000 staff) — the most common model for regional banks, building societies, and established fintechs.

Advantages: Balance of control and coverage, internal expertise development, cost efficiency.

Disadvantages: Requires strong coordination processes between internal and MSSP teams; inconsistent handoffs are a risk.


Core SOC Technologies

SIEM — Security Information and Event Management

The SIEM is the SOC's data backbone. It collects, normalises, and correlates security events from across the environment — providing the unified view analysts need and the correlation rules that generate alerts.

Key SIEM capabilities for financial institutions:

  • Log ingestion from ATM management servers, core banking applications, HSMs, and payment gateways
  • Correlation rules for payment fraud patterns (unusual ATM cash withdrawal volumes, management server authentication anomalies)
  • Compliance reporting for PCI DSS and ISO 27001 audit requirements

Leading platforms: Microsoft Sentinel, Splunk ES, IBM QRadar, Elastic SIEM.

SOAR — Security Orchestration, Automation and Response

SOAR platforms automate repetitive SOC tasks and orchestrate response workflows. When a phishing alert fires, a SOAR playbook can automatically extract the malicious URL, check it against threat intelligence, block it at the email gateway, and notify the affected user — all without human intervention.

For financial sector SOCs, SOAR playbooks are particularly valuable for:

  • Automated IOC blocking (malicious IP enrichment and firewall rule push)
  • Phishing response automation
  • Compromised credential response (force MFA re-registration, disable account pending investigation)

EDR / XDR — Endpoint Detection and Response / Extended Detection and Response

EDR agents on endpoints provide detailed process telemetry, enabling the SOC to see exactly what happened on a compromised machine — which processes ran, what files were created or modified, what network connections were made. XDR extends this visibility across network, cloud, and identity layers.

Threat Intelligence Platform (TIP)

A TIP aggregates indicators of compromise (IPs, domains, file hashes, TTPs) from commercial, open-source, and sector-specific feeds (FS-ISAC for financial services) and makes them available for SIEM correlation and analyst enrichment.


SOC Monitoring for ATM and Payment Systems

Standard SOC playbooks are written for corporate IT environments — Windows endpoints, Active Directory, cloud workloads. ATM and payment network monitoring requires additional customisation.

ATM-specific SIEM rules financial institutions should implement:

  • Unusual ATM cash dispense volumes (dispensing patterns outside statistical norms for the machine's location and history)
  • ATM management server authentication outside business hours or from unexpected source IPs
  • ATM communication with unexpected external IP addresses (potential C2 contact or data exfiltration)
  • ATM application process anomalies (XFS service restarts, new processes in ATM directories)
  • PIN network traffic deviations (unexpected protocols or destination addresses on the PIN processing path)
  • Physical access sensor events correlated with ATM network events (door open + unusual process launch = potential jackpotting attempt)

Payment gateway monitoring:

  • Transaction volume anomalies by card BIN range
  • High-velocity transactions from a single terminal in short windows
  • Transactions from disabled or test terminals
  • Authentication failures on cardholder data environments

Cybersecurity & AI Security


Key SOC Metrics: How to Measure Effectiveness

Two metrics matter most:

Mean Time to Detect (MTTD) — Average time from the moment a threat enters the environment to when the SOC identifies it. Industry benchmark for mature SOCs: under 24 hours. Average for organisations without a SOC: 204 days.

Mean Time to Respond (MTTR) — Average time from detection to containment. Benchmark for mature SOCs: under 4 hours for critical incidents.

Supporting metrics:

  • False Positive Rate — percentage of alerts that are not genuine threats; high false positive rates cause analyst fatigue and missed real incidents
  • Alert Volume per Analyst per Day — sustainable range is 20–40 high-fidelity alerts; above this, triage quality degrades
  • Coverage — percentage of the environment generating security telemetry; gaps in coverage mean blind spots
  • Escalation Accuracy — proportion of Tier 1 escalations that Tier 2 confirms as genuine threats; indicates Tier 1 triage quality

Building or Selecting a SOC: Decision Framework

When evaluating whether to build or buy:

Build if: You have more than 1,000 employees, operate complex payment infrastructure, have regulatory requirements for data residency, or require deep institutional expertise in ATM and payment-specific threat patterns.

