{"id":78816,"date":"2023-04-14T12:42:54","date_gmt":"2023-04-14T12:42:54","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=78816"},"modified":"2026-02-25T05:32:09","modified_gmt":"2026-02-25T05:32:09","slug":"expert-insights-modern-soc-automation-pravin-ganesan","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/","title":{"rendered":"Expert Insights: Modern SOC Automation &#8211; The New L1 Analyst"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"78816\" class=\"elementor elementor-78816\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-687b741 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"687b741\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7a21d6c\" data-id=\"7a21d6c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9163f24 elementor-widget elementor-widget-heading\" data-id=\"9163f24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Modern SOC Automation - The New L1 Analyst<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5be3b3 elementor-widget elementor-widget-text-editor\" data-id=\"f5be3b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Security Operation Center (SOC) is vital to keeping your organization safe in today&#8217;s evolving cybersecurity landscape and novel technologies. Rapid deployment of new technologies like cloud computing, the Internet of Things (IoT), and mobile devices have all widened the attack surfaces for organizations. SOCs must adapt to these changes and devise strategies to secure these new technologies while mitigating their risks. We must look into improving SOC operations by using modernized tools.<\/p>\n<p>Cybersecurity Exchange got in touch with Praveen Ganesa, Senior Security Analyst at RHB, Malaysia, to discuss the emerging trends and challenges associated with SOCs. He has over seven years of demonstrated experience working in the information technology and services industry. Praveen is a network and information technology professional with a degree in networking and security. He has both skills and foundational education associated with digital security. He also has extensive experience in information security, which includes using SIEM tools and monitoring systems, conducting security incident response, managing information security policies and standards, performing vulnerability assessments, and carrying out SOC operations.<\/p>\n<p>Praveen offered a few key insights and tips for security teams on managing security operations seamlessly in today\u2019s digital age.<\/p>\n<h2>Edited excerpts from the interview are as follows:<\/h2>\n<h2>1. What are the biggest challenges you face as a SOC practitioner?<\/h2>\n<p>One of the few challenges that I face is the need for more resources. As a SOC, we are constantly growing and onboarding multiple new technologies to secure the organization. By doing so, we are increasing the amount of data intake into the SIEM, which leads to the creation of new use cases. With the increase in events or alerts in the SIEM and the lack of resources to handle them promptly, there are instances in which we will miss out on an alert from a different tool. So, the best-case scenario is first handling events with a higher severity rating.<\/p>\n<p>Besides that, analyzing the existing tools in the market and determining the most suitable tool are the biggest challenges. Many SOARs or SIEM tools are available in the market, and all of them have features that can help the organization, but ultimately the main factor besides the relevance is the price. We have a fixed number of resources, and implementation should yield results. Stakeholders want to know the benefits of having a particular technology and its cost, so even after its implementation, we must ensure the technology is worth the investment.<\/p>\n<h2>2. What are some of the most exciting developments in the industry over the past year?<\/h2>\n<p>Well, one of the exciting technologies that caught my attention is user behavior analytics (UBA). User behavior analytics is a cybersecurity process for detecting insider threats, targeted attacks, and financial fraud that tracks a system&#8217;s users. UBA looks for patterns in human behavior and then analyzes their findings to detect potential threats. UBA solutions use artificial intelligence (AI) and machine learning (ML) to analyze large datasets to identify patterns that indicate security breaches, data exfiltration, or other malicious activity that might otherwise go unnoticed by security, IT, and network operations personnel.<\/p>\n<h2>3. How do you think SOC operations will change in the future?<\/h2>\n<p>In the future, there won&#8217;t be an L1 analyst in SOC, as most of the tasks and analysis might be automated, and what used to be a monitoring scope might change into a response and action scope. So once the automated process checks and even detects it as suspicious, a SOC analyst would have to further confirm this detection and follow the relevant SOP to act. But ultimately, even if the process gets automated, the final touch or call will fall to humans. So even if an AI determines that an activity is malicious, a human analyst will have the final say.<\/p>\n<h2>4. What is the most beneficial aspect of modernizing SOC operations?