🚨 Iceman's Icecreams — Incident Response Walkthrough

Written by: Aryan Giri

🍦 Company: Iceman’s Icecreams

A cyberattack happens.
Attackers try to access the owner’s old high-school results stored in the company database.

Here is the full story of what happens step-by-step, with every SOC role involved.


🏢 1. Who Works Inside a SOC? (Your Characters)

Inside Iceman’s Icecreams SOC, we have:

👨‍💻 L1 SOC Analyst

Monitors alerts and triage.

🕵️‍♂️ L2 SOC Analyst

Investigates deeper, analyzes logs.

🧠 L3 SOC Analyst / Detection Engineer

Builds detection rules, handles advanced cases.

🚨 Incident Responder / CSIRT

Handles containment, remediation, recovery.

🔍 Threat Intelligence Analyst

Checks attacker IPs, domains, and patterns with safe TI sources.

🛠️ SOC Manager

Coordinates the whole team, communicates with leadership.

No one attacks anything — all actions are defensive.


🚨 2. The Attack Begins — What Triggers an Alert?

The attackers try some method to access the database. (We don’t describe any harmful method — just that “suspicious behavior” occurs.)

Example safe triggers:

These alerts automatically appear in the SOC dashboard (SIEM).


🧊 3. L1 SOC Analyst — First to Notice

L1 sees alerts like:

L1 Actions:

L1 job = Identify “is this worth investigating?”


🔎 4. L2 SOC Analyst — Deep Investigation

L2 takes the case and checks:

✔️ Login logs

Who logged in? From where? Is the device trusted?

✔️ Database logs

What queries were made? Were they reading sensitive tables?

✔️ System behavior

Were there any unexpected processes?

✔️ Network patterns

Is the traffic coming from suspicious IPs?

If L2 sees something like:

“This is likely a real ongoing attack.”

L2 escalates to Incident Response and informs the SOC Manager.


🚑 5. Incident Response (IR) Team Steps In

The IR Team takes control to stop the attack safely.

They do:

All defensive actions, 100% legal. Nothing offensive or harmful.


🕵️‍♀️ 6. Threat Intelligence Analyst Joins

They check:

They report:

This helps the team understand the attacker’s intention.


🧠 7. L3 SOC Analyst / Detection Engineer

They analyze:

They create or update:

This prevents the SAME attack from happening again.


♻️ 8. Recovery Phase

Once safe, the IR Team:

Database is restored safely.


📄 9. Reporting & Lessons Learned

The SOC Manager prepares a full report:

Report includes:

This goes to upper management.


🔐 10. Post-Incident Hardening

SOC makes the company stronger:

This ensures future attacks fail.


🌟 Simple Summary

StageWhat HappensWho Works
DetectionAlerts fireL1 SOC
InvestigationDeep log + query analysisL2 SOC
ContainmentBlock attacker, isolate systemsIR Team
IntelligenceCheck attacker infoTI Team
Rule UpdatesImprove detection rulesL3 SOC
RecoveryRestore systemsIR Team
ReportingDocumentationSOC Manager

About this Walkthrough

A fictional, safe, educational cybersecurity scenario demonstrating how a Security Operations Center (SOC) responds to an attempted data-access attack. This write-up is suitable for learning SOC workflows, IR lifecycle, and defensive security methodologies.