Senior Secops System
Comprehensive skill designed for comprehensive, secops, skill, application. Includes structured workflows, validation checks, and reusable patterns for development.
Senior SecOps System
A comprehensive skill for senior security operations engineers covering threat detection, incident response, security monitoring, vulnerability management, and security automation in cloud-native environments.
When to Use This Skill
Choose this skill when:
- Setting up security monitoring and SIEM/SOAR pipelines
- Building automated threat detection and response workflows
- Implementing vulnerability scanning and patch management processes
- Designing security incident response procedures and runbooks
- Hardening cloud infrastructure and container security
Consider alternatives when:
- Writing secure application code → use a security compliance skill
- Doing penetration testing → use a security testing skill
- Setting up authentication/authorization → use an auth skill
- Managing network firewalls only → use a network security skill
Quick Start
# Security monitoring pipeline with Falco rules - rule: Detect shell in container desc: Alert when a shell is spawned inside a container condition: > container.id != host and proc.name in (bash, sh, zsh, csh) and not proc.pname in (allowed_parent_processes) output: "Shell spawned in container (user=%user.name container=%container.name image=%container.image.repository cmd=%proc.cmdline)" priority: WARNING tags: [container, shell] - rule: Detect sensitive file access desc: Alert on read access to sensitive files condition: > open_read and fd.name in (/etc/shadow, /etc/passwd, /root/.ssh/authorized_keys) and not proc.name in (sshd, login, passwd) output: "Sensitive file access (user=%user.name file=%fd.name proc=%proc.name)" priority: CRITICAL tags: [filesystem, sensitive]
Core Concepts
Security Operations Framework
| Domain | Tools | Objective |
|---|---|---|
| Detection | SIEM, IDS/IPS, Falco | Identify threats in real-time |
| Response | SOAR, runbooks, IR plan | Contain and remediate incidents |
| Vulnerability Mgmt | Trivy, Grype, Snyk | Find and fix known vulnerabilities |
| Compliance | CIS Benchmarks, policies | Meet regulatory requirements |
| Threat Intel | MITRE ATT&CK, feeds | Understand adversary tactics |
| Forensics | Log analysis, memory dumps | Post-incident investigation |
Automated Incident Response
# SOAR playbook for compromised credentials class CredentialCompromisePlaybook: def __init__(self, siem_client, iam_client, notify_client): self.siem = siem_client self.iam = iam_client self.notify = notify_client async def execute(self, alert: SecurityAlert): # 1. Containment — disable compromised account user = alert.metadata['username'] await self.iam.disable_user(user) await self.iam.revoke_all_sessions(user) # 2. Investigation — gather evidence login_history = await self.siem.query( f'user:{user} AND event_type:login', timerange='7d' ) anomalous_ips = [l for l in login_history if l.geo_risk > 0.7] affected_resources = await self.siem.query( f'user:{user} AND event_type:data_access', timerange='24h' ) # 3. Notification await self.notify.send_incident( severity='HIGH', title=f'Compromised credentials: {user}', details={ 'anomalous_logins': len(anomalous_ips), 'resources_accessed': len(affected_resources), 'containment_status': 'Account disabled, sessions revoked', }, ) # 4. Remediation — force password reset await self.iam.force_password_reset(user) return IncidentReport(status='contained', user=user)
Vulnerability Management Pipeline
# Container image scanning in CI/CD # Scan with Trivy — fail on HIGH/CRITICAL trivy image --severity HIGH,CRITICAL --exit-code 1 \ --ignore-unfixed myapp:$TAG # Dependency scanning trivy fs --security-checks vuln,secret,config \ --severity HIGH,CRITICAL . # Infrastructure scanning trivy config --severity HIGH,CRITICAL \ --policy ./security-policies/ ./terraform/
Configuration
| Parameter | Type | Default | Description |
|---|---|---|---|
siemPlatform | string | 'elastic' | SIEM: elastic, splunk, or sentinel |
scanSchedule | string | 'daily' | Vulnerability scan frequency |
severityThreshold | string | 'HIGH' | Minimum severity to alert on |
responseTimeTarget | object | {critical: '15m', high: '1h'} | Incident response SLA |
complianceFramework | string | 'cis' | Compliance: CIS, SOC2, PCI-DSS, or HIPAA |
retentionDays | number | 365 | Security log retention period |
Best Practices
-
Automate detection and containment, escalate investigation — Credential revocation, IP blocking, and container isolation can be automated safely. Investigation and root cause analysis require human judgment. Automate the first 5 minutes of every incident.
-
Build detection rules from MITRE ATT&CK framework — Map your detection coverage to ATT&CK techniques. Identify gaps in your detection matrix and prioritize rules that cover the most common attack patterns for your industry.
-
Scan containers and dependencies in CI, not just registries — Catching a vulnerable dependency in a pull request is cheaper than discovering it in production. Block merges with known critical CVEs and provide automated fix suggestions.
-
Maintain an asset inventory linked to vulnerability data — You can't secure what you don't know about. Automatically discover all cloud resources, containers, and endpoints. Link vulnerability scan results to asset owners for accountability.
-
Practice incident response through tabletop exercises — Monthly tabletop exercises keep response procedures sharp and reveal gaps in runbooks. Simulate realistic scenarios: ransomware, data breach, supply chain compromise, insider threat.
Common Issues
Alert fatigue from too many low-priority detections — Tune detection rules with contextual enrichment: a failed login from a known VPN IP is different from one from a TOR exit node. Use risk scoring to prioritize alerts and suppress low-confidence detections.
Vulnerability scan results overwhelm developers — Thousands of CVEs with no prioritization leads to nothing getting fixed. Filter by exploitability (EPSS score), reachability (is the vulnerable function actually called?), and environment exposure (internet-facing vs internal).
Incident response playbooks not tested regularly — Written procedures that haven't been exercised fail under pressure. Schedule quarterly fire drills, rotate incident commanders, and update runbooks after every real incident with lessons learned.
Reviews
No reviews yet. Be the first to review this template!
Similar Templates
Full-Stack Code Reviewer
Comprehensive code review skill that checks for security vulnerabilities, performance issues, accessibility, and best practices across frontend and backend code.
Test Suite Generator
Generates comprehensive test suites with unit tests, integration tests, and edge cases. Supports Jest, Vitest, Pytest, and Go testing.
Pro Architecture Workspace
Battle-tested skill for architectural, decision, making, framework. Includes structured workflows, validation checks, and reusable patterns for development.