<\/h2>\n<p>Modernizing SOC will improve the security posture and, hopefully, reduce costs. Tools such as extended detection and response (XDR) that collect threat data from previously siloed security tools across an organization&#8217;s technology stack for easier and faster investigation, threat hunting, and response will seem better than a modern SOC. When we look into improving our SOC operations, having tools that cover all domains would be efficient. Implementing unique technology for each domain will make it more secure but won&#8217;t be cost-effective. <\/p>\n<h2>5. What are some challenges of implementing a modernized SOC operation?<\/h2>\n<p>The migration of current technology to newer technology. We must consider the compatibility and synchronization ability with other technologies within the organization&#8217;s environments. There are cases whereby only a specific version of the operating system is supported or only a particular log type is readable by the tool. These elements will fall into place if we try to build a stable ecosystem. Understanding the interaction between the technologies will be taxing, and implementing and testing its functionality is another tedious journey. Another challenge will be the all-time factor of time and money: the time it takes to complete the implementation and the project cost will always be a factor to be considered. Even after implementing new technologies or event policies, we would need to train the current support team to prepare for the newer technologies. This training also takes up resources, but it&#8217;s required.<\/p>\n<h2>6. In what ways can companies benefit from implementing a modernized SOC operation?<\/h2>\n<p>Hopefully, the SOC analyst workload will be reduced with the correct implementation. Companies will have much more streamlined security processes and better postures. If the current performance is ironclad, it will save them money in the near future, and companies can redirect these resources to upskill internal talents.<\/p>\n<h2>\n7. What does it take to be successful with a modernized SOC operation?<\/h2>\n<p>Proper planning and understanding of the current and future requirements of the organization. To ensure the flawless operation of SOC for the organization, we need to understand the existing issues and potential risks. By forming a strategy around it, we should be able to create a fully functional next-gen SOC that meets the stakeholder&#8217;s objectives.<\/p>\n<h2>8. Do you have any tips for aspiring professionals interested in learning more about modernizing SOC operations?<\/h2>\n<p>Well, most SIEM or technology providers will have their own version of SOC modernizing. Comparing different technology definitions of SOC modernizing will give you a clear understanding. Once you have studied or established your organization\u2019s goals and targets, focus more on the technology matching the criteria. Always look into future trends and threats because the threat landscape is constantly evolving, so it\u2019s best to prepare ourselves by understanding how much technology could address them.<\/p>\n<h2>9. What does it mean to be a SOC practitioner today, and how has your role changed over time?<\/h2>\n<p>The primary role involves more technologies and investigations, so I can&#8217;t say how it has changed. But as an analyst, the roles are migrating to be more proactive rather than reactive, so that&#8217;s a significant change that has to be noted. Analysts have to be on their feet and stay vigilant about existing and potential threats since we have to gather the relevant indicators of compromise and provide them to our FW and AV teams for blocking.<\/p>\n<h2>10. Is there anything else you&#8217;d like to add about your role as a SOC practitioner today or any other thoughts on how modernized SOC operations are shaping the future of security?<\/h2>\n<p>The main takeaway from this is that the security domain and threat landscape is growing side by side, and as a SOC practitioner, I have to be aware of these changes. We need to ensure that the right policies and rules are in place. We need to make sure the current technology that we have in place will be able to protect us from a zero-day attack. It&#8217;s a nearly impossible task, but we must cover all grounds. My suggestion is more of a rule of thumb: educate the organization&#8217;s staff and members. Cybersecurity awareness training should be enforced in organizations to ensure all members are aware of or have a common understanding of potential security risks. Most attacks directly result from phishing, where users either click on malicious links or download malicious attachments because the source looks legitimate. With proper cybersecurity education, we can reduce these types of risks.