Buy (MSSP) if: You have fewer than 500 employees, need immediate 24/7 coverage, lack internal security expertise, or have a limited security budget.

Hybrid if: You fall between these scenarios, want to build internal capability over time, or have mixed environments (cloud-native + legacy ATM) that benefit from both generic cloud expertise and institutional knowledge.

Key questions to ask an MSSP:

  1. Do you have experience monitoring ATM management systems and payment gateways?
  2. Can you provide customised SIEM rules for our ATM vendor's management platform?
  3. What is your average MTTD and MTTR, broken down by incident severity?
  4. How do you handle escalation authorisation? Who has authority to isolate systems at 3am?
  5. What is your data residency model, and is it compatible with our regulatory obligations?

SOC Implementation Checklist

  • SOC model selected (in-house / MSSP / hybrid) based on size, budget, and risk
  • SIEM deployed and ingesting logs from all critical systems (core banking, ATM management, CDE, endpoints, network devices)
  • ATM-specific detection rules configured in SIEM
  • SOAR playbooks built for top 5 incident types (phishing, compromised credential, ATM anomaly, malware, ransomware)
  • EDR deployed on all managed endpoints and servers
  • Threat intelligence feeds integrated (FS-ISAC, commercial TIP)
  • SOC analyst team staffed at appropriate tiers with documented escalation paths
  • Response authority matrix documented (who can isolate which systems at what time)
  • MTTD and MTTR baseline established and tracked monthly
  • ATM management system access monitored and anomalies alerted
  • SOC log retention meets PCI DSS requirement (12 months, 3 months immediately available)
  • Annual red team exercise tests SOC detection capability

Frequently Asked Questions

Q: Does every financial institution need a SOC? A: Every financial institution needs 24/7 security monitoring — how that is delivered depends on scale and resources. A SOC is the structured way to deliver it. Very small institutions (under 50 staff) may satisfy requirements through a well-configured MSSP service. But the monitoring, detection, and response capabilities a SOC provides are not optional for any institution handling cardholder data or operating ATMs.

Q: What is the difference between a SOC and a NOC? A: A NOC (Network Operations Center) monitors network and system availability — uptime, latency, capacity. A SOC monitors security — threats, attacks, anomalies. They use overlapping data sources but have different alert definitions, escalation paths, and response actions. Some organisations co-locate their SOC and NOC for operational efficiency, but the functions remain distinct.

Q: How many people do you need for a 24/7 in-house SOC? A: To cover 24/7 with four 8-hour shifts, full redundancy, and reasonable PTO coverage, you need a minimum of 8–10 analysts across Tier 1 and Tier 2, plus a SOC manager. Adding a dedicated Tier 3 threat hunter and an intelligence analyst brings the team to 10–12. This is why most organisations under 2,000 employees choose hybrid or outsourced models.

Q: What is SIEM and do we need one? A: A SIEM (Security Information and Event Management) platform is the data backbone of any SOC — it collects logs and security events from across the environment, correlates them to identify threats, and provides the analyst interface. Any organisation that wants to detect threats needs centralised log collection and correlation. Whether you use a full SIEM platform or a lighter cloud-native logging solution depends on your volume and compliance requirements, but the capability is essential.

Q: How does the SOC interact with our incident response team? A: In most organisations, the SOC and incident response (IR) capability are related but distinct. The SOC detects and triages. When an incident crosses a severity threshold, it is handed to (or escalated within the SOC to) a senior IR team that handles containment, eradication, and recovery. In smaller organisations, the same people perform both functions. The handoff process — who declares an incident, who leads containment, who has authority to isolate systems — must be documented before it is needed.



CTA

Does your institution have 24/7 security monitoring in place?

ATM Fortify's SOC consulting and managed security services are designed for financial institutions — including specialised ATM network monitoring, SIEM rule development, and MSSP selection support. Explore Cybersecurity Services →


Last Updated: February 2026 | This guide is for educational purposes. Consult a qualified security professional when designing or selecting a SOC.

Need Professional ATM Security Support?

ATM Fortify provides anti-skimming hardware, security assessments, and fraud prevention consulting for ATM operators and financial institutions across 30+ countries.

Enterprise Cybersecurity Services Request a Security Assessment