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6105ee0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6105ee0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf7a447\" data-id=\"cf7a447\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4085eb elementor-widget elementor-widget-heading\" data-id=\"f4085eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Tags<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b049d tags-cloud elementor-widget elementor-widget-post-info\" data-id=\"d6b049d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-f2e3860 elementor-inline-item\" itemprop=\"about\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-terms\">\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-post-info__terms-list\">\n\t\t\t\t<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/cybersecurity\/\" class=\"elementor-post-info__terms-list-item\">cybersecurity<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/l1-analyst\/\" class=\"elementor-post-info__terms-list-item\">L1 Analyst<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/modern-soc-automation\/\" class=\"elementor-post-info__terms-list-item\">Modern SOC Automation<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/security-operations-center\/\" class=\"elementor-post-info__terms-list-item\">Security Operations Center<\/a>, <a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/tag\/soc-automation-technologies-cybersecurity-expert-interview\/\" class=\"elementor-post-info__terms-list-item\">SOC Automation Technologies Cybersecurity Expert Interview<\/a>\t\t\t\t<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ca10a3d elementor-widget elementor-widget-heading\" data-id=\"ca10a3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">About the Author<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b25fc15 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b25fc15\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ad8907a\" data-id=\"ad8907a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3c33184 elementor-widget elementor-widget-image\" data-id=\"3c33184\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Pravin.jpg\" class=\"attachment-large size-large wp-image-78818\" alt=\"Pravin\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Pravin.jpg 800w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Pravin-300x300.jpg 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Pravin-150x150.jpg 150w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/05\/Pravin-768x768.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-682db3f elementor-widget elementor-widget-heading\" data-id=\"682db3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\nPravin Ganesan \n<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50796a0 elementor-widget elementor-widget-text-editor\" data-id=\"50796a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Senior Security Analyst, RHB Banking Group<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7b95568\" data-id=\"7b95568\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7257a2b elementor-widget elementor-widget-text-editor\" data-id=\"7257a2b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Pravin Ganesan works as a senior security analyst in Malaysia. He has over seven years of demonstrated experience working in the information technology and services industry. Pravin is a network and information technology professional with a degree in networking and security. He has both skills and foundational education associated with digital security. He also has extensive experience in information security, which includes using SIEM tools and monitoring systems, conducting security incident response, managing information security policies and standards, performing vulnerability assessments, and carrying out SOC operations.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Modern SOC Automation &#8211; The New L1 Analyst The Security Operation Center (SOC) is vital to keeping your organization safe in today&#8217;s evolving cybersecurity landscape and novel technologies. Rapid deployment of new technologies like cloud computing, the Internet of Things (IoT), and mobile devices have all widened the attack surfaces for organizations. SOCs must adapt&hellip;<\/p>\n","protected":false},"author":64,"featured_media":81191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12444],"tags":[199,12453,12452,12454,12455],"class_list":{"0":"post-78816","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-interview","8":"tag-cybersecurity","9":"tag-l1-analyst","10":"tag-modern-soc-automation","11":"tag-security-operations-center","12":"tag-soc-automation-technologies-cybersecurity-expert-interview"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expert Insights: Modern SOC Automation - The New L1 Analyst<\/title>\n<meta name=\"description\" content=\"Discover the role of modern SOC automation and the impact it has on the traditional L1 analyst position. In this interview, Pravin Ganesan, Senior Security Analyst at the RHB Banking Group provides valuable insights and challenges that SOC analysts face today and how can one reduce these risks..\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Expert Insights: Modern SOC Automation - The New L1 Analyst\" \/>\n<meta property=\"og:description\" content=\"Discover the role of modern SOC automation and the impact it has on the traditional L1 analyst position. In this interview, Pravin Ganesan, Senior Security Analyst at the RHB Banking Group provides valuable insights and challenges that SOC analysts face today and how can one reduce these risks..\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-14T12:42:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T05:32:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/expert-insights-modern-soc-automation-pravin-ganesan-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pravin Ganesan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pravin Ganesan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/\"},\"author\":{\"name\":\"Pravin Ganesan\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/e0273fe1174ef0595c62acc52ba8e666\"},\"headline\":\"Expert Insights: Modern SOC Automation &#8211; The New L1 Analyst\",\"datePublished\":\"2023-04-14T12:42:54+00:00\",\"dateModified\":\"2026-02-25T05:32:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/\"},\"wordCount\":1493,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg\",\"keywords\":[\"cybersecurity\",\"L1 Analyst\",\"Modern SOC Automation\",\"Security Operations Center\",\"SOC Automation Technologies Cybersecurity Expert Interview\"],\"articleSection\":[\"Interview\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/\",\"name\":\"Expert Insights: Modern SOC Automation - The New L1 Analyst\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg\",\"datePublished\":\"2023-04-14T12:42:54+00:00\",\"dateModified\":\"2026-02-25T05:32:09+00:00\",\"description\":\"Discover the role of modern SOC automation and the impact it has on the traditional L1 analyst position. In this interview, Pravin Ganesan, Senior Security Analyst at the RHB Banking Group provides valuable insights and challenges that SOC analysts face today and how can one reduce these risks..\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg\",\"width\":521,\"height\":521,\"caption\":\"Modern SOC Automation\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/interview\\\/expert-insights-modern-soc-automation-pravin-ganesan\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Interview\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/interview\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Expert Insights: Modern SOC Automation &#8211; The New L1 Analyst\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/e0273fe1174ef0595c62acc52ba8e666\",\"name\":\"Pravin Ganesan\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expert Insights: Modern SOC Automation - The New L1 Analyst","description":"Discover the role of modern SOC automation and the impact it has on the traditional L1 analyst position. In this interview, Pravin Ganesan, Senior Security Analyst at the RHB Banking Group provides valuable insights and challenges that SOC analysts face today and how can one reduce these risks..","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/","og_locale":"en_US","og_type":"article","og_title":"Expert Insights: Modern SOC Automation - The New L1 Analyst","og_description":"Discover the role of modern SOC automation and the impact it has on the traditional L1 analyst position. In this interview, Pravin Ganesan, Senior Security Analyst at the RHB Banking Group provides valuable insights and challenges that SOC analysts face today and how can one reduce these risks..","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2023-04-14T12:42:54+00:00","article_modified_time":"2026-02-25T05:32:09+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/expert-insights-modern-soc-automation-pravin-ganesan-feature.jpg","type":"image\/jpeg"}],"author":"Pravin Ganesan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pravin Ganesan","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/"},"author":{"name":"Pravin Ganesan","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/e0273fe1174ef0595c62acc52ba8e666"},"headline":"Expert Insights: Modern SOC Automation &#8211; The New L1 Analyst","datePublished":"2023-04-14T12:42:54+00:00","dateModified":"2026-02-25T05:32:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/"},"wordCount":1493,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg","keywords":["cybersecurity","L1 Analyst","Modern SOC Automation","Security Operations Center","SOC Automation Technologies Cybersecurity Expert Interview"],"articleSection":["Interview"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/","name":"Expert Insights: Modern SOC Automation - The New L1 Analyst","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg","datePublished":"2023-04-14T12:42:54+00:00","dateModified":"2026-02-25T05:32:09+00:00","description":"Discover the role of modern SOC automation and the impact it has on the traditional L1 analyst position. In this interview, Pravin Ganesan, Senior Security Analyst at the RHB Banking Group provides valuable insights and challenges that SOC analysts face today and how can one reduce these risks..","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/04\/expert-insights-modern-soc-automation-pravin-ganesan-mobile.jpg","width":521,"height":521,"caption":"Modern SOC Automation"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/interview\/expert-insights-modern-soc-automation-pravin-ganesan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Interview","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/interview\/"},{"@type":"ListItem","position":4,"name":"Expert Insights: Modern SOC Automation &#8211; The New L1 Analyst"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/e0273fe1174ef0595c62acc52ba8e666","name":"Pravin Ganesan"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78816","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/64"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=78816"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/78816\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81191"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=78816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=78816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=78816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}